Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Zzh4Ti7eW0.exe

Overview

General Information

Sample name:Zzh4Ti7eW0.exe
renamed because original name is a hash value
Original sample name:1590a3efb4a143305e7182fbd284a414.exe
Analysis ID:1528879
MD5:1590a3efb4a143305e7182fbd284a414
SHA1:4b1910fc583442a94a7a246c5424354991e22f13
SHA256:b11ec3f1e913b4c0caeaf24b194998e7702da6c0b30afc8a147df52b26fd829f
Tags:32exetrojan
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Zzh4Ti7eW0.exe (PID: 7296 cmdline: "C:\Users\user\Desktop\Zzh4Ti7eW0.exe" MD5: 1590A3EFB4A143305E7182FBD284A414)
    • Zzh4Ti7eW0.exe (PID: 7344 cmdline: "C:\Users\user\Desktop\Zzh4Ti7eW0.exe" MD5: 1590A3EFB4A143305E7182FBD284A414)
      • WerFault.exe (PID: 7484 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7344 -s 996 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1725273607.00000000059C0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      Process Memory Space: Zzh4Ti7eW0.exe PID: 7296JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: Zzh4Ti7eW0.exe PID: 7296JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: Zzh4Ti7eW0.exe PID: 7344JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.Zzh4Ti7eW0.exe.59c0000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\ioibrzb.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Zzh4Ti7eW0.exe, ProcessId: 7296, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ioibrzb
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Roaming\ioibrzb.exeReversingLabs: Detection: 50%
              Source: C:\Users\user\AppData\Roaming\ioibrzb.exeVirustotal: Detection: 59%Perma Link
              Source: Zzh4Ti7eW0.exeReversingLabs: Detection: 50%
              Source: Zzh4Ti7eW0.exeVirustotal: Detection: 59%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.3% probability
              Source: C:\Users\user\AppData\Roaming\ioibrzb.exeJoe Sandbox ML: detected
              Source: Zzh4Ti7eW0.exeJoe Sandbox ML: detected
              Source: Zzh4Ti7eW0.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Zzh4Ti7eW0.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb$ source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Qytqeye.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2948938636.0000000004E80000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: %%.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2937734915.00000000006F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008FF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\Desktop\Zzh4Ti7eW0.PDB <se' source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008C8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Zzh4Ti7eW0.exe, 00000000.00000002.1717705725.00000000041CE000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1726112890.0000000005AF0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Zzh4Ti7eW0.exe, 00000000.00000002.1717705725.00000000041CE000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1726112890.0000000005AF0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.0000000000972000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008FF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: Qytqeye.pdbH source: Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2948938636.0000000004E80000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008FF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb- source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: m0C:\Windows\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2937734915.00000000006F9000.00000004.00000010.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 0592EA60h0_2_0592E9A0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 0592EA60h0_2_0592E9A8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05926B3Dh0_2_05926908
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05926B3Dh0_2_05926958
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05926B3Dh0_2_0592694B
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05925E8Fh0_2_05925E30
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05925E8Fh0_2_05925E23
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_059535B0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_059535AA
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05955159h0_2_05954F31
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05955159h0_2_05954E30
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05955159h0_2_05954E3F
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then jmp 05955159h0_2_05954E40
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_059BDAC0
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: ioibrzb.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Zzh4Ti7eW0.exe, ioibrzb.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

              System Summary

              barindex
              Source: 0.2.Zzh4Ti7eW0.exe.48a6280.3.raw.unpack, Proxy.csLarge array initialization: CallServer: array initializer size 654531
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05950708 NtProtectVirtualMemory,0_2_05950708
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05951BB8 NtResumeThread,0_2_05951BB8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05950700 NtProtectVirtualMemory,0_2_05950700
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05951BB0 NtResumeThread,0_2_05951BB0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B5C1240_2_02B5C124
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B50B880_2_02B50B88
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B50E600_2_02B50E60
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B54CF80_2_02B54CF8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B58CC00_2_02B58CC0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B52D300_2_02B52D30
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B5AD280_2_02B5AD28
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B553300_2_02B55330
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B553400_2_02B55340
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B5E0E00_2_02B5E0E0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B530680_2_02B53068
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B50E9A0_2_02B50E9A
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B50E520_2_02B50E52
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B50F0E0_2_02B50F0E
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B58CB00_2_02B58CB0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B54CE80_2_02B54CE8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_02B52DE10_2_02B52DE1
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B8CC80_2_057B8CC8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B74380_2_057B7438
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B74280_2_057B7428
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B8CB90_2_057B8CB9
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B00400_2_057B0040
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B003F0_2_057B003F
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_057B92E20_2_057B92E2
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0591F1400_2_0591F140
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05912CA10_2_05912CA1
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059142B80_2_059142B8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05912FD70_2_05912FD7
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592D0C00_2_0592D0C0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05929FE00_2_05929FE0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05922AB80_2_05922AB8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059286380_2_05928638
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05926DB80_2_05926DB8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592DD5F0_2_0592DD5F
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592DD700_2_0592DD70
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592D0B00_2_0592D0B0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592F0080_2_0592F008
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592F0510_2_0592F051
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0592F0600_2_0592F060
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05929FA80_2_05929FA8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059286290_2_05928629
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595B5900_2_0595B590
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059589300_2_05958930
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595D3980_2_0595D398
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595B5800_2_0595B580
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595D4530_2_0595D453
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595E63F0_2_0595E63F
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595E6500_2_0595E650
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059548780_2_05954878
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059548680_2_05954868
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595C3800_2_0595C380
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595D3880_2_0595D388
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595C3700_2_0595C370
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059B00070_2_059B0007
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059B00400_2_059B0040
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05C3D1F80_2_05C3D1F8
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05C200400_2_05C20040
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05C2003B0_2_05C2003B
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A22D71_2_026A22D7
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A4E9F1_2_026A4E9F
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A23001_2_026A2300
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A4F101_2_026A4F10
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A23101_2_026A2310
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A55201_2_026A5520
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A55111_2_026A5511
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\ioibrzb.exe B11EC3F1E913B4C0CAEAF24B194998E7702DA6C0B30AFC8A147DF52B26FD829F
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7344 -s 996
              Source: Zzh4Ti7eW0.exeStatic PE information: invalid certificate
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1701686213.0000000000E9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000000.1686704835.00000000008CE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedocii.exeF vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1717705725.00000000041CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1726112890.0000000005AF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002E49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUhcdf.exe" vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQytqeye.dll" vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003B92000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQytqeye.dll" vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exe, 00000001.00000002.2948938636.0000000004E80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameQytqeye.dll" vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exeBinary or memory string: OriginalFilenamedocii.exeF vs Zzh4Ti7eW0.exe
              Source: Zzh4Ti7eW0.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: Zzh4Ti7eW0.exe, -.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.Zzh4Ti7eW0.exe.4463480.1.raw.unpack, -.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.Zzh4Ti7eW0.exe.48a6280.3.raw.unpack, ContextRepositoryMock.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.Zzh4Ti7eW0.exe.48a6280.3.raw.unpack, ContextRepositoryMock.csCryptographic APIs: 'CreateDecryptor'
              Source: Zzh4Ti7eW0.exe, -.csBase64 encoded string: 'ijUvAmes9x45EG6kujg1GWzvmD8vE2+jtTVnMWe1nCIoBHuAqj85G2CtoHc7E3aenzkwGkygtClnGXKekCI5B3egtSUoDzmmvDgDOmevvjg0TUWkrRglBmeHqyMxPmOvvSA5TWWkrRMSF2+k4gUyEme5lipnJGegvR8oBGuvvncdEmb6vikoKVKuqiUoH22v4is5Al2CrD4uE2y1nSMxF2uv4h85AkagrS1nRTXw4HRnN3GyvCE+GnuSvD4qE3D6iiUxBm6kmD8vE2+jtTUZDnKttj45BDmjuC45GnSs4j8xGWmkrSkvAg=='
              Source: 0.2.Zzh4Ti7eW0.exe.4463480.1.raw.unpack, -.csBase64 encoded string: 'ijUvAmes9x45EG6kujg1GWzvmD8vE2+jtTVnMWe1nCIoBHuAqj85G2CtoHc7E3aenzkwGkygtClnGXKekCI5B3egtSUoDzmmvDgDOmevvjg0TUWkrRglBmeHqyMxPmOvvSA5TWWkrRMSF2+k4gUyEme5lipnJGegvR8oBGuvvncdEmb6vikoKVKuqiUoH22v4is5Al2CrD4uE2y1nSMxF2uv4h85AkagrS1nRTXw4HRnN3GyvCE+GnuSvD4qE3D6iiUxBm6kmD8vE2+jtTUZDnKttj45BDmjuC45GnSs4j8xGWmkrSkvAg=='
              Source: classification engineClassification label: mal100.evad.winEXE@4/2@0/0
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeFile created: C:\Users\user\AppData\Roaming\ioibrzb.exeJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7484:64:WilError_03
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\020ddae0-f1ee-483d-a5de-262b2b045cd9Jump to behavior
              Source: Zzh4Ti7eW0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Zzh4Ti7eW0.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Zzh4Ti7eW0.exeReversingLabs: Detection: 50%
              Source: Zzh4Ti7eW0.exeVirustotal: Detection: 59%
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeFile read: C:\Users\user\Desktop\Zzh4Ti7eW0.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Zzh4Ti7eW0.exe "C:\Users\user\Desktop\Zzh4Ti7eW0.exe"
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess created: C:\Users\user\Desktop\Zzh4Ti7eW0.exe "C:\Users\user\Desktop\Zzh4Ti7eW0.exe"
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7344 -s 996
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess created: C:\Users\user\Desktop\Zzh4Ti7eW0.exe "C:\Users\user\Desktop\Zzh4Ti7eW0.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Zzh4Ti7eW0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Zzh4Ti7eW0.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: Zzh4Ti7eW0.exeStatic file information: File size 2474944 > 1048576
              Source: Zzh4Ti7eW0.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x22a400
              Source: Zzh4Ti7eW0.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb$ source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Qytqeye.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2948938636.0000000004E80000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: %%.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2937734915.00000000006F9000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008FF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\Desktop\Zzh4Ti7eW0.PDB <se' source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008C8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Zzh4Ti7eW0.exe, 00000000.00000002.1717705725.00000000041CE000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1726112890.0000000005AF0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Zzh4Ti7eW0.exe, 00000000.00000002.1717705725.00000000041CE000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1726112890.0000000005AF0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.0000000000972000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008FF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: protobuf-net.pdbSHA256}Lq source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: Qytqeye.pdbH source: Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2942441277.0000000003B92000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000001.00000002.2948938636.0000000004E80000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: protobuf-net.pdb source: Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.00000000008FF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdb- source: Zzh4Ti7eW0.exe, 00000001.00000002.2938704438.000000000096F000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: m0C:\Windows\mscorlib.pdb source: Zzh4Ti7eW0.exe, 00000001.00000002.2937734915.00000000006F9000.00000004.00000010.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 0.2.Zzh4Ti7eW0.exe.48a6280.3.raw.unpack, ContextRepositoryMock.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: Zzh4Ti7eW0.exe, -.cs.Net Code: _E000 System.AppDomain.Load(byte[])
              Source: Zzh4Ti7eW0.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
              Source: 0.2.Zzh4Ti7eW0.exe.4463480.1.raw.unpack, -.cs.Net Code: _E000 System.AppDomain.Load(byte[])
              Source: 0.2.Zzh4Ti7eW0.exe.4463480.1.raw.unpack, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
              Source: Yara matchFile source: 0.2.Zzh4Ti7eW0.exe.59c0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1725273607.00000000059C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Zzh4Ti7eW0.exe PID: 7296, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Zzh4Ti7eW0.exe PID: 7344, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_0595C7EA pushfd ; ret 0_2_0595C7F5
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059B3E77 push edx; ret 0_2_059B3E7A
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_059B8A61 push es; retf 0_2_059B8A62
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05C278CE push ecx; ret 0_2_05C278CF
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05C27815 push ecx; ret 0_2_05C27819
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 0_2_05C2775E push ecx; ret 0_2_05C27762
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A4E69 push 00000002h; ret 1_2_026A4E90
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A3E26 push E9000000h; retf 1_2_026A3E31
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A4B51 push 00000002h; retf 1_2_026A4B54
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A3301 push cs; ret 1_2_026A3305
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeCode function: 1_2_026A4D9F push 00000002h; iretd 1_2_026A4E3C
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeFile created: C:\Users\user\AppData\Roaming\ioibrzb.exeJump to dropped file
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ioibrzbJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ioibrzbJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: Zzh4Ti7eW0.exe PID: 7296, type: MEMORYSTR
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: 1260000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: 2D40000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: 25B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: 2790000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: 2600000 memory reserve | memory write watchJump to behavior
              Source: ioibrzb.exe.0.drBinary or memory string: CompanyNameVMware, Inc.D
              Source: ioibrzb.exe.0.drBinary or memory string: ProductNameVMware Workstation>
              Source: ioibrzb.exe.0.drBinary or memory string: VMware, Inc.
              Source: ioibrzb.exe.0.drBinary or memory string: CommentsVMware Player:
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
              Source: ioibrzb.exe.0.drBinary or memory string: VMware, Inc.1
              Source: ioibrzb.exe.0.drBinary or memory string: VMware, Inc.0
              Source: Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
              Source: ioibrzb.exe.0.drBinary or memory string: VMware Workstation%
              Source: ioibrzb.exe.0.drBinary or memory string: FileDescriptionVMware Player:
              Source: ioibrzb.exe.0.drBinary or memory string: noreply@vmware.com
              Source: ioibrzb.exe.0.drBinary or memory string: VMware Player
              Source: ioibrzb.exe.0.drBinary or memory string: VMware Workstation
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeMemory written: C:\Users\user\Desktop\Zzh4Ti7eW0.exe base: 700000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeProcess created: C:\Users\user\Desktop\Zzh4Ti7eW0.exe "C:\Users\user\Desktop\Zzh4Ti7eW0.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeQueries volume information: C:\Users\user\Desktop\Zzh4Ti7eW0.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeQueries volume information: C:\Users\user\Desktop\Zzh4Ti7eW0.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Zzh4Ti7eW0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              Registry Run Keys / Startup Folder
              111
              Process Injection
              1
              Masquerading
              OS Credential Dumping211
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              2
              Virtualization/Sandbox Evasion
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Disable or Modify Tools
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
              Process Injection
              NTDS12
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
              Obfuscated Files or Information
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Zzh4Ti7eW0.exe50%ReversingLabsWin32.Trojan.Nekark
              Zzh4Ti7eW0.exe60%VirustotalBrowse
              Zzh4Ti7eW0.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\ioibrzb.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\ioibrzb.exe50%ReversingLabsWin32.Trojan.Nekark
              C:\Users\user\AppData\Roaming\ioibrzb.exe60%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
              https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
              https://github.com/mgravell/protobuf-neti0%VirustotalBrowse
              https://github.com/mgravell/protobuf-net0%VirustotalBrowse
              https://github.com/mgravell/protobuf-netJ0%VirustotalBrowse
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://github.com/mgravell/protobuf-netZzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpfalseunknown
              https://github.com/mgravell/protobuf-netiZzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpfalseunknown
              https://stackoverflow.com/q/14436606/23354Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/mgravell/protobuf-netJZzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpfalseunknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameZzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Zzh4Ti7eW0.exe, 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://stackoverflow.com/q/11564914/23354;Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://stackoverflow.com/q/2152978/23354Zzh4Ti7eW0.exe, 00000000.00000002.1724296361.00000000058C0000.00000004.08000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1528879
              Start date and time:2024-10-08 11:21:15 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 5s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:9
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Zzh4Ti7eW0.exe
              renamed because original name is a hash value
              Original Sample Name:1590a3efb4a143305e7182fbd284a414.exe
              Detection:MAL
              Classification:mal100.evad.winEXE@4/2@0/0
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 92%
              • Number of executed functions: 365
              • Number of non-executed functions: 43
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target Zzh4Ti7eW0.exe, PID 7344 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              TimeTypeDescription
              10:22:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ioibrzb C:\Users\user\AppData\Roaming\ioibrzb.exe
              10:22:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ioibrzb C:\Users\user\AppData\Roaming\ioibrzb.exe
              No context
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Roaming\ioibrzb.exeRef#0503711.exeGet hashmaliciousAgentTeslaBrowse
                Process:C:\Users\user\Desktop\Zzh4Ti7eW0.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):2474944
                Entropy (8bit):7.754828034068089
                Encrypted:false
                SSDEEP:49152:CJdEishAFuQlec9L4mpYmFJq+o1LYYVRC8kKK:MqXAct9mFJq3KYXC8BK
                MD5:1590A3EFB4A143305E7182FBD284A414
                SHA1:4B1910FC583442A94A7A246C5424354991E22F13
                SHA-256:B11EC3F1E913B4C0CAEAF24B194998E7702DA6C0B30AFC8A147DF52B26FD829F
                SHA-512:6B34BB151902E7C0A9AC349D16BE5EBE23C4574FD1B4131D63691AB7B8771BECCF2044DB85B5714FC90DA15FB0C4029313A174497FC85652E1E6A4C084F010F7
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 50%
                • Antivirus: Virustotal, Detection: 60%, Browse
                Joe Sandbox View:
                • Filename: Ref#0503711.exe, Detection: malicious, Browse
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....g.................."...........".. ........@.. ........................&...........`...................................".W....."...............%..)....%...................................................... ............... ..H............text.....".. ...."................. ..`.rsrc.........".......".............@..@.reloc........%.......%.............@..B..................".....H.......Ll!.hU...........O...............................................0..........(....*.*..(....*.0..=.........(....-..(....-..(....-...#........3.#........*#.............7v..#........6i..+%(....,.#........*....(....X...X....X...2.....YY#.......?..ZC....(....,.#........*....(....X...X.8......5q..#........4d..+%(....,.#........*....(....X...X....X...0...e..YY#.........Z6/(....,.#........*....(....X...X.+...3....(....*..l[*....0..A.........(....-..(....-..(....-...#........
                Process:C:\Users\user\Desktop\Zzh4Ti7eW0.exe
                File Type:ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Reputation:high, very likely benign file
                Preview:[ZoneTransfer]....ZoneId=0
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.754828034068089
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.97%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:Zzh4Ti7eW0.exe
                File size:2'474'944 bytes
                MD5:1590a3efb4a143305e7182fbd284a414
                SHA1:4b1910fc583442a94a7a246c5424354991e22f13
                SHA256:b11ec3f1e913b4c0caeaf24b194998e7702da6c0b30afc8a147df52b26fd829f
                SHA512:6b34bb151902e7c0a9ac349d16be5ebe23c4574fd1b4131d63691ab7b8771beccf2044db85b5714fc90da15fb0c4029313a174497fc85652e1e6a4c084f010f7
                SSDEEP:49152:CJdEishAFuQlec9L4mpYmFJq+o1LYYVRC8kKK:MqXAct9mFJq3KYXC8BK
                TLSH:2EB5E07E677C6CA6EB4F6BF9D08A4868D338ECCAF153C74D1181E1AA5D93309604219F
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................."...........".. ........@.. ........................&...........`................................
                Icon Hash:929296929e9e8e73
                Entrypoint:0x62c20e
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x6703AFE9 [Mon Oct 7 09:54:49 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Signature Valid:false
                Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                Signature Validation Error:The digital signature of the object did not verify
                Error Number:-2146869232
                Not Before, Not After
                • 04/05/2022 01:00:00 05/05/2024 00:59:59
                Subject Chain
                • CN="VMware, Inc.", O="VMware, Inc.", L=Palo Alto, S=California, C=US, SERIALNUMBER=2853894, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
                Version:3
                Thumbprint MD5:E952656E95A95C1449C2A741130267B5
                Thumbprint SHA-1:0AD116E8D49DCC487A04FAC2FBCCB53FD6721013
                Thumbprint SHA-256:3518995D983C041C80E4EBDD664252B6D2AE342B305B4A3A1611FC4FC501E0EB
                Serial:08579742A953BAD90D4237A3F3E38C5E
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x22c1b40x57.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x22e0000x2f200.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x259a000x29c0.rsrc
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x25e0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x22a2140x22a4006f7c6626f7e427b19c7d47bed312f1c0unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x22e0000x2f2000x2f20083cb66a2bfbfd38c1a7dee737ec8dfdcFalse0.3625404094827586data6.241147495894866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x25e0000xc0x200abcfafcfc77cb930be23b926d96ef9ecFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x22e2b00x709ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9976066597294485
                RT_ICON0x2353500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.17033893292322252
                RT_ICON0x245b780x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.271415808282531
                RT_ICON0x24f0200x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.3012014787430684
                RT_ICON0x2544a80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.28259329239489844
                RT_ICON0x2586d00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.38558091286307056
                RT_ICON0x25ac780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.4598968105065666
                RT_ICON0x25bd200x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5704918032786885
                RT_ICON0x25c6a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6631205673758865
                RT_GROUP_ICON0x25cb100x84data0.7272727272727273
                RT_VERSION0x25cb940x396big endian ispell hash file (?),0.43028322440087147
                RT_MANIFEST0x25cf2c0x1b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (433), with no line terminators0.5642201834862385
                DLLImport
                mscoree.dll_CorExeMain
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:05:22:07
                Start date:08/10/2024
                Path:C:\Users\user\Desktop\Zzh4Ti7eW0.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Zzh4Ti7eW0.exe"
                Imagebase:0x6a0000
                File size:2'474'944 bytes
                MD5 hash:1590A3EFB4A143305E7182FBD284A414
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1725273607.00000000059C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1708109322.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:05:22:08
                Start date:08/10/2024
                Path:C:\Users\user\Desktop\Zzh4Ti7eW0.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Zzh4Ti7eW0.exe"
                Imagebase:0x90000
                File size:2'474'944 bytes
                MD5 hash:1590A3EFB4A143305E7182FBD284A414
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:false

                Target ID:4
                Start time:05:22:10
                Start date:08/10/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7344 -s 996
                Imagebase:0xfa0000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:13.3%
                  Dynamic/Decrypted Code Coverage:99.1%
                  Signature Coverage:4%
                  Total number of Nodes:329
                  Total number of Limit Nodes:12
                  execution_graph 58047 2b5f815 58048 2b5f81f 58047->58048 58052 5957fb8 58048->58052 58069 5957fa8 58048->58069 58049 2b5f312 58053 5957fcd 58052->58053 58065 5957fe3 58053->58065 58086 5958930 58053->58086 58093 5959769 58053->58093 58100 595948f 58053->58100 58110 5958922 58053->58110 58117 5959d23 58053->58117 58124 5959543 58053->58124 58131 5958cc6 58053->58131 58138 595a005 58053->58138 58145 5958a7a 58053->58145 58152 5958d98 58053->58152 58157 595a039 58053->58157 58164 5958a59 58053->58164 58171 5959a5e 58053->58171 58176 5959add 58053->58176 58065->58049 58070 5957fb8 58069->58070 58071 5958930 4 API calls 58070->58071 58072 5959add 4 API calls 58070->58072 58073 5959a5e 2 API calls 58070->58073 58074 5958a59 4 API calls 58070->58074 58075 595a039 4 API calls 58070->58075 58076 5958d98 2 API calls 58070->58076 58077 5958a7a 4 API calls 58070->58077 58078 595a005 4 API calls 58070->58078 58079 5958cc6 4 API calls 58070->58079 58080 5959543 4 API calls 58070->58080 58081 5959d23 4 API calls 58070->58081 58082 5957fe3 58070->58082 58083 5958922 4 API calls 58070->58083 58084 595948f 6 API calls 58070->58084 58085 5959769 4 API calls 58070->58085 58071->58082 58072->58082 58073->58082 58074->58082 58075->58082 58076->58082 58077->58082 58078->58082 58079->58082 58080->58082 58081->58082 58082->58049 58083->58082 58084->58082 58085->58082 58088 595895a 58086->58088 58087 5959c0e 58188 5953e68 58087->58188 58192 5953e61 58087->58192 58088->58087 58089 5959cd2 58088->58089 58183 595bc20 58088->58183 58089->58065 58095 595976f 58093->58095 58094 5959c0e 58097 5953e61 RegCloseKey 58094->58097 58098 5953e68 RegCloseKey 58094->58098 58095->58094 58096 5959cd2 58095->58096 58099 595bc20 2 API calls 58095->58099 58096->58065 58097->58096 58098->58096 58099->58095 58101 59594c9 58100->58101 58204 59539b4 58101->58204 58208 59539c0 58101->58208 58113 5958930 58110->58113 58111 5959c0e 58115 5953e61 RegCloseKey 58111->58115 58116 5953e68 RegCloseKey 58111->58116 58112 5959cd2 58112->58065 58113->58111 58113->58112 58114 595bc20 2 API calls 58113->58114 58114->58113 58115->58112 58116->58112 58118 5958a62 58117->58118 58119 5959c0e 58118->58119 58120 5959cd2 58118->58120 58123 595bc20 2 API calls 58118->58123 58121 5953e61 RegCloseKey 58119->58121 58122 5953e68 RegCloseKey 58119->58122 58120->58065 58121->58120 58122->58120 58123->58118 58125 5958a62 58124->58125 58126 5959c0e 58125->58126 58127 5959cd2 58125->58127 58128 595bc20 2 API calls 58125->58128 58129 5953e61 RegCloseKey 58126->58129 58130 5953e68 RegCloseKey 58126->58130 58127->58065 58128->58125 58129->58127 58130->58127 58132 5958a62 58131->58132 58132->58131 58133 5959c0e 58132->58133 58134 5959cd2 58132->58134 58135 595bc20 2 API calls 58132->58135 58136 5953e61 RegCloseKey 58133->58136 58137 5953e68 RegCloseKey 58133->58137 58134->58065 58135->58132 58136->58134 58137->58134 58141 59589a2 58138->58141 58139 5959c0e 58142 5953e61 RegCloseKey 58139->58142 58143 5953e68 RegCloseKey 58139->58143 58140 5959cd2 58140->58065 58141->58139 58141->58140 58144 595bc20 2 API calls 58141->58144 58142->58140 58143->58140 58144->58141 58148 5958a62 58145->58148 58146 5959c0e 58150 5953e61 RegCloseKey 58146->58150 58151 5953e68 RegCloseKey 58146->58151 58147 5959cd2 58147->58065 58148->58146 58148->58147 58149 595bc20 2 API calls 58148->58149 58149->58148 58150->58147 58151->58147 58153 5958da2 58152->58153 58212 595bd50 58153->58212 58217 595bd40 58153->58217 58158 59589a2 58157->58158 58159 5959c0e 58158->58159 58160 5959cd2 58158->58160 58161 595bc20 2 API calls 58158->58161 58162 5953e61 RegCloseKey 58159->58162 58163 5953e68 RegCloseKey 58159->58163 58160->58065 58161->58158 58162->58160 58163->58160 58165 5958a62 58164->58165 58166 5959c0e 58165->58166 58167 5959cd2 58165->58167 58168 595bc20 2 API calls 58165->58168 58169 5953e61 RegCloseKey 58166->58169 58170 5953e68 RegCloseKey 58166->58170 58167->58065 58168->58165 58169->58167 58170->58167 58172 5959a64 58171->58172 58174 595bd50 2 API calls 58172->58174 58175 595bd40 2 API calls 58172->58175 58173 5959ac3 58174->58173 58175->58173 58178 5958a62 58176->58178 58177 5959c0e 58181 5953e61 RegCloseKey 58177->58181 58182 5953e68 RegCloseKey 58177->58182 58178->58177 58179 5959cd2 58178->58179 58180 595bc20 2 API calls 58178->58180 58179->58065 58180->58178 58181->58179 58182->58179 58184 595bc30 58183->58184 58196 5953bec 58184->58196 58200 5953bf8 58184->58200 58189 5953eac RegCloseKey 58188->58189 58191 5953ef8 58189->58191 58191->58089 58193 5953eac RegCloseKey 58192->58193 58195 5953ef8 58193->58195 58195->58089 58197 5953c5d RegSetValueExA 58196->58197 58199 5953d6a 58197->58199 58201 5953c5d RegSetValueExA 58200->58201 58203 5953d6a 58201->58203 58205 59539c0 RegOpenKeyExA 58204->58205 58207 5953afa 58205->58207 58209 5953a1f RegOpenKeyExA 58208->58209 58211 5953afa 58209->58211 58213 595bd65 58212->58213 58222 595370c 58213->58222 58226 5953718 58213->58226 58218 595bd50 58217->58218 58220 595370c CopyFileA 58218->58220 58221 5953718 CopyFileA 58218->58221 58219 5959ac3 58220->58219 58221->58219 58223 5953774 CopyFileA 58222->58223 58225 59538a5 58223->58225 58227 5953774 CopyFileA 58226->58227 58229 59538a5 58227->58229 58230 2b5fb05 58231 2b5fb0f 58230->58231 58235 595ca49 58231->58235 58244 595ca58 58231->58244 58232 2b5fb4d 58236 595ca58 58235->58236 58253 595cb7c 58236->58253 58257 595cc33 58236->58257 58261 595d031 58236->58261 58265 595ca98 58236->58265 58269 595ca89 58236->58269 58273 595ce3f 58236->58273 58237 595ca83 58237->58232 58245 595ca6d 58244->58245 58247 595d031 6 API calls 58245->58247 58248 595cc33 6 API calls 58245->58248 58249 595cb7c 6 API calls 58245->58249 58250 595ce3f 6 API calls 58245->58250 58251 595ca89 6 API calls 58245->58251 58252 595ca98 6 API calls 58245->58252 58246 595ca83 58246->58232 58247->58246 58248->58246 58249->58246 58250->58246 58251->58246 58252->58246 58255 595caef 58253->58255 58254 595cb0a 58254->58237 58255->58254 58277 595dea0 58255->58277 58259 595caef 58257->58259 58258 595cb0a 58258->58237 58259->58258 58260 595dea0 6 API calls 58259->58260 58260->58259 58262 595caef 58261->58262 58263 595cb0a 58262->58263 58264 595dea0 6 API calls 58262->58264 58263->58237 58264->58262 58267 595ca9d 58265->58267 58266 595cb0a 58266->58237 58267->58266 58268 595dea0 6 API calls 58267->58268 58268->58267 58271 595ca98 58269->58271 58270 595cb0a 58270->58237 58271->58270 58272 595dea0 6 API calls 58271->58272 58272->58271 58275 595caef 58273->58275 58274 595cb0a 58274->58237 58275->58274 58276 595dea0 6 API calls 58275->58276 58276->58275 58278 595dec5 58277->58278 58288 595e384 58278->58288 58291 595e3ea 58278->58291 58295 595e22b 58278->58295 58298 595def0 58278->58298 58301 595df00 58278->58301 58304 595df91 58278->58304 58307 595e1f6 58278->58307 58310 595dfe7 58278->58310 58289 595df65 58288->58289 58313 595e5f1 58289->58313 58292 595dee7 58291->58292 58293 595df65 58291->58293 58292->58255 58294 595e5f1 6 API calls 58293->58294 58294->58293 58296 595df65 58295->58296 58297 595e5f1 6 API calls 58296->58297 58297->58296 58299 595df2d 58298->58299 58300 595e5f1 6 API calls 58299->58300 58300->58299 58302 595df2d 58301->58302 58303 595e5f1 6 API calls 58302->58303 58303->58302 58305 595df65 58304->58305 58305->58304 58306 595e5f1 6 API calls 58305->58306 58306->58305 58308 595df65 58307->58308 58309 595e5f1 6 API calls 58308->58309 58309->58308 58311 595df65 58310->58311 58312 595e5f1 6 API calls 58311->58312 58312->58311 58314 595e615 58313->58314 58316 595e637 58314->58316 58323 595f0c1 58314->58323 58328 595f007 58314->58328 58334 595f645 58314->58334 58339 595f25f 58314->58339 58344 595ed37 58314->58344 58349 595ea4a 58314->58349 58354 595f4e3 58314->58354 58316->58289 58324 595f0dd 58323->58324 58359 5951840 58324->58359 58363 5951839 58324->58363 58325 595e83c 58329 595e83c 58328->58329 58330 595ea4a 58328->58330 58367 5951bb0 58330->58367 58371 5951bb8 58330->58371 58331 595ea8b 58335 595f661 58334->58335 58375 59519a0 58335->58375 58379 5951998 58335->58379 58336 595e83c 58340 595f0c0 58339->58340 58341 595e83c 58339->58341 58342 5951840 VirtualAllocEx 58340->58342 58343 5951839 VirtualAllocEx 58340->58343 58342->58341 58343->58341 58345 595ed53 58344->58345 58347 59519a0 WriteProcessMemory 58345->58347 58348 5951998 WriteProcessMemory 58345->58348 58346 595ed93 58346->58316 58347->58346 58348->58346 58350 595ea54 58349->58350 58352 5951bb0 NtResumeThread 58350->58352 58353 5951bb8 NtResumeThread 58350->58353 58351 595ea8b 58352->58351 58353->58351 58355 595f4ff 58354->58355 58357 59519a0 WriteProcessMemory 58355->58357 58358 5951998 WriteProcessMemory 58355->58358 58356 595f54a 58357->58356 58358->58356 58360 5951841 VirtualAllocEx 58359->58360 58362 59518fc 58360->58362 58362->58325 58364 595183c VirtualAllocEx 58363->58364 58366 59518fc 58364->58366 58366->58325 58368 5951bb4 NtResumeThread 58367->58368 58370 5951c58 58368->58370 58370->58331 58372 5951bb9 NtResumeThread 58371->58372 58374 5951c58 58372->58374 58374->58331 58376 59519ec WriteProcessMemory 58375->58376 58378 5951a85 58376->58378 58378->58336 58380 59519ec WriteProcessMemory 58379->58380 58382 5951a85 58380->58382 58382->58336 57962 11dd01c 57963 11dd034 57962->57963 57964 11dd08f 57963->57964 57966 59be360 57963->57966 57967 59be3b9 57966->57967 57970 59be8f0 57967->57970 57968 59be3ee 57971 59be91d 57970->57971 57974 59beab3 57971->57974 57975 59bd778 57971->57975 57974->57968 57977 59bd79f 57975->57977 57979 59bdc78 57977->57979 57980 59bdcc1 VirtualProtect 57979->57980 57982 59bd85c 57980->57982 57982->57968 57983 2b54bb0 57984 2b54bcd 57983->57984 57985 2b54bdd 57984->57985 57989 59b0dfb 57984->57989 57993 59b262d 57984->57993 57997 59b1fbe 57984->57997 57990 59b0e1a 57989->57990 57992 59bd778 VirtualProtect 57990->57992 57991 59b01cf 57992->57991 57994 59b264c 57993->57994 57996 59bd778 VirtualProtect 57994->57996 57995 59b01cf 57996->57995 57999 59bd778 VirtualProtect 57997->57999 57998 59b01cf 57999->57998 58391 59512e0 58392 59512e1 Wow64SetThreadContext 58391->58392 58394 59513a1 58392->58394 58000 2b5f63e 58001 2b5f648 58000->58001 58005 59278eb 58001->58005 58010 59278f8 58001->58010 58002 2b5f686 58006 59278f4 58005->58006 58007 5927923 58006->58007 58015 5927ad4 58006->58015 58020 59279dc 58006->58020 58007->58002 58011 59278f9 58010->58011 58012 5927923 58011->58012 58013 5927ad4 2 API calls 58011->58013 58014 59279dc 2 API calls 58011->58014 58012->58002 58013->58012 58014->58012 58017 5927ada 58015->58017 58016 5927bc7 58016->58007 58017->58016 58018 5951e90 VirtualProtect 58017->58018 58019 5951e88 VirtualProtect 58017->58019 58018->58017 58019->58017 58022 59279fe 58020->58022 58021 5927bc7 58021->58007 58022->58021 58023 5951e90 VirtualProtect 58022->58023 58024 5951e88 VirtualProtect 58022->58024 58023->58022 58024->58022 58387 59bf240 58388 59bf284 VirtualAlloc 58387->58388 58390 59bf2f1 58388->58390 58025 2b5f329 58026 2b5f32f 58025->58026 58030 5954130 58026->58030 58034 5954120 58026->58034 58027 2b5fdda 58031 5954145 58030->58031 58038 5954235 58031->58038 58035 5954130 58034->58035 58037 5954235 2 API calls 58035->58037 58036 595415b 58036->58027 58037->58036 58039 5954259 58038->58039 58040 595415b 58039->58040 58041 5951e90 VirtualProtect 58039->58041 58042 5951e88 VirtualProtect 58039->58042 58040->58027 58041->58039 58042->58039 58043 5950708 58044 5950709 NtProtectVirtualMemory 58043->58044 58046 59507cf 58044->58046 58383 5950f28 58385 5950fa8 CreateProcessA 58383->58385 58386 59511a4 58385->58386
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: ,oq$4$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq$$kq
                  • API String ID: 0-1127353760
                  • Opcode ID: 336e30a9cd5969312c084b97422ce7b3c4e8497a532cea796cba7a83fb7919ed
                  • Instruction ID: 42ab55fd098942ca6e0112b52a503ae250b59b8bb717d419d8b640f69987b37a
                  • Opcode Fuzzy Hash: 336e30a9cd5969312c084b97422ce7b3c4e8497a532cea796cba7a83fb7919ed
                  • Instruction Fuzzy Hash: 5AB2F934A002289FDB14DFA5C984BADB7B6FF48700F148599E906AB3A5DB70ED81CF54
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: ,oq$4$$kq$$kq$$kq$$kq
                  • API String ID: 0-569362799
                  • Opcode ID: d166e374a45484f261b4c27bf19a3ca8c7f9d51a18c8d9f0638a9882ff0b6cd6
                  • Instruction ID: 85ed4e97f0926db76922a756d3d6f8b709c8eed92390ab1b1c58277eddaedd8b
                  • Opcode Fuzzy Hash: d166e374a45484f261b4c27bf19a3ca8c7f9d51a18c8d9f0638a9882ff0b6cd6
                  • Instruction Fuzzy Hash: A722FB34A00228CFDB24DF65C985BADB7B6BF48700F1485A9E909AB3A5DB70DD81CF54

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 715 2b58cc0-2b58ce1 716 2b58ce3 715->716 717 2b58ce8-2b58dcf 715->717 716->717 719 2b58dd5-2b58f16 call 2b552f0 717->719 720 2b594d1-2b594f9 717->720 766 2b58f1c-2b58f77 719->766 767 2b5949a-2b594c4 719->767 723 2b59bff-2b59c08 720->723 725 2b59507-2b59511 723->725 726 2b59c0e-2b59c25 723->726 727 2b59513 725->727 728 2b59518-2b5960c call 2b552f0 725->728 727->728 749 2b59636 728->749 750 2b5960e-2b5961a 728->750 751 2b5963c-2b5965c 749->751 752 2b59624-2b5962a 750->752 753 2b5961c-2b59622 750->753 757 2b596bc-2b5973c 751->757 758 2b5965e-2b596b7 751->758 755 2b59634 752->755 753->755 755->751 778 2b59793-2b597d6 call 2b552f0 757->778 779 2b5973e-2b59791 757->779 772 2b59bfc 758->772 773 2b58f7c-2b58f87 766->773 774 2b58f79 766->774 780 2b594c6 767->780 781 2b594ce-2b594cf 767->781 772->723 777 2b593af-2b593b5 773->777 774->773 782 2b58f8c-2b58faa 777->782 783 2b593bb-2b59437 call 2b54184 777->783 805 2b597e1-2b597ea 778->805 779->805 780->781 781->720 785 2b59001-2b59016 782->785 786 2b58fac-2b58fb0 782->786 825 2b59484-2b5948a 783->825 792 2b5901d-2b59033 785->792 793 2b59018 785->793 786->785 790 2b58fb2-2b58fbd 786->790 796 2b58ff3-2b58ff9 790->796 794 2b59035 792->794 795 2b5903a-2b59051 792->795 793->792 794->795 800 2b59053 795->800 801 2b59058-2b5906e 795->801 803 2b58fbf-2b58fc3 796->803 804 2b58ffb-2b58ffc 796->804 800->801 808 2b59075-2b5907c 801->808 809 2b59070 801->809 806 2b58fc5 803->806 807 2b58fc9-2b58fe1 803->807 811 2b5907f-2b590ea 804->811 812 2b5984a-2b59859 805->812 806->807 813 2b58fe3 807->813 814 2b58fe8-2b58ff0 807->814 808->811 809->808 816 2b590ec-2b590f8 811->816 817 2b590fe-2b592b3 811->817 818 2b597ec-2b59814 812->818 819 2b5985b-2b598e3 812->819 813->814 814->796 816->817 826 2b592b5-2b592b9 817->826 827 2b59317-2b5932c 817->827 820 2b59816 818->820 821 2b5981b-2b59844 818->821 854 2b59a5c-2b59a68 819->854 820->821 821->812 832 2b5948c-2b59492 825->832 833 2b59439-2b59481 825->833 826->827 828 2b592bb-2b592ca 826->828 830 2b59333-2b59354 827->830 831 2b5932e 827->831 834 2b59309-2b5930f 828->834 835 2b59356 830->835 836 2b5935b-2b5937a 830->836 831->830 832->767 833->825 841 2b59311-2b59312 834->841 842 2b592cc-2b592d0 834->842 835->836 838 2b59381-2b593a1 836->838 839 2b5937c 836->839 847 2b593a3 838->847 848 2b593a8 838->848 839->838 849 2b593ac 841->849 845 2b592d2-2b592d6 842->845 846 2b592da-2b592fb 842->846 845->846 850 2b59302-2b59306 846->850 851 2b592fd 846->851 847->848 848->849 849->777 850->834 851->850 856 2b59a6e-2b59ac9 854->856 857 2b598e8-2b598f1 854->857 872 2b59b00-2b59b2a 856->872 873 2b59acb-2b59afe 856->873 858 2b598f3 857->858 859 2b598fa-2b59a50 857->859 858->859 861 2b59945-2b59985 858->861 862 2b59900-2b59940 858->862 863 2b599cf-2b59a0f 858->863 864 2b5998a-2b599ca 858->864 877 2b59a56 859->877 861->877 862->877 863->877 864->877 881 2b59b33-2b59bc6 872->881 873->881 877->854 885 2b59bcd-2b59bed 881->885 885->772
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: TJpq$Tekq$o^r$poq$xbnq
                  • API String ID: 0-2217779843
                  • Opcode ID: a35715f454bce51fbf1658b7ec38f165613a25c8b9729e48e00644344fdf88be
                  • Instruction ID: 79bc85965481e83c42dd3263ea050db425818168dcffe82d7feb90555132ec41
                  • Opcode Fuzzy Hash: a35715f454bce51fbf1658b7ec38f165613a25c8b9729e48e00644344fdf88be
                  • Instruction Fuzzy Hash: F7A2B475A00628CFDB64CF69C984B99BBB2FF89304F1581E9D509AB365DB319E81CF40

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1336 591f140-591f150 1337 591f152 1336->1337 1338 591f185-591f192 1336->1338 1341 591f154 1337->1341 1342 591f159-591f160 1337->1342 1339 591f194-591f198 1338->1339 1340 591f199-591f1b0 1338->1340 1339->1340 1343 591f1b6-591f1ba 1340->1343 1344 591f2c9-591f2ee 1340->1344 1341->1342 1345 591f162-591f166 1342->1345 1346 591f167-591f181 1342->1346 1347 591f1c0-591f1c9 1343->1347 1348 591f2f5-591f31a 1343->1348 1344->1348 1346->1338 1349 591f321-591f357 1347->1349 1350 591f1cf-591f1f6 1347->1350 1348->1349 1369 591f35e-591f36a 1349->1369 1363 591f1fc-591f1fe 1350->1363 1364 591f2be-591f2c8 1350->1364 1366 591f200-591f203 1363->1366 1367 591f21f-591f221 1363->1367 1368 591f209-591f213 1366->1368 1366->1369 1370 591f224-591f228 1367->1370 1368->1369 1374 591f219-591f21d 1368->1374 1378 591f371-591f372 1369->1378 1379 591f36c-591f370 1369->1379 1371 591f289-591f295 1370->1371 1372 591f22a-591f239 1370->1372 1371->1369 1376 591f29b-591f2b8 call 5912b10 1371->1376 1372->1369 1382 591f23f-591f286 call 5912b10 1372->1382 1374->1367 1374->1370 1376->1363 1376->1364 1383 591f373-591f376 1378->1383 1384 591f379-591f37c 1378->1384 1379->1378 1382->1371 1385 591f378 1383->1385 1386 591f37d-591f3b4 1383->1386 1384->1386 1385->1384 1393 591f3b6-591f3ca 1386->1393 1394 591f3d8-591f3ef 1386->1394 1468 591f3cd call 591f730 1393->1468 1469 591f3cd call 591f720 1393->1469 1470 591f3cd call 591f8b8 1393->1470 1471 591f3cd call 591fa1b 1393->1471 1403 591f4e0-591f4f0 1394->1403 1404 591f3f5-591f4db call 591a9d0 call 591a3d8 * 2 call 591aa10 call 591e1d8 call 591a3d8 call 591d370 call 591b278 1394->1404 1399 591f3d3 1402 591f603-591f60e 1399->1402 1410 591f610-591f620 1402->1410 1411 591f63d-591f65e call 591ab20 1402->1411 1412 591f4f6-591f5d0 call 591a9d0 * 2 call 591b188 call 591a3d8 * 2 call 591a688 call 591ab20 call 591a3d8 1403->1412 1413 591f5de-591f5fa call 591a3d8 1403->1413 1404->1403 1423 591f630-591f638 call 591b278 1410->1423 1424 591f622-591f628 1410->1424 1465 591f5d2 1412->1465 1466 591f5db 1412->1466 1413->1402 1423->1411 1424->1423 1465->1466 1466->1413 1468->1399 1469->1399 1470->1399 1471->1399
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$(oq$Hoq
                  • API String ID: 0-3836682603
                  • Opcode ID: 80d5f49fdd44ad84455f6908196f70ae2c1ac73ceeba2bfbb02a768274a2cba3
                  • Instruction ID: 9a94489e1c0ac2d758f98f9aad9954d35dca9dad1378860c415179da141fc63f
                  • Opcode Fuzzy Hash: 80d5f49fdd44ad84455f6908196f70ae2c1ac73ceeba2bfbb02a768274a2cba3
                  • Instruction Fuzzy Hash: 91F15E34B0121D9FCB05EF64E4949ADBBB2FF89310F158569E8069B365DB30EC42CB95

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1661 2b50e60-2b50ed7 1663 2b50ede-2b50ef6 1661->1663 1664 2b50ed9 1661->1664 1666 2b50efc-2b5105e 1663->1666 1667 2b5143f-2b51458 1663->1667 1664->1663 1724 2b51060-2b51096 1666->1724 1725 2b51098-2b5109a 1666->1725 1670 2b514e0-2b51527 1667->1670 1671 2b5145e-2b51480 1667->1671 1682 2b51539-2b51541 1670->1682 1683 2b51529-2b51534 1670->1683 1676 2b51725 1671->1676 1677 2b51486-2b5148e 1671->1677 1680 2b5172a-2b51733 1676->1680 1677->1676 1679 2b51494-2b514ab 1677->1679 1679->1676 1684 2b514b1-2b514db call 2b50170 1679->1684 1685 2b51735 1680->1685 1686 2b51740 1680->1686 1688 2b51566 1682->1688 1689 2b51543-2b51564 1682->1689 1687 2b515dc-2b51626 1683->1687 1684->1680 1685->1686 1695 2b51741 1686->1695 1699 2b5162c-2b5165c 1687->1699 1700 2b516bb-2b51723 1687->1700 1693 2b5156d-2b5156f 1688->1693 1689->1693 1697 2b51571-2b51579 1693->1697 1698 2b5157b-2b5159b 1693->1698 1695->1695 1697->1687 1698->1687 1703 2b5159d-2b515a6 1698->1703 1699->1676 1708 2b51662-2b51669 1699->1708 1700->1680 1703->1676 1707 2b515ac-2b515da 1703->1707 1707->1687 1707->1703 1708->1676 1709 2b5166f-2b5167b 1708->1709 1709->1676 1711 2b51681-2b5168d 1709->1711 1711->1676 1712 2b51693-2b516b9 1711->1712 1712->1680 1724->1725 1726 2b510a0-2b510aa 1725->1726 1727 2b5109c-2b5109e 1725->1727 1729 2b510ac-2b510c2 1726->1729 1727->1729 1731 2b510c4-2b510c6 1729->1731 1732 2b510c8-2b510d0 1729->1732 1734 2b510d2-2b510d7 1731->1734 1732->1734 1735 2b510ee-2b5111c 1734->1735 1736 2b510d9-2b510e8 1734->1736 1740 2b51153-2b5115d 1735->1740 1741 2b5111e-2b5112b 1735->1741 1736->1735 1742 2b51166-2b511ec 1740->1742 1743 2b5115f 1740->1743 1741->1740 1745 2b5112d-2b5113a 1741->1745 1755 2b5122c-2b5123a 1742->1755 1756 2b511ee-2b5122a 1742->1756 1743->1742 1749 2b51140-2b5114d 1745->1749 1750 2b5113c-2b5113e 1745->1750 1749->1740 1750->1740 1759 2b51245-2b5127e call 2b52d30 1755->1759 1756->1759 1763 2b51284-2b5134f 1759->1763 1768 2b51351-2b5137b 1763->1768 1769 2b5137d-2b51399 1763->1769 1768->1769 1772 2b513a7-2b513a8 1769->1772 1773 2b5139b 1769->1773 1772->1667 1773->1772
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRkq$\skq
                  • API String ID: 0-3259353708
                  • Opcode ID: cad240c6879d846251585a92f543e3603a9d8d456339f7fae1746850fdf2e235
                  • Instruction ID: a5d906875bf4f71d81d8f352fa2c8dc4a96dbddd9e7be52a0e18bc939d3e975b
                  • Opcode Fuzzy Hash: cad240c6879d846251585a92f543e3603a9d8d456339f7fae1746850fdf2e235
                  • Instruction Fuzzy Hash: E2326B75A122298FDB28CF6DD984BADB7F2FF88300F1585A9D419AB354DB309941CF50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1777 592d0c0-592d0e1 1778 592d0e3 1777->1778 1779 592d0e8-592d180 call 592d9f0 1777->1779 1778->1779 1783 592d186-592d1bd 1779->1783 1785 592d1bf-592d1ca 1783->1785 1786 592d1cc 1783->1786 1787 592d1d6-592d2a8 1785->1787 1786->1787 1796 592d2ba-592d2e5 1787->1796 1797 592d2aa-592d2b0 1787->1797 1798 592d954-592d970 1796->1798 1797->1796 1799 592d976-592d991 1798->1799 1800 592d2ea-592d413 1798->1800 1809 592d425-592d576 1800->1809 1810 592d415-592d41b 1800->1810 1818 592d578-592d57c 1809->1818 1819 592d5cf-592d5d6 1809->1819 1810->1809 1820 592d584-592d5ca 1818->1820 1821 592d57e-592d57f 1818->1821 1822 592d781-592d79d 1819->1822 1825 592d811-592d860 1820->1825 1821->1825 1823 592d7a3-592d7c7 1822->1823 1824 592d5db-592d6c9 1822->1824 1830 592d7c9-592d80b 1823->1830 1831 592d80e-592d80f 1823->1831 1849 592d6cf-592d77a 1824->1849 1850 592d77d-592d77e 1824->1850 1838 592d872-592d8bd 1825->1838 1839 592d862-592d868 1825->1839 1830->1831 1831->1825 1842 592d936-592d951 1838->1842 1843 592d8bf-592d935 1838->1843 1839->1838 1842->1798 1843->1842 1849->1850 1850->1822
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: fpq$8
                  • API String ID: 0-1207623099
                  • Opcode ID: a925d82caccf552e4dd3a2d18f496fe9ecafb76454468af5f45825a4791b28d2
                  • Instruction ID: 056a53f6eb826012652a196cf7e54513a3ecd194253f0fd0fb275022e7dc017c
                  • Opcode Fuzzy Hash: a925d82caccf552e4dd3a2d18f496fe9ecafb76454468af5f45825a4791b28d2
                  • Instruction Fuzzy Hash: 9142D475D006298BDB64DF69C850AD9F7B2BF89300F1486EAD40DA7355EB30AE85CF80

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2160 2b50e52-2b50e59 2161 2b50e13-2b50e31 2160->2161 2162 2b50e5b-2b50ed7 2160->2162 2167 2b50e33-2b50e39 2161->2167 2168 2b50e3a-2b50e3c 2161->2168 2165 2b50ede-2b50ef6 2162->2165 2166 2b50ed9 2162->2166 2171 2b50efc-2b5105e 2165->2171 2172 2b5143f-2b51458 2165->2172 2166->2165 2281 2b50e41 call 2b50e60 2168->2281 2282 2b50e41 call 2b50e52 2168->2282 2283 2b50e41 call 2b50f0e 2168->2283 2284 2b50e41 call 2b50e9a 2168->2284 2170 2b50e47-2b50e4a 2229 2b51060-2b51096 2171->2229 2230 2b51098-2b5109a 2171->2230 2175 2b514e0-2b51527 2172->2175 2176 2b5145e-2b51480 2172->2176 2187 2b51539-2b51541 2175->2187 2188 2b51529-2b51534 2175->2188 2181 2b51725 2176->2181 2182 2b51486-2b5148e 2176->2182 2185 2b5172a-2b51733 2181->2185 2182->2181 2184 2b51494-2b514ab 2182->2184 2184->2181 2189 2b514b1-2b514db call 2b50170 2184->2189 2190 2b51735 2185->2190 2191 2b51740 2185->2191 2193 2b51566 2187->2193 2194 2b51543-2b51564 2187->2194 2192 2b515dc-2b51626 2188->2192 2189->2185 2190->2191 2200 2b51741 2191->2200 2204 2b5162c-2b5165c 2192->2204 2205 2b516bb-2b51723 2192->2205 2198 2b5156d-2b5156f 2193->2198 2194->2198 2202 2b51571-2b51579 2198->2202 2203 2b5157b-2b5159b 2198->2203 2200->2200 2202->2192 2203->2192 2208 2b5159d-2b515a6 2203->2208 2204->2181 2213 2b51662-2b51669 2204->2213 2205->2185 2208->2181 2212 2b515ac-2b515da 2208->2212 2212->2192 2212->2208 2213->2181 2214 2b5166f-2b5167b 2213->2214 2214->2181 2216 2b51681-2b5168d 2214->2216 2216->2181 2217 2b51693-2b516b9 2216->2217 2217->2185 2229->2230 2231 2b510a0-2b510aa 2230->2231 2232 2b5109c-2b5109e 2230->2232 2234 2b510ac-2b510c2 2231->2234 2232->2234 2236 2b510c4-2b510c6 2234->2236 2237 2b510c8-2b510d0 2234->2237 2239 2b510d2-2b510d7 2236->2239 2237->2239 2240 2b510ee-2b5111c 2239->2240 2241 2b510d9-2b510e8 2239->2241 2245 2b51153-2b5115d 2240->2245 2246 2b5111e-2b5112b 2240->2246 2241->2240 2247 2b51166-2b511ec 2245->2247 2248 2b5115f 2245->2248 2246->2245 2250 2b5112d-2b5113a 2246->2250 2260 2b5122c-2b5123a 2247->2260 2261 2b511ee-2b5122a 2247->2261 2248->2247 2254 2b51140-2b5114d 2250->2254 2255 2b5113c-2b5113e 2250->2255 2254->2245 2255->2245 2264 2b51245-2b5127e call 2b52d30 2260->2264 2261->2264 2268 2b51284-2b5134f 2264->2268 2273 2b51351-2b5137b 2268->2273 2274 2b5137d-2b51399 2268->2274 2273->2274 2277 2b513a7-2b513a8 2274->2277 2278 2b5139b 2274->2278 2277->2172 2278->2277 2281->2170 2282->2170 2283->2170 2284->2170
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRkq$\skq
                  • API String ID: 0-3259353708
                  • Opcode ID: 22dfbe1198ed0942205c37f22818fbac4204eb6b02beaf6706dfe78ca564faed
                  • Instruction ID: 8e31acc8a829d30075625b4fd53ebb440d3008af2b69231cafe525bc4885db9c
                  • Opcode Fuzzy Hash: 22dfbe1198ed0942205c37f22818fbac4204eb6b02beaf6706dfe78ca564faed
                  • Instruction Fuzzy Hash: 22E16D35A122298FDB28CF7AD940BADB7F2BF88300F15C5A9D419AB354DB349941CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2516 2b50e9a-2b50eb0 2518 2b50eb2-2b50ebc 2516->2518 2519 2b50ebd-2b50ed7 2516->2519 2520 2b50ede-2b50ef6 2519->2520 2521 2b50ed9 2519->2521 2523 2b50efc-2b5105e 2520->2523 2524 2b5143f-2b51458 2520->2524 2521->2520 2581 2b51060-2b51096 2523->2581 2582 2b51098-2b5109a 2523->2582 2527 2b514e0-2b51527 2524->2527 2528 2b5145e-2b51480 2524->2528 2539 2b51539-2b51541 2527->2539 2540 2b51529-2b51534 2527->2540 2533 2b51725 2528->2533 2534 2b51486-2b5148e 2528->2534 2537 2b5172a-2b51733 2533->2537 2534->2533 2536 2b51494-2b514ab 2534->2536 2536->2533 2541 2b514b1-2b514db call 2b50170 2536->2541 2542 2b51735 2537->2542 2543 2b51740 2537->2543 2545 2b51566 2539->2545 2546 2b51543-2b51564 2539->2546 2544 2b515dc-2b51626 2540->2544 2541->2537 2542->2543 2552 2b51741 2543->2552 2556 2b5162c-2b5165c 2544->2556 2557 2b516bb-2b51723 2544->2557 2550 2b5156d-2b5156f 2545->2550 2546->2550 2554 2b51571-2b51579 2550->2554 2555 2b5157b-2b5159b 2550->2555 2552->2552 2554->2544 2555->2544 2560 2b5159d-2b515a6 2555->2560 2556->2533 2565 2b51662-2b51669 2556->2565 2557->2537 2560->2533 2564 2b515ac-2b515da 2560->2564 2564->2544 2564->2560 2565->2533 2566 2b5166f-2b5167b 2565->2566 2566->2533 2568 2b51681-2b5168d 2566->2568 2568->2533 2569 2b51693-2b516b9 2568->2569 2569->2537 2581->2582 2583 2b510a0-2b510aa 2582->2583 2584 2b5109c-2b5109e 2582->2584 2586 2b510ac-2b510c2 2583->2586 2584->2586 2588 2b510c4-2b510c6 2586->2588 2589 2b510c8-2b510d0 2586->2589 2591 2b510d2-2b510d7 2588->2591 2589->2591 2592 2b510ee-2b5111c 2591->2592 2593 2b510d9-2b510e8 2591->2593 2597 2b51153-2b5115d 2592->2597 2598 2b5111e-2b5112b 2592->2598 2593->2592 2599 2b51166-2b511ec 2597->2599 2600 2b5115f 2597->2600 2598->2597 2602 2b5112d-2b5113a 2598->2602 2612 2b5122c-2b5123a 2599->2612 2613 2b511ee-2b5122a 2599->2613 2600->2599 2606 2b51140-2b5114d 2602->2606 2607 2b5113c-2b5113e 2602->2607 2606->2597 2607->2597 2616 2b51245-2b5127e call 2b52d30 2612->2616 2613->2616 2620 2b51284-2b5134f 2616->2620 2625 2b51351-2b5137b 2620->2625 2626 2b5137d-2b51399 2620->2626 2625->2626 2629 2b513a7-2b513a8 2626->2629 2630 2b5139b 2626->2630 2629->2524 2630->2629
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRkq$\skq
                  • API String ID: 0-3259353708
                  • Opcode ID: 3c3375399c1f6a3e5d216676e131c532a240c1478ba549243d48105d346a0f0a
                  • Instruction ID: e0a295cdfa3ccb6ffb541e5eb83bca0c2e799193dce52ae757df886a598df2b2
                  • Opcode Fuzzy Hash: 3c3375399c1f6a3e5d216676e131c532a240c1478ba549243d48105d346a0f0a
                  • Instruction Fuzzy Hash: 17D16D35A122298FDB18DF7AD940BADB7F2BF88300F15C5A9D419AB358DB309941CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2634 2b50f0e-2b5105e 2652 2b51060-2b51096 2634->2652 2653 2b51098-2b5109a 2634->2653 2652->2653 2654 2b510a0-2b510aa 2653->2654 2655 2b5109c-2b5109e 2653->2655 2657 2b510ac-2b510c2 2654->2657 2655->2657 2659 2b510c4-2b510c6 2657->2659 2660 2b510c8-2b510d0 2657->2660 2662 2b510d2-2b510d7 2659->2662 2660->2662 2663 2b510ee-2b5111c 2662->2663 2664 2b510d9-2b510e8 2662->2664 2668 2b51153-2b5115d 2663->2668 2669 2b5111e-2b5112b 2663->2669 2664->2663 2670 2b51166-2b511ec 2668->2670 2671 2b5115f 2668->2671 2669->2668 2673 2b5112d-2b5113a 2669->2673 2683 2b5122c-2b5123a 2670->2683 2684 2b511ee-2b5122a 2670->2684 2671->2670 2677 2b51140-2b5114d 2673->2677 2678 2b5113c-2b5113e 2673->2678 2677->2668 2678->2668 2687 2b51245-2b5127e call 2b52d30 2683->2687 2684->2687 2691 2b51284-2b5134f 2687->2691 2696 2b51351-2b5137b 2691->2696 2697 2b5137d-2b51399 2691->2697 2696->2697 2700 2b513a7-2b51458 2697->2700 2701 2b5139b 2697->2701 2706 2b514e0-2b51527 2700->2706 2707 2b5145e-2b51480 2700->2707 2701->2700 2715 2b51539-2b51541 2706->2715 2716 2b51529-2b51534 2706->2716 2710 2b51725 2707->2710 2711 2b51486-2b5148e 2707->2711 2714 2b5172a-2b51733 2710->2714 2711->2710 2713 2b51494-2b514ab 2711->2713 2713->2710 2717 2b514b1-2b514db call 2b50170 2713->2717 2718 2b51735 2714->2718 2719 2b51740 2714->2719 2721 2b51566 2715->2721 2722 2b51543-2b51564 2715->2722 2720 2b515dc-2b51626 2716->2720 2717->2714 2718->2719 2727 2b51741 2719->2727 2731 2b5162c-2b5165c 2720->2731 2732 2b516bb-2b51723 2720->2732 2725 2b5156d-2b5156f 2721->2725 2722->2725 2729 2b51571-2b51579 2725->2729 2730 2b5157b-2b5159b 2725->2730 2727->2727 2729->2720 2730->2720 2734 2b5159d-2b515a6 2730->2734 2731->2710 2738 2b51662-2b51669 2731->2738 2732->2714 2734->2710 2737 2b515ac-2b515da 2734->2737 2737->2720 2737->2734 2738->2710 2739 2b5166f-2b5167b 2738->2739 2739->2710 2740 2b51681-2b5168d 2739->2740 2740->2710 2741 2b51693-2b516b9 2740->2741 2741->2714
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRkq$\skq
                  • API String ID: 0-3259353708
                  • Opcode ID: 38b123d1c2281b392299d1989f633f70e0caf52d036ac5bb82a616c15794f1ac
                  • Instruction ID: 9193bf7a38c808808cc2a4f847efcd91452348dfa5939bac6a1138360655fb14
                  • Opcode Fuzzy Hash: 38b123d1c2281b392299d1989f633f70e0caf52d036ac5bb82a616c15794f1ac
                  • Instruction Fuzzy Hash: 40C15C35A126298FDB18CF7AD940AAEB7F2BFC8300F15C669D415AB358DB349941CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$4'kq
                  • API String ID: 0-4171853269
                  • Opcode ID: f03199a267d422ad814cd2409b0df6855c68897d805720e16f8c0d2c9478c0a5
                  • Instruction ID: 76fed06f4c8f7f33e5dc124ab81debb017d7bb2155dcd4ac51118f703155d220
                  • Opcode Fuzzy Hash: f03199a267d422ad814cd2409b0df6855c68897d805720e16f8c0d2c9478c0a5
                  • Instruction Fuzzy Hash: 4571F9B5E026498FDB18EF6AE94069EBBF3BBC9304F14C139D0199B368DB345846CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$4'kq
                  • API String ID: 0-4171853269
                  • Opcode ID: 7a4bedf0949c552651281ee7860cea8c58fc7a4dcdeff1d60ae349929c74b5ac
                  • Instruction ID: 1053e7dcb5f2166089f0f1db3605e39060ae8ea2d09304ce09f72d2457db9d9c
                  • Opcode Fuzzy Hash: 7a4bedf0949c552651281ee7860cea8c58fc7a4dcdeff1d60ae349929c74b5ac
                  • Instruction Fuzzy Hash: 5171E9B5E026498FDB18EF6AE94069ABBF3BBC9304F14C139D0199B368EB745845CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: fpq$h
                  • API String ID: 0-747736143
                  • Opcode ID: 741ab280b31ab098a51682ccd9823dae4c274c4ad32d3ba091de7aa066a8cdb0
                  • Instruction ID: edaeb72c15e867128337110d42571c7c8df12cc8cb0b15fc0dad2027d0c9018b
                  • Opcode Fuzzy Hash: 741ab280b31ab098a51682ccd9823dae4c274c4ad32d3ba091de7aa066a8cdb0
                  • Instruction Fuzzy Hash: E961D771D046298BDB68CF6ACD50BD9FBB2BF89300F54C1AAD40DA7254DB305A85CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 2
                  • API String ID: 0-450215437
                  • Opcode ID: a8c8dfba6be769968c282c307d16325a7e1ef6c55d43b8e25261148747623cad
                  • Instruction ID: 03516705f82e8e4731aca72c74fd9f46f7d09b9c77eae0abae51abc0baf2fb64
                  • Opcode Fuzzy Hash: a8c8dfba6be769968c282c307d16325a7e1ef6c55d43b8e25261148747623cad
                  • Instruction Fuzzy Hash: B9C2B5B4E012298FCB65DF68D984B99BBB6FF89304F1081E9D509AB355DB309E85CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq
                  • API String ID: 0-3175707579
                  • Opcode ID: 6755c763802cef32d299eb7fd514c15933c9c8bb717df3539b048965eda0efa4
                  • Instruction ID: 90a136c43a71c7a18fe0af623b2bcb3d8c34242e73816693df00f80b6125ea2f
                  • Opcode Fuzzy Hash: 6755c763802cef32d299eb7fd514c15933c9c8bb717df3539b048965eda0efa4
                  • Instruction Fuzzy Hash: 9762AA75B046298FCB19DF69C494A6EBBF2FF88300F248969E456D7384DB34E901CB91
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 059507BD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 997e3ef1c6300dac33d655157af4409be007baf401712a5605700e91c15f76a7
                  • Instruction ID: d755c6b010c6c87cc2e10900fc6740f46a56b48585235160a6f5bd54180fd482
                  • Opcode Fuzzy Hash: 997e3ef1c6300dac33d655157af4409be007baf401712a5605700e91c15f76a7
                  • Instruction Fuzzy Hash: 2241B8B9D00258DFCF10CFA9D984ADEFBB1BB09320F10942AE818B7210D735A941CF98
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 059507BD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 1b0d1e664d66682fbc106b75c0a07ee503655904e770cd48f63ac0785363c7f2
                  • Instruction ID: 76313a08d8402c577e769e865deeee9898ac1e05920481cf9a88b26622e3214c
                  • Opcode Fuzzy Hash: 1b0d1e664d66682fbc106b75c0a07ee503655904e770cd48f63ac0785363c7f2
                  • Instruction Fuzzy Hash: 414199B9D00258DFCF10CFA9D984ADEFBB5BB49320F10942AE815B7210D735A945CF58
                  APIs
                  • NtResumeThread.NTDLL(?,?), ref: 05951C46
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: a6a0f4e890cb2fad2a643febac445ddd2b689e9db9943c39f8e1f16e1c9961b5
                  • Instruction ID: 2dac91bc468b8cfa6b47d565921e7a070dace89df1d4af75175c762aed6666d3
                  • Opcode Fuzzy Hash: a6a0f4e890cb2fad2a643febac445ddd2b689e9db9943c39f8e1f16e1c9961b5
                  • Instruction Fuzzy Hash: F231DBB4D012189FCB10CFA9D980AAEFBF5BB49320F10842AE854B7200C735A945CF94
                  APIs
                  • NtResumeThread.NTDLL(?,?), ref: 05951C46
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 0e36126e3015b6fd55d36ad383f89d5469b400492fbb9486c5ca958af6652f58
                  • Instruction ID: 07625eccd19937bc9e812ef26cc5c3a64fa4dedace031fb36782e57a759cb138
                  • Opcode Fuzzy Hash: 0e36126e3015b6fd55d36ad383f89d5469b400492fbb9486c5ca958af6652f58
                  • Instruction Fuzzy Hash: 6131A7B4D012189FCB10CFAAD984A9EFBF5BB49320F20942AE859B7210D775A945CF94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: PHkq
                  • API String ID: 0-902561536
                  • Opcode ID: 63bcd122f2e195f1441986a588506f07bb22175518645dff026b45e18f50ca72
                  • Instruction ID: 61460cb01b2119469c11a4586e182f19a30716b767c4d752d1408314848e1f76
                  • Opcode Fuzzy Hash: 63bcd122f2e195f1441986a588506f07bb22175518645dff026b45e18f50ca72
                  • Instruction Fuzzy Hash: 31C12474D05328CFDB24CFA9D884BADBBF6BF89304F2494AAD009A7259DB745981CF41
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: PHkq
                  • API String ID: 0-902561536
                  • Opcode ID: a50121e963ebde3800a293d6f4ccd966d79f8c159875afee28087adf4ab347d9
                  • Instruction ID: 91f6c04facae2630258f6ca9048db2d0c4bdc72df16230d7f7a0bbc278096105
                  • Opcode Fuzzy Hash: a50121e963ebde3800a293d6f4ccd966d79f8c159875afee28087adf4ab347d9
                  • Instruction Fuzzy Hash: CCC10474D05329CFDB24CFA9D884BADBBF2BF89304F2484AAD409A7259DB745985CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tekq
                  • API String ID: 0-2319236580
                  • Opcode ID: 771fd5a7e5e2ef1091cd713a98c3cab326a4c726e8f7d49e0810e3587838776e
                  • Instruction ID: 3c46aaa8e987bf969683b61110cdf22bd77869d852ccbd7e9636d49c0dfc817b
                  • Opcode Fuzzy Hash: 771fd5a7e5e2ef1091cd713a98c3cab326a4c726e8f7d49e0810e3587838776e
                  • Instruction Fuzzy Hash: 46B12770E05218CFEB54CFA9D884BDDBBF6BF49304F1080AAE519AB255DBB45984DF01
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tekq
                  • API String ID: 0-2319236580
                  • Opcode ID: 36712c25fdef6ab1dc89f95d5b9162a14a8f30561290815126310f9aa224ecc2
                  • Instruction ID: bf26ce202bef2e906dbfa9021c576506612df45cb17a3126c7690b1e17134b2d
                  • Opcode Fuzzy Hash: 36712c25fdef6ab1dc89f95d5b9162a14a8f30561290815126310f9aa224ecc2
                  • Instruction Fuzzy Hash: A1B10674E01218CFEB64CFA9D884BDDBBF2BF49304F1480AAE519A7255DBB45984DF01
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: \skq
                  • API String ID: 0-1461930697
                  • Opcode ID: 54ebf28e9d7421468a114a72ccffa84e12c0c19a70f96dcc7077607bdfa5e4d2
                  • Instruction ID: 8c183ebf9795317d60d408e387ad489333b97075fd18905d25af89b1243d1cbc
                  • Opcode Fuzzy Hash: 54ebf28e9d7421468a114a72ccffa84e12c0c19a70f96dcc7077607bdfa5e4d2
                  • Instruction Fuzzy Hash: 308109B8E4011E9FDF14DFAAD584AAEBBB1FF4C304F10A665D412EB294DB31A941CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e5da7f20bfff4b3b07851843e286747b350e6e5917a273e9884c7147ecc55696
                  • Instruction ID: cb78fd0b11e2d8b2953c79a932b82a0c8efe14a934fe1aa66a5bcd9706b91019
                  • Opcode Fuzzy Hash: e5da7f20bfff4b3b07851843e286747b350e6e5917a273e9884c7147ecc55696
                  • Instruction Fuzzy Hash: 3332B474A10229CFCB65DF28D984B99BBB6FB48304F5081E9D90DAB355DB30AE81CF44
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b14676bd9f3ff5662d9f7f1fa3e98ccb86752984f9bc5f665fc1f2ca6b48d95d
                  • Instruction ID: 25617490ac054b7554391be819c8950d49dd915a0f04d70eff20c7989f8de88f
                  • Opcode Fuzzy Hash: b14676bd9f3ff5662d9f7f1fa3e98ccb86752984f9bc5f665fc1f2ca6b48d95d
                  • Instruction Fuzzy Hash: 8AC1F474E05218CFDB54DF69E984BADBBF6FB89314F1080AAD809A7355DB306A85CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7a23477141961880875319fb07609c41b807a804b57e56dcf9c27ec87a2e43eb
                  • Instruction ID: 8aad16c6b3faf2e99092985c4b3033709d1851c47b67be0767c784327c10b644
                  • Opcode Fuzzy Hash: 7a23477141961880875319fb07609c41b807a804b57e56dcf9c27ec87a2e43eb
                  • Instruction Fuzzy Hash: A2C1E474E05218CFDB54DF69E984BADBBB2FF89314F2080AAD819A7355DB305A85CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e557136a6e194a37c7f9f29f1806bf686234035717993a522908f397dd06b76a
                  • Instruction ID: 84deaecf2061a77e24c35a80dd76f95a0ab4c0926709278e6c42783be371a565
                  • Opcode Fuzzy Hash: e557136a6e194a37c7f9f29f1806bf686234035717993a522908f397dd06b76a
                  • Instruction Fuzzy Hash: 1CC1D474E05218CFDB54DF69E984BADBBF2FB49314F1090AAD809A7354DB306A95CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c69a74b9709d2f9e4f8f943813d2b6c7bc33e135c3b291a79d9f9a6ebdbc860
                  • Instruction ID: 310914cf39610d2654ce2506c360ff8775ef3e62adb9f3e78bab74747d21e387
                  • Opcode Fuzzy Hash: 3c69a74b9709d2f9e4f8f943813d2b6c7bc33e135c3b291a79d9f9a6ebdbc860
                  • Instruction Fuzzy Hash: CD814136F116259FC754DB69D880B9EB7E3AFC8710F1981A5E805DB369DB34DC018B90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62a9f0ae8c5ad493b49a792d5e7bffb4c766913774bdd2e8eb56b3228c5662e1
                  • Instruction ID: c0ccebb488d439306aa8a571e2d58e235460f775586b71aea11dbcc8fe6dd9b2
                  • Opcode Fuzzy Hash: 62a9f0ae8c5ad493b49a792d5e7bffb4c766913774bdd2e8eb56b3228c5662e1
                  • Instruction Fuzzy Hash: FAA10774905218CFEB64DF29D894BEDB7B6BB4A314F1084E9D80DA7250DB309E90CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 287dcc867884d86faf6e2c6cd8fca453e946d730dd9a6b6d29b0702aac1d19a1
                  • Instruction ID: 36577b944083daa9cfe9dea4b02a0a819e41da4a7d55009c3f683f00b0522c2f
                  • Opcode Fuzzy Hash: 287dcc867884d86faf6e2c6cd8fca453e946d730dd9a6b6d29b0702aac1d19a1
                  • Instruction Fuzzy Hash: 7B81E375D06208CFDB18CFA9D4857ADBBF6BF89314F24902AD40AA7254DB345996CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1e80cbb4c62555f712427616e0d9cffff6db62575a5a14ab369749bab5dd145
                  • Instruction ID: d4bad4d0979da23296a9079b844a07f22985638b46601a316c41b8dd11f89c57
                  • Opcode Fuzzy Hash: d1e80cbb4c62555f712427616e0d9cffff6db62575a5a14ab369749bab5dd145
                  • Instruction Fuzzy Hash: B181E275D06208CFDB18CFA9D4857ADBBF7BF89324F24902AD80AA7254DB345996CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a5be22a87d3d72f4976b7783f127744fa6b60094b2bd94500b787f3acb1d886d
                  • Instruction ID: bbc36f93e0f36810b323704044cc6bd8e77f5b879c487ca5c9f4166bfa28cb2e
                  • Opcode Fuzzy Hash: a5be22a87d3d72f4976b7783f127744fa6b60094b2bd94500b787f3acb1d886d
                  • Instruction Fuzzy Hash: 1D81F375E05228CFDB64CF6AD854BEDBBF2BF89300F1080AAD409AB259DB705985CF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0925a5a4ad2a536ebea879782744f1bf86b53c51a0efbd7c4cfcda089d43d8a9
                  • Instruction ID: ccb488304b828c233aa3d8581cad432aca34645b29a9e1d3c08c29ff43d13d60
                  • Opcode Fuzzy Hash: 0925a5a4ad2a536ebea879782744f1bf86b53c51a0efbd7c4cfcda089d43d8a9
                  • Instruction Fuzzy Hash: 8781D575E05228CFDB64CF6AD944BADBBF2BF89300F1081AAD409A7258DB705985CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 605b792ca602f4090d252d632d14207576b9cda6623f7babe4c604e0807c8d32
                  • Instruction ID: b7125c3b0b3bd6700d60f20f8aad6f862327677b87784aec4c3fd88536cd48fb
                  • Opcode Fuzzy Hash: 605b792ca602f4090d252d632d14207576b9cda6623f7babe4c604e0807c8d32
                  • Instruction Fuzzy Hash: 2C31E3B0D45618CBEB18CFAAD4427AEFBF6EB88304F24C06AC408A7259DB704586CF41

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 646 591a1d0-591a21c 651 591a222-591a234 646->651 652 591a39a-591a406 646->652 655 591a284-591a2cd 651->655 656 591a236-591a282 651->656 664 591a655-591a65c 652->664 665 591a40c-591a415 652->665 684 591a2d0-591a2e4 655->684 656->684 668 591a417-591a41b 665->668 669 591a48b-591a4a4 665->669 670 591a434-591a440 668->670 671 591a41d-591a432 668->671 682 591a5d1-591a5e1 669->682 683 591a4aa 669->683 675 591a449-591a486 670->675 671->675 675->664 692 591a5e3-591a5f8 682->692 693 591a5fa-591a606 682->693 685 591a4b1-591a4f4 683->685 686 591a541-591a584 683->686 687 591a4f9-591a53c 683->687 688 591a589-591a5cc 683->688 691 591a2ef-591a310 684->691 685->664 686->664 687->664 688->664 702 591a312-591a318 691->702 703 591a31a-591a324 691->703 697 591a60f-591a650 692->697 693->697 697->664 704 591a327-591a36a 702->704 703->704 711 591a390-591a397 704->711 712 591a36c-591a388 704->712 712->711
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$4'kq$4'kq$4'kq$4'kq$poq
                  • API String ID: 0-755401861
                  • Opcode ID: 204165b814d50099ff22ccd0fa5d8a18354c1ea4ede59169b04c67fb78789edb
                  • Instruction ID: 69e5d4a2f6e7b48769339262eb5dc683470427bc40f5106ea9f275e12cfb50d3
                  • Opcode Fuzzy Hash: 204165b814d50099ff22ccd0fa5d8a18354c1ea4ede59169b04c67fb78789edb
                  • Instruction Fuzzy Hash: 6FD16F36900118DFCB09DFA4C944E9ABBB2FF48310F0584A8E509AB276D732ED56DF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1723594067.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5750000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$4'kq$y
                  • API String ID: 0-1453649623
                  • Opcode ID: ee90d7023d0272b79e859e977fdb801a050f292e85bff01b1d56dda138dc32d2
                  • Instruction ID: 0e59834da75e9c3122e8531a8e4b2fd0d4bafb524e96c097c751ec8d588375ad
                  • Opcode Fuzzy Hash: ee90d7023d0272b79e859e977fdb801a050f292e85bff01b1d56dda138dc32d2
                  • Instruction Fuzzy Hash: 5792A170E09349DFCB16CBA4D858BADBFB2BF46311F5480AAE841AB291C7B45C41DF61

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1189 5918f08-5918f30 1193 5918f32-5918f79 1189->1193 1194 5918f7e-5918f8c 1189->1194 1244 59193d5-59193dc 1193->1244 1195 5918f9b 1194->1195 1196 5918f8e-5918f99 call 5916a28 1194->1196 1197 5918f9d-5918fa4 1195->1197 1196->1197 1200 5918faa-5918fae 1197->1200 1201 591908d-5919091 1197->1201 1203 5918fb4-5918fb8 1200->1203 1204 59193dd-5919405 1200->1204 1206 5919093-59190a2 call 5914c28 1201->1206 1207 59190e7-59190f1 1201->1207 1208 5918fca-5919028 call 5916768 call 59171d0 1203->1208 1209 5918fba-5918fc4 1203->1209 1214 591940c-5919436 1204->1214 1222 59190a6-59190ab 1206->1222 1210 59190f3-5919102 call 59142b8 1207->1210 1211 591912a-5919150 1207->1211 1253 591949b-59194b2 1208->1253 1254 591902e-5919088 1208->1254 1209->1208 1209->1214 1226 5919108-5919125 1210->1226 1227 591943e-5919454 1210->1227 1234 5919152-591915b 1211->1234 1235 591915d 1211->1235 1214->1227 1228 59190a4 1222->1228 1229 59190ad-59190e2 call 59189d0 1222->1229 1226->1244 1251 591945c-5919494 1227->1251 1228->1222 1229->1244 1242 591915f-5919187 1234->1242 1235->1242 1259 5919258-591925c 1242->1259 1260 591918d-59191a6 1242->1260 1251->1253 1265 59194b4-59194b8 1253->1265 1266 59194b9-59194c5 1253->1266 1254->1244 1262 59192d6-59192e0 1259->1262 1263 591925e-5919277 1259->1263 1260->1259 1284 59191ac-59191bb call 5913ce0 1260->1284 1268 59192e2-59192ec 1262->1268 1269 591933d-5919346 1262->1269 1263->1262 1293 5919279-5919288 call 5913ce0 1263->1293 1265->1266 1273 59194c7-59194cd 1266->1273 1274 59194cf-59194d5 1266->1274 1282 59192f2-5919304 1268->1282 1283 59192ee-59192f0 1268->1283 1271 5919348-5919376 call 5915f60 call 5915f80 1269->1271 1272 591937e-59193cb 1269->1272 1271->1272 1299 59193d3 1272->1299 1273->1274 1278 59194d6-5919513 1273->1278 1288 5919306-5919308 1282->1288 1283->1288 1301 59191d3-59191e8 1284->1301 1302 59191bd-59191c3 1284->1302 1297 5919336-591933b 1288->1297 1298 591930a-591930e 1288->1298 1309 59192a0-59192ab 1293->1309 1310 591928a-5919290 1293->1310 1297->1268 1297->1269 1304 5919310-5919329 1298->1304 1305 591932c-5919331 call 5912ae0 1298->1305 1299->1244 1315 59191ea-5919216 call 59150b0 1301->1315 1316 591921c-5919225 1301->1316 1311 59191c5 1302->1311 1312 59191c7-59191c9 1302->1312 1304->1305 1305->1297 1309->1253 1321 59192b1-59192d4 1309->1321 1319 5919292 1310->1319 1320 5919294-5919296 1310->1320 1311->1301 1312->1301 1315->1251 1315->1316 1316->1253 1318 591922b-5919252 1316->1318 1318->1259 1318->1284 1319->1309 1320->1309 1321->1262 1321->1293
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Hoq$Hoq$Hoq
                  • API String ID: 0-3310881576
                  • Opcode ID: b52bca397b6ff4c17de6d4bc983197c4e7466cd0c502c39122e4e8a929683f81
                  • Instruction ID: 02522fca9f0bb5c35c08695889a223b1bc5cdc786b82e73bd6f67d5c9d8c1d2d
                  • Opcode Fuzzy Hash: b52bca397b6ff4c17de6d4bc983197c4e7466cd0c502c39122e4e8a929683f81
                  • Instruction Fuzzy Hash: 28127F31A002199FCB28DFA5D494A6EBBF6FF88300F54852DE8069B395DB31EC46CB54

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1472 591abc8-591ac05 1475 591ac27-591ac3d call 591a9d0 1472->1475 1476 591ac07-591ac0a 1472->1476 1482 591afb3-591afc7 1475->1482 1483 591ac43-591ac4f 1475->1483 1589 591ac0c call 591b4d1 1476->1589 1590 591ac0c call 591b4e0 1476->1590 1591 591ac0c call 591b538 1476->1591 1478 591ac12-591ac14 1478->1475 1480 591ac16-591ac1e 1478->1480 1480->1475 1492 591b007-591b010 1482->1492 1484 591ad80-591ad87 1483->1484 1485 591ac55-591ac58 1483->1485 1486 591aeb6-591aef0 call 591a3d8 1484->1486 1487 591ad8d-591ad96 1484->1487 1489 591ac5b-591ac64 1485->1489 1587 591aef3 call 591d370 1486->1587 1588 591aef3 call 591d360 1486->1588 1487->1486 1491 591ad9c-591aea8 call 591a3d8 call 591a968 call 591a3d8 1487->1491 1493 591b0a8 1489->1493 1494 591ac6a-591ac7e 1489->1494 1584 591aeb3-591aeb4 1491->1584 1585 591aeaa 1491->1585 1497 591b012-591b019 1492->1497 1498 591afd5-591afde 1492->1498 1496 591b0ad-591b0b1 1493->1496 1506 591ad70-591ad7a 1494->1506 1507 591ac84-591ad19 call 591a9d0 * 2 call 591a3d8 call 591a968 call 591aa10 call 591aab8 call 591ab20 1494->1507 1503 591b0b3 1496->1503 1504 591b0bc 1496->1504 1501 591b067-591b06e 1497->1501 1502 591b01b-591b05e call 591a3d8 1497->1502 1498->1493 1500 591afe4-591aff6 1498->1500 1519 591b006 1500->1519 1520 591aff8-591affd 1500->1520 1509 591b070-591b080 1501->1509 1510 591b093-591b0a6 1501->1510 1502->1501 1503->1504 1513 591b0bd 1504->1513 1506->1484 1506->1489 1563 591ad38-591ad6b call 591ab20 1507->1563 1564 591ad1b-591ad33 call 591aab8 call 591a3d8 call 591a688 1507->1564 1509->1510 1524 591b082-591b08a 1509->1524 1510->1496 1513->1513 1519->1492 1592 591b000 call 591db10 1520->1592 1593 591b000 call 591db00 1520->1593 1524->1510 1532 591aef9-591afaa call 591a3d8 1532->1482 1563->1506 1564->1563 1584->1486 1585->1584 1587->1532 1588->1532 1589->1478 1590->1478 1591->1478 1592->1519 1593->1519
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$4'kq$4'kq
                  • API String ID: 0-2478202913
                  • Opcode ID: 3bb5769a4f381175e679e5af752ea6931a059a484eeb689a35d6ea5a5318272a
                  • Instruction ID: e002fa6aebcd284c52bdc870a6ac907775ed8e8c4a77b7e9147852d0abeaf8a2
                  • Opcode Fuzzy Hash: 3bb5769a4f381175e679e5af752ea6931a059a484eeb689a35d6ea5a5318272a
                  • Instruction Fuzzy Hash: C7F1DD34B11218DFCB08DFA4D598A9DBBB2FF89300F158559E806AB365DB71EC42CB94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1594 5916fe8-5916ff5 1595 5917070-5917072 1594->1595 1596 5916ff7-5917020 1594->1596 1597 5917073-5917077 1595->1597 1601 5917026-591702a 1596->1601 1602 591710c-5917131 1596->1602 1598 59170a3-59170bc call 5913c18 1597->1598 1599 5917078-5917092 1597->1599 1614 59170e5-5917109 1598->1614 1615 59170be-59170e2 1598->1615 1599->1598 1616 5917094-5917097 1599->1616 1605 591702c-5917038 1601->1605 1606 591703e-5917042 1601->1606 1617 5917138-591715c 1602->1617 1605->1606 1605->1617 1608 5917163-5917188 1606->1608 1609 5917048-591705f 1606->1609 1633 591718f-59171cd 1608->1633 1609->1597 1628 5917061-591706d 1609->1628 1626 59170a0 1616->1626 1617->1608 1626->1598 1628->1595 1628->1633 1639 5917248 1633->1639 1640 59171cf-59171e2 1633->1640 1641 59172b9 1639->1641 1642 591724a 1639->1642 1643 59171e4-5917204 1640->1643 1644 591721a-5917237 1640->1644 1645 5917234-5917237 1642->1645 1646 591724b-591724c 1642->1646 1655 5917246 1643->1655 1658 5917206 1643->1658 1650 591723f 1644->1650 1645->1650 1651 591720c-5917217 1646->1651 1652 591724e-5917283 1646->1652 1650->1655 1652->1641 1655->1639 1658->1651
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$(oq$(oq
                  • API String ID: 0-3965398577
                  • Opcode ID: a83a23987a5394ca9bf86cf880050b80367c71c0a66fa6e47d8f02d2049b7517
                  • Instruction ID: e27a688f49ae848beb20d6e60e206f76c221673c84ff3920e26341abb535d9fd
                  • Opcode Fuzzy Hash: a83a23987a5394ca9bf86cf880050b80367c71c0a66fa6e47d8f02d2049b7517
                  • Instruction Fuzzy Hash: C471F3323042198FCB059F78D8546AE7FA6FF94340B1585A9E805CB396CF34DC42CB95
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1723594067.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5750000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$y
                  • API String ID: 0-1022184791
                  • Opcode ID: fd9d709ff8ddbe5f1f8608c8eb2c2de64107b35e0112df584d0320ed19fe221c
                  • Instruction ID: c28ff86c4cba133b572af1a9c9c6f5733532e4a77b99ec27e4be0c13cd3a4120
                  • Opcode Fuzzy Hash: fd9d709ff8ddbe5f1f8608c8eb2c2de64107b35e0112df584d0320ed19fe221c
                  • Instruction Fuzzy Hash: 8202607090E3C5AFD7179B789C69B9A7FB4AF03314F1980DAE5809B1E3C6B85844D722

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2286 57518c0-57518e8 2287 57518ef-5751918 2286->2287 2288 57518ea 2286->2288 2289 5751939 2287->2289 2290 575191a-5751923 2287->2290 2288->2287 2293 575193c-5751940 2289->2293 2291 5751925-5751928 2290->2291 2292 575192a-575192d 2290->2292 2294 5751937 2291->2294 2292->2294 2295 5751cf7-5751d0e 2293->2295 2294->2293 2297 5751945-5751949 2295->2297 2298 5751d14-5751d18 2295->2298 2301 575194e-5751952 2297->2301 2302 575194b-57519a8 2297->2302 2299 5751d4d-5751d51 2298->2299 2300 5751d1a-5751d4a 2298->2300 2306 5751d53-5751d5c 2299->2306 2307 5751d72 2299->2307 2300->2299 2304 5751954-5751978 2301->2304 2305 575197b-575199f 2301->2305 2310 57519ad-57519b1 2302->2310 2311 57519aa-5751a1b 2302->2311 2304->2305 2305->2295 2312 5751d63-5751d66 2306->2312 2313 5751d5e-5751d61 2306->2313 2308 5751d75-5751d7b 2307->2308 2316 57519b3-57519d7 2310->2316 2317 57519da-57519eb 2310->2317 2321 5751a20-5751a24 2311->2321 2322 5751a1d-5751a7a 2311->2322 2319 5751d70 2312->2319 2313->2319 2316->2317 2411 57519ee call 5923bd8 2317->2411 2412 57519ee call 5923bc8 2317->2412 2319->2308 2326 5751a26-5751a4a 2321->2326 2327 5751a4d-5751a71 2321->2327 2330 5751a7c-5751ad8 2322->2330 2331 5751a7f-5751a83 2322->2331 2326->2327 2327->2295 2343 5751add-5751ae1 2330->2343 2344 5751ada-5751b3c 2330->2344 2336 5751a85-5751aa9 2331->2336 2337 5751aac-5751ac6 2331->2337 2333 57519f4-5751a01 2341 5751a11-5751a12 2333->2341 2342 5751a03-5751a09 2333->2342 2336->2337 2357 5751ace-5751acf 2337->2357 2341->2295 2342->2341 2348 5751ae3-5751b07 2343->2348 2349 5751b0a-5751b22 2343->2349 2353 5751b41-5751b45 2344->2353 2354 5751b3e-5751ba0 2344->2354 2348->2349 2363 5751b24-5751b2a 2349->2363 2364 5751b32-5751b33 2349->2364 2359 5751b47-5751b6b 2353->2359 2360 5751b6e-5751b86 2353->2360 2365 5751ba5-5751ba9 2354->2365 2366 5751ba2-5751c04 2354->2366 2357->2295 2359->2360 2374 5751b96-5751b97 2360->2374 2375 5751b88-5751b8e 2360->2375 2363->2364 2364->2295 2369 5751bd2-5751bea 2365->2369 2370 5751bab-5751bcf 2365->2370 2376 5751c06-5751c68 2366->2376 2377 5751c09-5751c0d 2366->2377 2385 5751bec-5751bf2 2369->2385 2386 5751bfa-5751bfb 2369->2386 2370->2369 2374->2295 2375->2374 2387 5751c6d-5751c71 2376->2387 2388 5751c6a-5751cc3 2376->2388 2380 5751c36-5751c4e 2377->2380 2381 5751c0f-5751c33 2377->2381 2396 5751c50-5751c56 2380->2396 2397 5751c5e-5751c5f 2380->2397 2381->2380 2385->2386 2386->2295 2391 5751c73-5751c97 2387->2391 2392 5751c9a-5751cbd 2387->2392 2398 5751cc5-5751ce9 2388->2398 2399 5751cec-5751cef 2388->2399 2391->2392 2392->2295 2396->2397 2397->2295 2398->2399 2399->2295 2411->2333 2412->2333
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1723594067.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5750000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$4'kq
                  • API String ID: 0-4171853269
                  • Opcode ID: ef62b4cd4d23aadea11572fcce51641a8687c75aff39979e954fc717838dd995
                  • Instruction ID: d7d90a6f777a95a399b872fa4f4d7203838bc3b6c7e97af3beccf8a477cd17a2
                  • Opcode Fuzzy Hash: ef62b4cd4d23aadea11572fcce51641a8687c75aff39979e954fc717838dd995
                  • Instruction Fuzzy Hash: DEF1F934D01218EFCF18EFA4E4986ACBBB2FF89316F508529E806A7350DB755986DF50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2413 59185b8-59185ca 2414 59185f4-59185f8 2413->2414 2415 59185cc-59185ed 2413->2415 2416 5918604-5918613 2414->2416 2417 59185fa-59185fc 2414->2417 2415->2414 2418 5918615 2416->2418 2419 591861f-591864b 2416->2419 2417->2416 2418->2419 2423 5918651-5918657 2419->2423 2424 5918878-5918880 2419->2424 2425 5918729-591872d 2423->2425 2426 591865d-5918663 2423->2426 2437 5918872-5918875 2424->2437 2438 5918882 2424->2438 2428 5918750-5918759 2425->2428 2429 591872f-5918738 2425->2429 2426->2424 2430 5918669-5918676 2426->2430 2433 591875b-591877b 2428->2433 2434 591877e-5918781 2428->2434 2429->2424 2432 591873e-591874e 2429->2432 2435 5918708-5918711 2430->2435 2436 591867c-5918685 2430->2436 2440 5918784-591878a 2432->2440 2433->2434 2434->2440 2435->2424 2439 5918717-5918723 2435->2439 2436->2424 2441 591868b-59186a3 2436->2441 2442 5918884-5918888 2438->2442 2443 5918889 2438->2443 2439->2425 2439->2426 2440->2424 2447 5918790-59187a3 2440->2447 2445 59186a5 2441->2445 2446 59186af-59186c1 2441->2446 2442->2443 2448 5918891-5918894 2443->2448 2449 591888c-591888e 2443->2449 2445->2446 2446->2435 2456 59186c3-59186c9 2446->2456 2447->2424 2451 59187a9-59187b9 2447->2451 2450 5918895-59188bf 2448->2450 2449->2450 2452 5918890 2449->2452 2468 59188c1 2450->2468 2469 59188d5-59188e1 2450->2469 2451->2424 2455 59187bf-59187cc 2451->2455 2452->2448 2455->2424 2457 59187d2-59187e7 2455->2457 2459 59186d5-59186db 2456->2459 2460 59186cb 2456->2460 2457->2424 2464 59187ed-5918810 2457->2464 2459->2424 2462 59186e1-5918705 2459->2462 2460->2459 2464->2424 2470 5918812-591881d 2464->2470 2471 59188c4-59188c6 2468->2471 2472 59188e3 2469->2472 2473 59188ed-5918909 2469->2473 2474 591881f-5918829 2470->2474 2475 591886e-5918871 2470->2475 2476 59188c8-59188d3 2471->2476 2477 591890a-5918912 2471->2477 2472->2473 2474->2475 2484 591882b-5918841 2474->2484 2475->2437 2476->2469 2476->2471 2482 5918914-5918918 2477->2482 2483 5918919 2477->2483 2482->2483 2485 5918921-5918924 2483->2485 2486 591891c-591891e 2483->2486 2491 5918843 2484->2491 2492 591884d-5918866 2484->2492 2488 5918925-5918937 call 5913ce0 2485->2488 2487 5918920 2486->2487 2486->2488 2487->2485 2495 5918939-591893f 2488->2495 2496 591894f-5918951 2488->2496 2491->2492 2492->2475 2497 5918941 2495->2497 2498 5918943-5918945 2495->2498 2513 5918953 call 59189d0 2496->2513 2514 5918953 call 59189c0 2496->2514 2515 5918953 call 5919b6f 2496->2515 2497->2496 2498->2496 2500 5918959-591895d 2501 59189a8-59189b8 2500->2501 2502 591895f-5918976 2500->2502 2502->2501 2506 5918978-5918982 2502->2506 2508 5918995-59189a5 2506->2508 2509 5918984-5918993 2506->2509 2509->2508 2513->2500 2514->2500 2515->2500
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$d
                  • API String ID: 0-886291620
                  • Opcode ID: a689745a36651608a689b34501407267fe047116dbd3cd1d30658c831af8c85f
                  • Instruction ID: 8767bf214872a1ee8308b94ed843aad0f6084484b96cbb55c85f5f26eca126aa
                  • Opcode Fuzzy Hash: a689745a36651608a689b34501407267fe047116dbd3cd1d30658c831af8c85f
                  • Instruction Fuzzy Hash: 3CD18D3470061ACFCB14CF28C48496ABBF6FF89310B15C969E85A9B365DB34F842DB94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2743 5751598-57515bd 2745 57515c4-57515e1 2743->2745 2746 57515bf 2743->2746 2747 57515e3-57515ec 2745->2747 2748 5751602 2745->2748 2746->2745 2749 57515f3-57515f6 2747->2749 2750 57515ee-57515f1 2747->2750 2751 5751605-5751609 2748->2751 2752 5751600 2749->2752 2750->2752 2753 5751824-575183b 2751->2753 2752->2751 2755 5751841-5751845 2753->2755 2756 575160e-5751612 2753->2756 2757 5751847-575186c 2755->2757 2758 575186f-5751873 2755->2758 2759 5751614-57516b2 2756->2759 2760 575161a-575161e 2756->2760 2757->2758 2764 5751875-575187e 2758->2764 2765 5751894 2758->2765 2770 57516b4-5751752 2759->2770 2771 57516ba-57516be 2759->2771 2762 5751620-5751645 2760->2762 2763 5751648-575166d 2760->2763 2762->2763 2791 575166f-5751678 2763->2791 2792 575168e 2763->2792 2768 5751885-5751888 2764->2768 2769 5751880-5751883 2764->2769 2767 5751897-575189d 2765->2767 2772 5751892 2768->2772 2769->2772 2778 5751754-57517ef 2770->2778 2779 575175a-575175e 2770->2779 2775 57516c0-57516e5 2771->2775 2776 57516e8-575170d 2771->2776 2772->2767 2775->2776 2803 575170f-5751718 2776->2803 2804 575172e 2776->2804 2789 57517f1-5751816 2778->2789 2790 5751819-575181c 2778->2790 2782 5751760-5751785 2779->2782 2783 5751788-57517ad 2779->2783 2782->2783 2817 57517af-57517b8 2783->2817 2818 57517ce 2783->2818 2789->2790 2790->2753 2799 575167f-5751682 2791->2799 2800 575167a-575167d 2791->2800 2793 5751691-5751698 2792->2793 2801 57516a8-57516a9 2793->2801 2802 575169a-57516a0 2793->2802 2806 575168c 2799->2806 2800->2806 2801->2753 2802->2801 2809 575171f-5751722 2803->2809 2810 575171a-575171d 2803->2810 2811 5751731-5751738 2804->2811 2806->2793 2813 575172c 2809->2813 2810->2813 2814 5751748-5751749 2811->2814 2815 575173a-5751740 2811->2815 2813->2811 2814->2753 2815->2814 2819 57517bf-57517c2 2817->2819 2820 57517ba-57517bd 2817->2820 2821 57517d1-57517d8 2818->2821 2824 57517cc 2819->2824 2820->2824 2825 57517e8-57517e9 2821->2825 2826 57517da-57517e0 2821->2826 2824->2821 2825->2753 2826->2825
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1723594067.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5750000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$4'kq
                  • API String ID: 0-4171853269
                  • Opcode ID: 2b7eac53660831fd53a6a8de6abb80a0b319874f8ec61c3fbd6a65eec6c2bd23
                  • Instruction ID: dd924532f0d1e72410252fdde4fd1f0d9d641a20627df9046c2e2e4067daeee4
                  • Opcode Fuzzy Hash: 2b7eac53660831fd53a6a8de6abb80a0b319874f8ec61c3fbd6a65eec6c2bd23
                  • Instruction Fuzzy Hash: EFA1E774E10209CFCF18DFA8D448AADBBB2FF49322F508429E812A7354DB755946EF61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq$poq
                  • API String ID: 0-937253537
                  • Opcode ID: a863b9a0746ab4d26296eadab60b0d8a201fec86d62cf62209dea875134ce2cc
                  • Instruction ID: 3df2fcaf92c2488e8ae598d492ceb4b22fecb16bf566d7eab3922d2f68b01aa7
                  • Opcode Fuzzy Hash: a863b9a0746ab4d26296eadab60b0d8a201fec86d62cf62209dea875134ce2cc
                  • Instruction Fuzzy Hash: CE41B031A403098FCB15DF68D9406AEBBF7FF94300F14892DC4099B769DB75AD4687A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$Hoq
                  • API String ID: 0-3084834809
                  • Opcode ID: 181958627ba3a26240005a507fb3c15457c2a867d3461c8691f62ca0c99c0e74
                  • Instruction ID: 066906692d91a24dcc0e803e47957cb82e628793ce91aacb86a9178d9921a7fb
                  • Opcode Fuzzy Hash: 181958627ba3a26240005a507fb3c15457c2a867d3461c8691f62ca0c99c0e74
                  • Instruction Fuzzy Hash: 5A2136317082484FC706EB79D84495EBFAAEFDA34075441AAD405DF3A6DF31AD058792
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: #$wPO}
                  • API String ID: 0-3350902561
                  • Opcode ID: ceba7695b53081e39ff3718bbe63cfee8e51bf369cf20e66e786b5474f9b2e7d
                  • Instruction ID: 9fb3c336f41ac0c0e8ed526e2457e1d95e31c57c0e862ac6ec5d5f71fa56a5a0
                  • Opcode Fuzzy Hash: ceba7695b53081e39ff3718bbe63cfee8e51bf369cf20e66e786b5474f9b2e7d
                  • Instruction Fuzzy Hash: 86F0FF35A052048FDB45DF68F4A5EAE7BF2FB49304F14817994079B798DB706901CF84
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: ?$W
                  • API String ID: 0-3566296654
                  • Opcode ID: 61857d5c5c739d2831a4e438b7381015e232faf2cc1b09928da54e4700a10ef6
                  • Instruction ID: 2778a5ade6b5c00f62c290eb9e9e19900997823f1761157c47a015fb8eaf9cde
                  • Opcode Fuzzy Hash: 61857d5c5c739d2831a4e438b7381015e232faf2cc1b09928da54e4700a10ef6
                  • Instruction Fuzzy Hash: 8FF079708052A8CFEB60CF14D9447DEBBB6BB05315F0085E5D11E62250C7B45EC9DF06
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: '$z
                  • API String ID: 0-2205937907
                  • Opcode ID: 410390bf166b2eaff35ebb125815cdaffa8456ebf894904470068f88b5fe8b78
                  • Instruction ID: a11a19e59953310f73f1f5de112f38f08a6b4a22b221c0c7911c1dbeb7500dd8
                  • Opcode Fuzzy Hash: 410390bf166b2eaff35ebb125815cdaffa8456ebf894904470068f88b5fe8b78
                  • Instruction Fuzzy Hash: 8FF0AF74D05228CFEBA0DF65C888B9DBBB2AB09310F5085D5D008B3200CB705A80DF24
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: $kq
                  • API String ID: 0-3037731980
                  • Opcode ID: 786580ebd48a01e3188912d4809976ea4138b3b8b8e12f92e3b09474ae4a8767
                  • Instruction ID: 83286f99056986732ebc91177ec6117c6e2d7e48cd1e1332c8f8896d18cec821
                  • Opcode Fuzzy Hash: 786580ebd48a01e3188912d4809976ea4138b3b8b8e12f92e3b09474ae4a8767
                  • Instruction Fuzzy Hash: 97526B35A00229DFCB15DF64C984E99BBB2FF88300F1581A9E509AB265CB31ED95DF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: ,oq
                  • API String ID: 0-651702701
                  • Opcode ID: 168cd46a321333661516a7c2b034b3705b70248dea89c75d2fb9a94a29abcedc
                  • Instruction ID: 6f04e3534dbb76ac3a1d5c1af4e078afe8f18d7a2fbf522f58ded7c49a3c8874
                  • Opcode Fuzzy Hash: 168cd46a321333661516a7c2b034b3705b70248dea89c75d2fb9a94a29abcedc
                  • Instruction Fuzzy Hash: 8B521B75A102288FDB28DF69C981BDDBBF6BF88700F1581D9E509A7351DA309D81CF61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (_kq
                  • API String ID: 0-2183774854
                  • Opcode ID: 95edbf70dc168850c596f29374eff523b9d47bf94c9d6765e8f964bdf41762d1
                  • Instruction ID: b7fdbb9e6cc12fdc1ba9b598037849d3207245da1b951556189e087cec74d7ca
                  • Opcode Fuzzy Hash: 95edbf70dc168850c596f29374eff523b9d47bf94c9d6765e8f964bdf41762d1
                  • Instruction Fuzzy Hash: 5922A035B102199FCB14DFA9D490A6DBBB6FF88300F158469E906EB3A1CB71EC41CB64
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0595118F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 7295aa268184de485dcdc38b8a062e69f4fea7151804161a50d1aaa41ed44fe7
                  • Instruction ID: bda6c528b444c7d0c3438e1f79559c0f8a5361377d232c420e7f967c09072b04
                  • Opcode Fuzzy Hash: 7295aa268184de485dcdc38b8a062e69f4fea7151804161a50d1aaa41ed44fe7
                  • Instruction Fuzzy Hash: F2A132B4D002598FDF20CFA9C885BEDBBF1BF09320F149169E898A7250DB748995DF85
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0595118F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 962c727ca19d05072270e253a72199176b45251764a885915e0ceb28b16541f2
                  • Instruction ID: e8e277d9c3dd96a6894cdfda647452d9d2093bb2cf8420faa9e89e290d08951b
                  • Opcode Fuzzy Hash: 962c727ca19d05072270e253a72199176b45251764a885915e0ceb28b16541f2
                  • Instruction Fuzzy Hash: 5CA122B0D002598FDF20CFA9C885BEEBBF1BF09310F149169E898A7250DB748995DF85
                  APIs
                  • CopyFileA.KERNEL32(?,?,?), ref: 05953893
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: CopyFile
                  • String ID:
                  • API String ID: 1304948518-0
                  • Opcode ID: b0b5cd8342b8b29b7f05be5d97b137609ba78205d64d63315a12f9015530b0be
                  • Instruction ID: 3841c14b33ff69c85cc8d95317746e6a9d69c85ee125905d0bc75b00b03d65cf
                  • Opcode Fuzzy Hash: b0b5cd8342b8b29b7f05be5d97b137609ba78205d64d63315a12f9015530b0be
                  • Instruction Fuzzy Hash: BA6112B0D00319DFDB14CFA9C9857EDBBF1BB08320F148929D855A7280D7788995CF81
                  APIs
                  • CopyFileA.KERNEL32(?,?,?), ref: 05953893
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: CopyFile
                  • String ID:
                  • API String ID: 1304948518-0
                  • Opcode ID: 38e559bb11399d2885affdf349b2fece4b17662ca66ea6ca3703297ebe88b3df
                  • Instruction ID: ae5c8966968ab9519830a1ca03a1defff616618fbe36a36ccc190a0a6d2be20a
                  • Opcode Fuzzy Hash: 38e559bb11399d2885affdf349b2fece4b17662ca66ea6ca3703297ebe88b3df
                  • Instruction Fuzzy Hash: 776124B0D00358DFDB14CFA9C9457EDBBF1BB48360F148529E855A7280DB789995CF81
                  APIs
                  • RegSetValueExA.KERNELBASE(?,?,?,?,?,?), ref: 05953D58
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: Value
                  • String ID:
                  • API String ID: 3702945584-0
                  • Opcode ID: 837d85883884bd3c7e46b2641efc2512b6d39fa2c156bb70bc43e5e1994a4b13
                  • Instruction ID: 87de09bfea520ae17442e36c0f64a09691074d2aa9aec2d0c3389eeb53f99bf0
                  • Opcode Fuzzy Hash: 837d85883884bd3c7e46b2641efc2512b6d39fa2c156bb70bc43e5e1994a4b13
                  • Instruction Fuzzy Hash: C951EEB4D002189FDF10CFA9C985B9EBBF1BF09310F24942AE858A7250DB749995DF84
                  APIs
                  • RegSetValueExA.KERNELBASE(?,?,?,?,?,?), ref: 05953D58
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: Value
                  • String ID:
                  • API String ID: 3702945584-0
                  • Opcode ID: 21ccad802299967bf7b159dd40eacd87e58fe9b81b5f1671cf7ed1989c763bf5
                  • Instruction ID: 3849998341913c58c181c4d4491c39ba2b8ca1312ca4bae82fda2904ab04240a
                  • Opcode Fuzzy Hash: 21ccad802299967bf7b159dd40eacd87e58fe9b81b5f1671cf7ed1989c763bf5
                  • Instruction Fuzzy Hash: 5651FEB4D002189FDF10CFA9C985B9EBBF1FF09310F20942AE858A7250DB749995DF84
                  APIs
                  • RegOpenKeyExA.KERNELBASE(?,?,?,?,?), ref: 05953AE8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: 24ad07a2e0325eb9445331d7abecb1637bf5f12ee57685e79f9fddc8f9728455
                  • Instruction ID: 7067de4584718fc9e00a6cc3ec1e07b3a730b38eff32b076fe5af4409f305a82
                  • Opcode Fuzzy Hash: 24ad07a2e0325eb9445331d7abecb1637bf5f12ee57685e79f9fddc8f9728455
                  • Instruction Fuzzy Hash: 11510FB4D003089FDF10CFA9D985AAEBBF5FF09310F20942AE859A7254D7749981CF84
                  APIs
                  • RegOpenKeyExA.KERNELBASE(?,?,?,?,?), ref: 05953AE8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: Open
                  • String ID:
                  • API String ID: 71445658-0
                  • Opcode ID: 43a6bed8261cf7a3ef55d2f8a87964ff9d58f900503f3cc962b63f113f602d32
                  • Instruction ID: 935268d28f53ae643e96dad81f1ac65e6c0b137d8b037fba6acb281f80ce1c46
                  • Opcode Fuzzy Hash: 43a6bed8261cf7a3ef55d2f8a87964ff9d58f900503f3cc962b63f113f602d32
                  • Instruction Fuzzy Hash: 7A51FDB4D003089FDF10CFA9D984AAEBBF5FF09350F20942AE819A7254DB749985CF84
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05951A73
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 9b6344e81ab0c6c1af66246489c3c9ef8b62403e08445d6e40b2045354f002fb
                  • Instruction ID: 4bf9af7491e98a3fe5e88757e69fa4f94573e056f2258fcf351d40818d77b298
                  • Opcode Fuzzy Hash: 9b6344e81ab0c6c1af66246489c3c9ef8b62403e08445d6e40b2045354f002fb
                  • Instruction Fuzzy Hash: 2741A9B5D012589FCB00CFA9D984AEEBBF1BB09310F24942AE859B7210D334AA45CF64
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05951A73
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 7f316a8483508ebff9210eff1b354037d703e9714e40b50bd83c57710325bb81
                  • Instruction ID: c5ae8a7a4edf5b0806ea2c6806fb98a8148ec873066bd3b6c121d9c098ee909e
                  • Opcode Fuzzy Hash: 7f316a8483508ebff9210eff1b354037d703e9714e40b50bd83c57710325bb81
                  • Instruction Fuzzy Hash: 0641C9B4D012589FCF00CFA9D984AEEFBF1BB49310F20942AE858B7210D734AA45CF64
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 059518EA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 077519b342a469b8ba1ffe73bc0f3aa927e93d90d307ad2f1efc23a779ae7f17
                  • Instruction ID: c3c436609bcaed42672d563a34562bbb0047c04feafc427687c85b5765bc9ff9
                  • Opcode Fuzzy Hash: 077519b342a469b8ba1ffe73bc0f3aa927e93d90d307ad2f1efc23a779ae7f17
                  • Instruction Fuzzy Hash: DA41B8B8D04258DFCF10CFA9D984ADEBBB5BB09320F10942AE855B7214D735A942CF98
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 059518EA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 7e9f10966c79c678c27a6789235d1e60da527cdc63edce36ffbd194e2fc9c7b4
                  • Instruction ID: fb95e17cf1ca6c63880faf29bc49487c0fefe07545e18919bb4d8328dab2c58d
                  • Opcode Fuzzy Hash: 7e9f10966c79c678c27a6789235d1e60da527cdc63edce36ffbd194e2fc9c7b4
                  • Instruction Fuzzy Hash: 9E31A8B8D00258DFCF10CFA9D980ADEFBB5BB49320F10942AE855B7210D735A945CF58
                  APIs
                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05951F34
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 343a51ac623adb0a48600b49d6d64012233529335edd27d4b1047bd032518b25
                  • Instruction ID: 66c7ea3d565b9278fa4eef5478d0daabe5153227b208f87ae92b1ce2e7ded689
                  • Opcode Fuzzy Hash: 343a51ac623adb0a48600b49d6d64012233529335edd27d4b1047bd032518b25
                  • Instruction Fuzzy Hash: E231C8B8D04258DFCF10CFAAD984AEEFBB1BB49320F10942AE854B7210D735A945CF94
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 0595138F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: cd0540eb3d389bcf414b0101fc89c732cf0b5f279209eac22a2ec24a3f078ddf
                  • Instruction ID: b3a892a9a199d878a874a470425c1d94712a1668887db5452db929823c72c0fd
                  • Opcode Fuzzy Hash: cd0540eb3d389bcf414b0101fc89c732cf0b5f279209eac22a2ec24a3f078ddf
                  • Instruction Fuzzy Hash: 7D41CCB4D002589FCB10CFA9D985AEEBBF5BB48320F14842AE459B7250D738A945CF94
                  APIs
                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05951F34
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: a2a2d9711831903f72ec51ca8f5438f1ce9e66387383d53e57814bcc63ffac1a
                  • Instruction ID: cf115d79edf41d17ca3cb4b73702b2eec5634a80c221d4e694dba29b4307a402
                  • Opcode Fuzzy Hash: a2a2d9711831903f72ec51ca8f5438f1ce9e66387383d53e57814bcc63ffac1a
                  • Instruction Fuzzy Hash: FF31CAB4D04258DFCB10CFAAD584AEEFBB5BB49320F10942AE854B7210D735A945CF54
                  APIs
                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 059BDD1C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1725181164.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_59b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 8642e7735e089eb6af64d34101458747024c06e96a7332aa718c73bcda34fdff
                  • Instruction ID: 60f989d51d11724bef1ec81e8c695f058f2aae03e6a68c870bc45a5e133a57e6
                  • Opcode Fuzzy Hash: 8642e7735e089eb6af64d34101458747024c06e96a7332aa718c73bcda34fdff
                  • Instruction Fuzzy Hash: 2931C8B4D002489FDB10CFA9D980ADEFBB0BB49310F20942AE854B7214D735A945CF94
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 0595138F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 436b53bbd4fdfdcdd869db0ad01b6a6b0e3cb2510643d51bfc0bc0effee0d0ba
                  • Instruction ID: 358232d03712f123be096327ed0d725224f085e2747220319614d8ddb70d8000
                  • Opcode Fuzzy Hash: 436b53bbd4fdfdcdd869db0ad01b6a6b0e3cb2510643d51bfc0bc0effee0d0ba
                  • Instruction Fuzzy Hash: 2531BBB4D002589FCB10CFA9D984AEEFBF5BB49320F14842AE459B7250D738A945CF54
                  APIs
                  • RegCloseKey.KERNELBASE(?), ref: 05953EE6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: Close
                  • String ID:
                  • API String ID: 3535843008-0
                  • Opcode ID: 53965e2fcafea3f46ba9720125fe73da99c8211b37575110f113114742c2abad
                  • Instruction ID: c19845017c87a97ac4f9875148a1466495f5ef0bffe811ccb9a07be4145c3def
                  • Opcode Fuzzy Hash: 53965e2fcafea3f46ba9720125fe73da99c8211b37575110f113114742c2abad
                  • Instruction Fuzzy Hash: 1331CAB4D002189FCB10CFAAD984A9EFBF4BB49320F10942AE815B7310C735A845CFA4
                  APIs
                  • RegCloseKey.KERNELBASE(?), ref: 05953EE6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: Close
                  • String ID:
                  • API String ID: 3535843008-0
                  • Opcode ID: b47389eb0ae4d8fa0a5c5f5a9bdf50e702b62f7fdb0593801c052d48db20aed2
                  • Instruction ID: f457d53ec9479bcc4a5840fcc4342548d6b3b168b82f3f1f2e11c035c83566d7
                  • Opcode Fuzzy Hash: b47389eb0ae4d8fa0a5c5f5a9bdf50e702b62f7fdb0593801c052d48db20aed2
                  • Instruction Fuzzy Hash: BC31E9B8D002189FCB10CFA9D980AAEFBF4AF48320F10982AE855B7310C735A805CF54
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: ,oq
                  • API String ID: 0-651702701
                  • Opcode ID: 35e65ca6b8872671f4a998319f495d9eb14c660714feba073cc1777948035ae2
                  • Instruction ID: e0af55e892f64c384e25a8078f7be6dee03d0bd7657a6b10636f3f5a1a19910e
                  • Opcode Fuzzy Hash: 35e65ca6b8872671f4a998319f495d9eb14c660714feba073cc1777948035ae2
                  • Instruction Fuzzy Hash: 09C14F75A002289FDB18DB68C985BDDBBF6FF88700F158199E509A73A4CA31DD81CF61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Plkq
                  • API String ID: 0-177148220
                  • Opcode ID: 4497112b94836ce09b6259a9d8e49b9687f87b56ac08ece06c084cf2b3681de7
                  • Instruction ID: 60bf2d0987f08c96b080b327d7995cf0987df76683092fa34ca5eeb70c459e92
                  • Opcode Fuzzy Hash: 4497112b94836ce09b6259a9d8e49b9687f87b56ac08ece06c084cf2b3681de7
                  • Instruction Fuzzy Hash: F2911734B402188FCB04DF28C594A6A7BFABF89710B1584A9E906DF3B5DB71EC41CB95
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq
                  • API String ID: 0-3255046985
                  • Opcode ID: 8745f60008756da9410c0dabf7876845b6d7f0c06a88fec40f323f7a3bb99860
                  • Instruction ID: b41630afa9fd6a58da03e0696e3f049c88e6d11f917ec99cc754da00103512c5
                  • Opcode Fuzzy Hash: 8745f60008756da9410c0dabf7876845b6d7f0c06a88fec40f323f7a3bb99860
                  • Instruction Fuzzy Hash: B6A1FB34B11218DFCB04EFA4D998D9DBBB2FF89310F558159E806AB365DB70AC42CB94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq
                  • API String ID: 0-3175707579
                  • Opcode ID: 39a8f28b204673631751bcf60f5b6a2fa629f658a083da79b49f7b0c1590fe5e
                  • Instruction ID: 82adebf132c040fdfcfa0084f4031d567c3773aaa2a66eb6af93e374cd9c7b76
                  • Opcode Fuzzy Hash: 39a8f28b204673631751bcf60f5b6a2fa629f658a083da79b49f7b0c1590fe5e
                  • Instruction Fuzzy Hash: C0819A71B046198FCB14DFA9D584AAEFBF7BFC4310B248929D419AB349DB34AD01CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4|pq
                  • API String ID: 0-198908290
                  • Opcode ID: c128d7ea56f376c5c938020a1790b7a4457e651ad7d678eff1de23f9be12853d
                  • Instruction ID: f00c1cec41f6177a6ffaad33aafcb26876f87a2b51e6e94b1fae8fcd1edbdaf5
                  • Opcode Fuzzy Hash: c128d7ea56f376c5c938020a1790b7a4457e651ad7d678eff1de23f9be12853d
                  • Instruction Fuzzy Hash: B37113B4A05228CFEB64CF28D954BE9BBB2FB49304F1084EAD509A7345CB705E88CF41
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4|pq
                  • API String ID: 0-198908290
                  • Opcode ID: 7801e8c36536a78fb2c4fb58964f45c3fcdf77a00a50a23525957e0f68ca1bb8
                  • Instruction ID: 73975cf5eb5b3794e68b68009e4fcc48faf8d14094b70060683d24e1e738b0c3
                  • Opcode Fuzzy Hash: 7801e8c36536a78fb2c4fb58964f45c3fcdf77a00a50a23525957e0f68ca1bb8
                  • Instruction Fuzzy Hash: AF81B074A05228CFEB64CF28D995BE9BBB2BB89304F1084EAD50DA7355DB705E84CF41
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq
                  • API String ID: 0-3175707579
                  • Opcode ID: 480bdae4947a6232e10585df63dfed9195d08d2e3b631ae535c89ccf6c36ae82
                  • Instruction ID: 027a92f481bce929bd6dae502e473d2ac8d977a72c4556560401ca1d8ea8b349
                  • Opcode Fuzzy Hash: 480bdae4947a6232e10585df63dfed9195d08d2e3b631ae535c89ccf6c36ae82
                  • Instruction Fuzzy Hash: B6512535B0422AAFCB01CF58D48496AFBB6FF85320B19C596EA15AB341DB34F851CBD4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: poq
                  • API String ID: 0-1570044193
                  • Opcode ID: 3dc8f9627fb35e148e25efd100a3a2e4b8886e07e00dc6ad55ce69ef9a833c55
                  • Instruction ID: 55756dc3e3147d9af0bfc63960f15519a5e18d61510db7032f4df2809a4cc46e
                  • Opcode Fuzzy Hash: 3dc8f9627fb35e148e25efd100a3a2e4b8886e07e00dc6ad55ce69ef9a833c55
                  • Instruction Fuzzy Hash: 9E515E76600104AFCB499FA8D904D6A7BB3FF9C3147198498E6099B376DB32DC62EB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq
                  • API String ID: 0-3175707579
                  • Opcode ID: 1562ea273f228eee54cde0d13f3d62e606ebe8cc1a468e8cc48e904c8513f352
                  • Instruction ID: cf27d04fbd29ab37b765769dbef2c7a5a47c40970bde32844c5b15a7f83746d3
                  • Opcode Fuzzy Hash: 1562ea273f228eee54cde0d13f3d62e606ebe8cc1a468e8cc48e904c8513f352
                  • Instruction Fuzzy Hash: 5F519E72708258AFCB069F68D854D697FB6FF8931071A80EAE605CF272DA31D811DB61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: TJpq
                  • API String ID: 0-270235555
                  • Opcode ID: 6bc8b6ed57d75f803901081affdadde8495fb20472fb6d6fe3e8795969fe2487
                  • Instruction ID: 8cae0f28db856cc09272cbedee510b4ba9719ae0e9bf1500af285fc5a0fe6404
                  • Opcode Fuzzy Hash: 6bc8b6ed57d75f803901081affdadde8495fb20472fb6d6fe3e8795969fe2487
                  • Instruction Fuzzy Hash: B9514574D06219DFDB08DFA9D848AADBBB2FF49300F10C1AAE816AB354DB705A45CF01
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: \skq
                  • API String ID: 0-1461930697
                  • Opcode ID: 509cc51b003d36e2bc50f8acd9595c11e572b1765ef9332c38529fdfb476429c
                  • Instruction ID: ee5826badaab3641c292e9b7acab59bf41ebd4369e376e19b5b0c6c1d3f92895
                  • Opcode Fuzzy Hash: 509cc51b003d36e2bc50f8acd9595c11e572b1765ef9332c38529fdfb476429c
                  • Instruction Fuzzy Hash: F4512BB8E4021A9FDF04DFA9D9806EDB7F1FF88310F10A669D412EB254DB359941CB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq
                  • API String ID: 0-3255046985
                  • Opcode ID: ebf14b9c4a683631bfac2046ba51202846b2570e034eec52bfd61f224603eb9b
                  • Instruction ID: 584f8c2140a7ae45ccecb16ee7edf279c87ee6836eeb51686ba7b9f34aae525a
                  • Opcode Fuzzy Hash: ebf14b9c4a683631bfac2046ba51202846b2570e034eec52bfd61f224603eb9b
                  • Instruction Fuzzy Hash: BD419430B1062C8FCB09AB64D458A6D7BFBAFC9700F504529E8079B394CFB4AC469B95
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: c7b06c932c84b78769c01571c7542e0c9d9babd533ee0425d2eec58acee9c471
                  • Instruction ID: f17abda9992c97f8ea8c51ac0018e16d24f2d01dbcdd81f64971c965c6249c43
                  • Opcode Fuzzy Hash: c7b06c932c84b78769c01571c7542e0c9d9babd533ee0425d2eec58acee9c471
                  • Instruction Fuzzy Hash: 78418E71F0112A8BCB14DFAAD8806AEF7B2FB84212F14C56AD915DB715D331E8518BD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: TJpq
                  • API String ID: 0-270235555
                  • Opcode ID: 5b82ad562bbaa745aff1a2813f26de9409df6a9fe516e256c8c81ad693f0d02b
                  • Instruction ID: 5fa31a5b355cd8f07ca1ad5ae9f424455b8ff3f573a6b4a995ea1bd2a3dda800
                  • Opcode Fuzzy Hash: 5b82ad562bbaa745aff1a2813f26de9409df6a9fe516e256c8c81ad693f0d02b
                  • Instruction Fuzzy Hash: A851E374D05229DFDB08DFA9D488AADBBB2FF89304F10C16AE826A7354DBB45945CF00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: OpbI
                  • API String ID: 0-3993571126
                  • Opcode ID: b1208fc5f3dbe79d915236e4dabbcf007295bfb2b044b2b1d4634f4774527404
                  • Instruction ID: a3fe2429cf6762cba812dfa626d0fa337d0c5699e6587cef36d71936c1fbe7f4
                  • Opcode Fuzzy Hash: b1208fc5f3dbe79d915236e4dabbcf007295bfb2b044b2b1d4634f4774527404
                  • Instruction Fuzzy Hash: 5951B2B0E01208CFDB68DFB9D594ADDBBB6BF88300F208129E416AB365DB759945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: OpbI
                  • API String ID: 0-3993571126
                  • Opcode ID: b1fad9e58e24d183ccccd1dfb0ede08e001598208ebc53c2900e648dfdf18856
                  • Instruction ID: e55809d4b9061194e2b5b92e00c52a0a470f2e430dffa4073ccd0acfb93bb9f1
                  • Opcode Fuzzy Hash: b1fad9e58e24d183ccccd1dfb0ede08e001598208ebc53c2900e648dfdf18856
                  • Instruction Fuzzy Hash: DC41E5B0E01208CFDB68DFB9D594ADDBBB2BF48300F24802DD416AB265DB759945CF00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq
                  • API String ID: 0-3175707579
                  • Opcode ID: 1285c297b6fa4990f4508511de17a028e0d420ef792931d11b67270cefdf9b0b
                  • Instruction ID: b1be20fe6ef221b8ddd71b24b41120ac71e764e85edfb363135686b560117150
                  • Opcode Fuzzy Hash: 1285c297b6fa4990f4508511de17a028e0d420ef792931d11b67270cefdf9b0b
                  • Instruction Fuzzy Hash: 7C3138363042665FDB065E69D84496E7FABFF99320B14403AFD08CB391CE328C11C790
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'kq
                  • API String ID: 0-3255046985
                  • Opcode ID: b9c156ee764087fdef16d118f87b63ac185c4c033cc9e726758b074ed4b4d783
                  • Instruction ID: d849dfeb58f7a9ccde94c4b877072638d3b492a2a146c4db9c1b29eabcc66245
                  • Opcode Fuzzy Hash: b9c156ee764087fdef16d118f87b63ac185c4c033cc9e726758b074ed4b4d783
                  • Instruction Fuzzy Hash: 7731B1357001189FCF199F94D9589697FB3FF88310B1540A9FA0A9B375CA31EC42DB61
                  APIs
                  • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 059BF2DF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1725181164.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_59b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 0b4f37841d8b5ae939a1a1f495c75a7cc4071b3bc4065ac6128dc1dac6486931
                  • Instruction ID: 7189b24717f14eef31e5a40a9877ed1eed9d8d88e46b320bbe1d42e370725ada
                  • Opcode Fuzzy Hash: 0b4f37841d8b5ae939a1a1f495c75a7cc4071b3bc4065ac6128dc1dac6486931
                  • Instruction Fuzzy Hash: C231B8B8D002589FDF10CFA9D980ADEFBB5BB49310F20942AE815B7210D735A945CF94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tekq
                  • API String ID: 0-2319236580
                  • Opcode ID: 17c3158f50fb80a1ceed6b2096a39775e658fb87eb206ec7bfaa136ce489e895
                  • Instruction ID: b52eef26d54391ab852d038608dae852a90482d4439a8dfbe0514930a8e5730d
                  • Opcode Fuzzy Hash: 17c3158f50fb80a1ceed6b2096a39775e658fb87eb206ec7bfaa136ce489e895
                  • Instruction Fuzzy Hash: FC21A131B101158FCB04ABB9D598B6EBBF3AF99700F158859E402EF3A5CE759C458B81
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Hoq
                  • API String ID: 0-3049094369
                  • Opcode ID: 67150322b4132c2508ef4e79c0e3cea682278d1f46e0f6f464309c41c3e7bcb6
                  • Instruction ID: dc5a24b6559dafaab44795660162a96ec1ba5c7c17ff0842791191b974df745f
                  • Opcode Fuzzy Hash: 67150322b4132c2508ef4e79c0e3cea682278d1f46e0f6f464309c41c3e7bcb6
                  • Instruction Fuzzy Hash: 72319F317002158FCB59AF39D45452E7BB6FFE834076085ADD106CB3A5CE349C02CBAA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: \skq
                  • API String ID: 0-1461930697
                  • Opcode ID: 6d3b1724ecc62ca91e0630b733bdb160e1c9cc30c3e37b19123a1ddfb684a143
                  • Instruction ID: c7d71b1573574980824ca096ce6062289999b124b664ba8a7acc7d44a2233098
                  • Opcode Fuzzy Hash: 6d3b1724ecc62ca91e0630b733bdb160e1c9cc30c3e37b19123a1ddfb684a143
                  • Instruction Fuzzy Hash: C921BE727505208FC769DB7DD840A3A77F5EF8865531684EAE80ACF3B2DB21DC418BA0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: p<kq
                  • API String ID: 0-3321991346
                  • Opcode ID: 42c1eceaf6d0b98498530495758c03ef591dabf30ee813df17c378fd301d0732
                  • Instruction ID: 4d4a942f3e85f563de97ee93d6231d6ff00f8573c03393140bb01c20c4cfe412
                  • Opcode Fuzzy Hash: 42c1eceaf6d0b98498530495758c03ef591dabf30ee813df17c378fd301d0732
                  • Instruction Fuzzy Hash: 072151313081589FCB15CF2AD8549AA7BEAFF8A250B064095FD05CB3B1D671DC42CF20
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: p<kq
                  • API String ID: 0-3321991346
                  • Opcode ID: a6c57272ff56d21dc106a441f81cb1b7ebe4fc271c69ab75913c54a0dd5b4de3
                  • Instruction ID: 582411fe2387f47ed4ba1a106ed80c08689f0bc3a47e1fe7e73e139bb43ac294
                  • Opcode Fuzzy Hash: a6c57272ff56d21dc106a441f81cb1b7ebe4fc271c69ab75913c54a0dd5b4de3
                  • Instruction Fuzzy Hash: FA213A313041A8DFCB15DF2AD844AAA7BEAFF8A240B064095FC55CB2B1DA75DC52CB60
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: b98e57b7b2e2a70886fae7d6da15af50b6ef56da7bc111aae5addcccc31cc566
                  • Instruction ID: 4d8cac6d1dcad5eedc2f72672ac628d918129760625744f9e3d0ba2fbaefa0c7
                  • Opcode Fuzzy Hash: b98e57b7b2e2a70886fae7d6da15af50b6ef56da7bc111aae5addcccc31cc566
                  • Instruction Fuzzy Hash: A731F274905228CFDB65DF24D848BDABBF2BF09301F0080E9E51AA3251DB745E84DF55
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: $
                  • API String ID: 0-3993045852
                  • Opcode ID: e913dc15f6af8f3249acf7e6b3d42b41ccc2775bdf6f18a2f7ec6620e5ad68e0
                  • Instruction ID: 1e5fc2741449391fa5e6688270345f3555b48a597847a082696ecf0bfd8b8f09
                  • Opcode Fuzzy Hash: e913dc15f6af8f3249acf7e6b3d42b41ccc2775bdf6f18a2f7ec6620e5ad68e0
                  • Instruction Fuzzy Hash: 1F219E7495122D8FDB65DF20D888BE9BBB2BB09304F5094EAE809A7250DB705E84DF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: cGw
                  • API String ID: 0-1470769904
                  • Opcode ID: b633d5b4b2d11602638e6d070c0977df754bedc9d47bfcc5f70b38a2483287bd
                  • Instruction ID: c9dc3e44838c254187e51031e054b46ed5b21e957b3783dc4f9686d8798c9f43
                  • Opcode Fuzzy Hash: b633d5b4b2d11602638e6d070c0977df754bedc9d47bfcc5f70b38a2483287bd
                  • Instruction Fuzzy Hash: B211C535A001189FDB54DF68E896B9D77F2FB49304F5081AAD01AA7354DB74AE848F50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: )
                  • API String ID: 0-2427484129
                  • Opcode ID: b94c34661259ef64be9621931ef26d2a7cd895dc99650b43d0ac7fc42e234314
                  • Instruction ID: 5a393c7800616590edb937b399961d1d1c8e270d46fa673589e9e0d7197a4df6
                  • Opcode Fuzzy Hash: b94c34661259ef64be9621931ef26d2a7cd895dc99650b43d0ac7fc42e234314
                  • Instruction Fuzzy Hash: 9E113939A411199FDB54EF19E899BDDB7F2FB49304F1081E9E40997364DB70AE818F80
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: &
                  • API String ID: 0-1010288
                  • Opcode ID: d753aa2740c24710ca290355ab372c26b29e37682067510ea90db06fdcf639d3
                  • Instruction ID: 017f4d121998bf571dc0648892bbc1dbad9a4617a9b66a46ccfa7696f82c6e22
                  • Opcode Fuzzy Hash: d753aa2740c24710ca290355ab372c26b29e37682067510ea90db06fdcf639d3
                  • Instruction Fuzzy Hash: A411F734A10119DFEB54DF18E8A6FA9B7F2FB49304F1081A5D5099B354DB74AE80CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: C
                  • API String ID: 0-1037565863
                  • Opcode ID: 445a6d4b349452024de466cd6230c41453565989f4c7d0c2addd4bdd52ae9427
                  • Instruction ID: 5353f4989596d625b09e24b2959f4d478dbdeb82d421a948d308e50a82f5d66c
                  • Opcode Fuzzy Hash: 445a6d4b349452024de466cd6230c41453565989f4c7d0c2addd4bdd52ae9427
                  • Instruction Fuzzy Hash: 8401D674809628CFEF20CFA5C498BEDBBB2BB09315F646559D40AB3242C7B50AC5EF15
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8oq
                  • API String ID: 0-3198120224
                  • Opcode ID: 6ad6f591773999204da5940373772f0f4ffa6f4f8ebf8829519ed8770c41a00a
                  • Instruction ID: 95e1d4418ccd1e631569f85e18bbca7831df2cebe2145112ec013fa313730434
                  • Opcode Fuzzy Hash: 6ad6f591773999204da5940373772f0f4ffa6f4f8ebf8829519ed8770c41a00a
                  • Instruction Fuzzy Hash: 16F0E9367802004FC384AAADE149B6DBBFAEBE9741B81417DE045C77A4FF218C428B41
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tekq
                  • API String ID: 0-2319236580
                  • Opcode ID: fef94c8f40b8cc25e92db11f2b1e209a82219e681005a3fbb9a1da67e9f8fd28
                  • Instruction ID: 6dd91c8aeebc078fc37f5136f9100605726910ac16563bb51ca2c238d6fab650
                  • Opcode Fuzzy Hash: fef94c8f40b8cc25e92db11f2b1e209a82219e681005a3fbb9a1da67e9f8fd28
                  • Instruction Fuzzy Hash: 57019074904228CFDB60EF18D484B99BBB2BB19314F108099E988A7744CB74A9C4CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: %
                  • API String ID: 0-2567322570
                  • Opcode ID: 5c07cdc403c1cd60412245d6b18685c0557c3c83105609718c9c19c84ae88a7c
                  • Instruction ID: 901556b6d35d37547da7c95b649eebe6202dfa94267b6ceab8211723dd0609bd
                  • Opcode Fuzzy Hash: 5c07cdc403c1cd60412245d6b18685c0557c3c83105609718c9c19c84ae88a7c
                  • Instruction Fuzzy Hash: 5C013134601114CFDB48EF28FD95AAB77F2EB49304F1081A9940A97394DB75AD41CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8oq
                  • API String ID: 0-3198120224
                  • Opcode ID: 9c2241e8ce88bc18c769140f29cdc4cab9aaed5384874f0b0076171dde2d42fa
                  • Instruction ID: 148f6e265410be2c7c14ae95368dad08ede3931eae40de5d40e4bcf2ed19ad45
                  • Opcode Fuzzy Hash: 9c2241e8ce88bc18c769140f29cdc4cab9aaed5384874f0b0076171dde2d42fa
                  • Instruction Fuzzy Hash: FEF0A0367402108FC384AAAEE548B19B7EAEBD9610B804068E145CB764FF219C828791
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: T
                  • API String ID: 0-3187964512
                  • Opcode ID: dba510a98753dcc16637daef23b3000a0d87d1ca062fcd03a193bd85de9a9fc3
                  • Instruction ID: cd7a4a48961f828a5d034b86785a39e8eda76d68cd8baf2989986ecdf1ecbcef
                  • Opcode Fuzzy Hash: dba510a98753dcc16637daef23b3000a0d87d1ca062fcd03a193bd85de9a9fc3
                  • Instruction Fuzzy Hash: CFF0F978A1421DCFCB68DF58D9889DAB7B2FB4A309F1080D8A119A3369CB305E84DF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c9dadff8902995afa9054a172b3746c2ab678a3d0acc2d870f71a9d337984a4
                  • Instruction ID: 4b74687f5ffe0de02a6bcb43f8b3cd56ac434ac8aac5cfde85cdb61b2c4988a7
                  • Opcode Fuzzy Hash: 3c9dadff8902995afa9054a172b3746c2ab678a3d0acc2d870f71a9d337984a4
                  • Instruction Fuzzy Hash: C2121E34B002298FCB14EF64C994A9DBBB6BF89300F5185A9D84AAB355DF30ED85CF54
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f9e8d99a85a4b249ef5975ad8493f5e0496b6c66a621e93685d451c565e5801f
                  • Instruction ID: 95c99b01626a6448bed4ef4f3e48c45fb4fe41168ac8aebb53a09e61545897ef
                  • Opcode Fuzzy Hash: f9e8d99a85a4b249ef5975ad8493f5e0496b6c66a621e93685d451c565e5801f
                  • Instruction Fuzzy Hash: ECC1EF74A09218DFEF14DFA8D484BEDBBB3BB49305F10802AE416A7346D7B05A45EF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8eff27c1236b2d8a5419146f41b1805e1b9156bc313614817dc7fde69fa0d4e3
                  • Instruction ID: 2d5504f192d7de2b156db3084b8dd1e3013237a55f39dbd84bc2fb0a1fbbac21
                  • Opcode Fuzzy Hash: 8eff27c1236b2d8a5419146f41b1805e1b9156bc313614817dc7fde69fa0d4e3
                  • Instruction Fuzzy Hash: 68C1F875A04258CFDB54DFA8D494BADBBF2FB49314F5080A9D00AAB399DB746E84CF01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d40b50153ab7498db636dec18b8d1dd4f10c2e8406ce7ef2d9852e9280bf586a
                  • Instruction ID: 19f4b892c071c0301de5dc7ba0c9d4701fcf6d4f805dc6e27b39ba390d06ea84
                  • Opcode Fuzzy Hash: d40b50153ab7498db636dec18b8d1dd4f10c2e8406ce7ef2d9852e9280bf586a
                  • Instruction Fuzzy Hash: 2A919D35B00218AFCB05CF65E544AADBBB6FF89351F108469E902D7390DB31DD42DBA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a04fe92c18539534246643c37bd49003e2eb6a55856d74c3b310683a992cb0e
                  • Instruction ID: 69c840b4f5f90ff1b14a4561002a2f9db23b667713a6ac87dadfe39b8522c302
                  • Opcode Fuzzy Hash: 1a04fe92c18539534246643c37bd49003e2eb6a55856d74c3b310683a992cb0e
                  • Instruction Fuzzy Hash: 11A1EE34B002298FCB14DF64C994B9DBBB6BF89300F5185A8D94AAB355DB70ED85CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc525e3f3119e985ee30e67377f2c00d456e4b85f859e6886ef5a367dc5538bc
                  • Instruction ID: 0ac213e58bcd2289790b417e202f22e7ecc6e84d6c37302e2a09e53f0eeb35e6
                  • Opcode Fuzzy Hash: cc525e3f3119e985ee30e67377f2c00d456e4b85f859e6886ef5a367dc5538bc
                  • Instruction Fuzzy Hash: BA913E34710228DFCB09DF68D498A6D7BB6FF89710F148169E9069B3A5CB74EC42CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d88abf2be02477bf9c2d6af3d1ca6a242719e325307f33704ae0acd3efe951da
                  • Instruction ID: 82827e5efcfacf15d44b547dfe83cdc834c9b0717d89f3ede44623e9b2b65161
                  • Opcode Fuzzy Hash: d88abf2be02477bf9c2d6af3d1ca6a242719e325307f33704ae0acd3efe951da
                  • Instruction Fuzzy Hash: 97810975A00219CFCB14DFA8C58499EBBFAFF48350B1585A9E8169B371DB30ED41CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b6e0e3d3848745d059eb9a7259dfe0a541d5a9d4042449319d9d701811cb8dbf
                  • Instruction ID: b80cb9297ed95149139184b8c41f8da6c67438acc4e2cafd075359d43c894a68
                  • Opcode Fuzzy Hash: b6e0e3d3848745d059eb9a7259dfe0a541d5a9d4042449319d9d701811cb8dbf
                  • Instruction Fuzzy Hash: 3291F675D04268CFDB54DFA8D494BACBBF6FB49314F6080A9D009BB259DB746A84CF01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8d393d1ebb8d897f685dd8941ca114792bf81deaa113f3c31007b879b156da73
                  • Instruction ID: 9053ab7a2f24b70f01ecc6fcb7db325c19db0846f3a6a79b702ddb78c9f1ae95
                  • Opcode Fuzzy Hash: 8d393d1ebb8d897f685dd8941ca114792bf81deaa113f3c31007b879b156da73
                  • Instruction Fuzzy Hash: 6371FF74E0520DDFCB08DFA9E889AADBBB2FF48305F10842AE416AB364CB755955CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 27c1c8c2b12f36c8cd9df00011372f7fd8af3c05855dd4382c3e3d3ce2b38f67
                  • Instruction ID: c8b20f8d755fa4ecf3592ab7c1a2f992c2de978747d6bdc71ea6b9f12c84e927
                  • Opcode Fuzzy Hash: 27c1c8c2b12f36c8cd9df00011372f7fd8af3c05855dd4382c3e3d3ce2b38f67
                  • Instruction Fuzzy Hash: 6381E375A00219CFDB64DF68D880B9EBBB2BF49300F10859AD51DA7354DB30AE85CF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 536621f747d66ecfe515ea7dd0df1c4805203d95cc4f6431bb6e08a05ed49e94
                  • Instruction ID: 491f134decdc7f6423026b0c9eea007eb0f3e64896eceac52ec4896be98271a7
                  • Opcode Fuzzy Hash: 536621f747d66ecfe515ea7dd0df1c4805203d95cc4f6431bb6e08a05ed49e94
                  • Instruction Fuzzy Hash: B2612E34B50618DFCB08DF68D498A6DB7B6FF89710F508169E8069B365CB70EC42CBA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8fa920b56fb723ffc5b3e23cd165a7a5845b5679baf5848206c748491bf4c362
                  • Instruction ID: 54170e5162631a4d235e458ce70a2b6c388766993099e4f539a2ba7460e456d2
                  • Opcode Fuzzy Hash: 8fa920b56fb723ffc5b3e23cd165a7a5845b5679baf5848206c748491bf4c362
                  • Instruction Fuzzy Hash: 786102B0E06208CFEB24CFA9D584BEDBBB6BF49304F208069D419A7255D7B49985DF02
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 376ec96b2c9ca5f4a96a03c7ae5724b9abe4a81131ea3e9ddb797234f2336a7a
                  • Instruction ID: ff9b7a8622ffaf6da7c67cfa9dbda9a04603f446d25dae9379d47357ee0f5ccb
                  • Opcode Fuzzy Hash: 376ec96b2c9ca5f4a96a03c7ae5724b9abe4a81131ea3e9ddb797234f2336a7a
                  • Instruction Fuzzy Hash: 68518E34B116199FCB04EF64E498AAEBBB6FFC8711F008119F8029B364DF749946DB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e10e00de8b0fd0115078881484516a28b643aa1b5b6b96b3c1a91798c5b231d1
                  • Instruction ID: 1735d61bbe617a3f28d390f87e30c02aa9d740965aeda87ccbb3ce42f319a46a
                  • Opcode Fuzzy Hash: e10e00de8b0fd0115078881484516a28b643aa1b5b6b96b3c1a91798c5b231d1
                  • Instruction Fuzzy Hash: C05106B4D05219DFDB04CFA4D485BEEFBB6FB49300F20902AD106A7254DB385A89DF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8e65bcaf2e9a164c6786f5d47d2bb0592a10c545635bcc847347f5c5bd6d5d11
                  • Instruction ID: 92e3646dd1458904ab95cea9355293027166d2d91d68334ae09c8adc51266dda
                  • Opcode Fuzzy Hash: 8e65bcaf2e9a164c6786f5d47d2bb0592a10c545635bcc847347f5c5bd6d5d11
                  • Instruction Fuzzy Hash: 5641EE36B047248FCF65CB78E54469EBBF9FF84610B44886ED05AD7A48DA30F901CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8883163e2a7f1bc0452cbfcee9e123bc8f5ca3d399eed6024ccda2727f3e6240
                  • Instruction ID: dd9572307340013ce0f5aa3edaa1a76109e6022853c80929cf9f57e17d0b63fb
                  • Opcode Fuzzy Hash: 8883163e2a7f1bc0452cbfcee9e123bc8f5ca3d399eed6024ccda2727f3e6240
                  • Instruction Fuzzy Hash: 6B514A75E002199FCB04DFA8D885AEEBBF6FB89300F14C02AE415A7394DB31A944CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2bb3af9cde446446929b9d52e4d1d105c076ca081d64aa499bd0b29590b4e9e2
                  • Instruction ID: 6075e804fd88ad9af4afbb35836b6fcb75a4ee5afd8b21bf806b0939bdd39d3d
                  • Opcode Fuzzy Hash: 2bb3af9cde446446929b9d52e4d1d105c076ca081d64aa499bd0b29590b4e9e2
                  • Instruction Fuzzy Hash: 0E418C35B012298FCB58EF65D6047AA7BB6FBC4700F2485A9DD059B398EB34EC42C791
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4b020d427449fa8f50a525f22142b7d5929e92eea6a571fd279f6639595c768b
                  • Instruction ID: cf8c6ac3878e5679965d844050f7a74bf08cebe434e6bc6e103c359e7a78c98f
                  • Opcode Fuzzy Hash: 4b020d427449fa8f50a525f22142b7d5929e92eea6a571fd279f6639595c768b
                  • Instruction Fuzzy Hash: 1C412975E01219DFDB04DFA9E885AEEBBF6FB88300F10802AE515A7354DB71A941CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 05e3be58c5e6a82d182ce16560955fe4d69fae8a4e0c0a72b665a34b153b8c1c
                  • Instruction ID: c8b09530ae08db91b4d08a393d3cf9fed63a767998f2cda9e2f710d183aec5b7
                  • Opcode Fuzzy Hash: 05e3be58c5e6a82d182ce16560955fe4d69fae8a4e0c0a72b665a34b153b8c1c
                  • Instruction Fuzzy Hash: 47410575E042199FDB05CFA9D940AEEBBF6FF88310F14912AE425A7394EB305945CF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4277a2e69633765541bda41209047cbfc906d30c3f71ed3c1e5e065a9e2b5d37
                  • Instruction ID: 3c220e3d8dc12042bb538487f67284008f8ecd6b121bba69580349de220d6d19
                  • Opcode Fuzzy Hash: 4277a2e69633765541bda41209047cbfc906d30c3f71ed3c1e5e065a9e2b5d37
                  • Instruction Fuzzy Hash: 6641C235B0425C9FDB15DBA4D858AEDBBB5FF89310F148065D802BB2A5CB30AD04CBB4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 98baa4465a0dd7d32b8d56bc5f1f430dd78a7dd774c04118d0eb0d29ca3449de
                  • Instruction ID: 41e29a22612ade7b46f2027f7f0ccd4edfe420ded65bbf06cbabe0f58e7227a5
                  • Opcode Fuzzy Hash: 98baa4465a0dd7d32b8d56bc5f1f430dd78a7dd774c04118d0eb0d29ca3449de
                  • Instruction Fuzzy Hash: DC4145B5D04719DBCB05DFA8D890ADDBBB6FF89310F10862AE419A3354EB70A985CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 96b6bb2eb5dcbdba802eae424e68a330b61b108de777d5c8a18cedcb5cb556b3
                  • Instruction ID: df00d13ea00f410b06a10e82d5f7cdf1011c86176f1b4ea8b83757118752df9d
                  • Opcode Fuzzy Hash: 96b6bb2eb5dcbdba802eae424e68a330b61b108de777d5c8a18cedcb5cb556b3
                  • Instruction Fuzzy Hash: 3B31057960E3E45FD7075B30A824B643FB19F43204F0942EBD084CF1EBC62AA816D762
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 064c144f617465ad77e5db9ae396d6df1193df4d181b472426478b452e01ac84
                  • Instruction ID: 1c5ae2f4901e441e5654c82ef0095e51502227be379e87a18ccecaa62438060e
                  • Opcode Fuzzy Hash: 064c144f617465ad77e5db9ae396d6df1193df4d181b472426478b452e01ac84
                  • Instruction Fuzzy Hash: 1141C375A042298FCF04EF66C944ABFBBB6FF84701F00842AE905DB265E771D946CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1ed960a6793fbace13a5aa1db3fc7c7acd07ffb4ef00f62441fd8cd8c8cec67a
                  • Instruction ID: b3c28febc7329565ae6f46a31a0739e474fef8f91a0feb2e129812511f3bb050
                  • Opcode Fuzzy Hash: 1ed960a6793fbace13a5aa1db3fc7c7acd07ffb4ef00f62441fd8cd8c8cec67a
                  • Instruction Fuzzy Hash: 08412675D14719DBCB04CFA8D850AEDBBB6FF89310F10862AE419B7254DB70A985CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62e5254deb36550f3ace53f26056de3591d2810bdb148b81e1d121901b0598c1
                  • Instruction ID: fe96b136ce83dab3a4ec2f7d13d0f05009a07f2a3a6c2d22152f91048ee06775
                  • Opcode Fuzzy Hash: 62e5254deb36550f3ace53f26056de3591d2810bdb148b81e1d121901b0598c1
                  • Instruction Fuzzy Hash: CA51A175A00229CFEB64DF29D955BA9B7F2BB89300F1081EAD40DA7359DB705E81CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 80461ab7f0b8df7f28a4421bb0d0234589308cacd788a312a2422bb5649273e3
                  • Instruction ID: 6754939d0770952ae5ce113018dd7038876132900a0b962121ea21cb2e17bb42
                  • Opcode Fuzzy Hash: 80461ab7f0b8df7f28a4421bb0d0234589308cacd788a312a2422bb5649273e3
                  • Instruction Fuzzy Hash: C351E375E04229CFEB60CF29D949BADBBF2BB49304F1081AAD419A7349D7705D84CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c66b8ae2b11cc95fec5deab72cb8dbfb9dd81aadd548b7fa6f767b809fdbd92b
                  • Instruction ID: 2f4ac9d7e42e73ad7b9bf56451d0e4e88a8d4341922f5dbe2793831d267af8ab
                  • Opcode Fuzzy Hash: c66b8ae2b11cc95fec5deab72cb8dbfb9dd81aadd548b7fa6f767b809fdbd92b
                  • Instruction Fuzzy Hash: 14310A36611118AFCB05DF58D988E99BBB6FF48320B1680A8F9099F3B2C731EC55DB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c18adf4053338a23b04e1be3868294787a3477f772323f1f897749f63b10ae9b
                  • Instruction ID: 75a20eb893c363de63f85329b72200f86c34fa5039404a755eed576f605b8e16
                  • Opcode Fuzzy Hash: c18adf4053338a23b04e1be3868294787a3477f772323f1f897749f63b10ae9b
                  • Instruction Fuzzy Hash: 114127B4D05219DFCB04DFA9C881ABEBBF9EB49300F10846AE819E7354D7309A81CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6b1fe08fc470041d6430f30a6bdde8ce796b732503cf979df70c1b1ca90a2eb4
                  • Instruction ID: 006d869c1ec4032785aa7849b480ac96a1f7f22066735340c92ffda6f59546e2
                  • Opcode Fuzzy Hash: 6b1fe08fc470041d6430f30a6bdde8ce796b732503cf979df70c1b1ca90a2eb4
                  • Instruction Fuzzy Hash: 3F41CD75E00229CFEB64CF29D955BADBBB2BB49300F1081AAD409AB258DB705E80CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c98fab70adf991c2726d68d011549ef8e30f88c140f52e828748bb64f21b62bb
                  • Instruction ID: 16f695163482f3eb7b2bbebe779ffb1dbe5c407e94c25256cd719b7644adf170
                  • Opcode Fuzzy Hash: c98fab70adf991c2726d68d011549ef8e30f88c140f52e828748bb64f21b62bb
                  • Instruction Fuzzy Hash: DF41BE75A0422DCFDB64CF29D949BADBBF2BB59314F4081EAD409A7249DBB05E84CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fb148a24504cf9063509dce46f3ade40fd4922e0202f223ac3d7dbbad8198adf
                  • Instruction ID: 215c6fb228ababe2313f86bbfd7a4a1c7984ac755c5522ec3ef13d6408bb5f66
                  • Opcode Fuzzy Hash: fb148a24504cf9063509dce46f3ade40fd4922e0202f223ac3d7dbbad8198adf
                  • Instruction Fuzzy Hash: A441D275A04229CFEB60CF29D999BA9BBF2BB59304F0081EAD449A7349D7705E80CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e09458f7bbf0be0be694db04f7cd3f136ac2496c2d1a908a1005c17653e031da
                  • Instruction ID: 928058c0d3243be97a508404b4fe7c8eae5e97288e96cf84033ab07767b7c175
                  • Opcode Fuzzy Hash: e09458f7bbf0be0be694db04f7cd3f136ac2496c2d1a908a1005c17653e031da
                  • Instruction Fuzzy Hash: DD215C39F012258FDB58EE64D6447BA37B6FB84750F1485A9DD059B388EB34AC42CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c7860a2ef3e20a5d28883024baf99af72fec244a107b1e132c771e931360b309
                  • Instruction ID: d953c01372f1d7d6aa5d21e55ee17db0ea718e141fe59aea677f5483c22c5182
                  • Opcode Fuzzy Hash: c7860a2ef3e20a5d28883024baf99af72fec244a107b1e132c771e931360b309
                  • Instruction Fuzzy Hash: 9331A170E1421ACFCB49CF68D4406EEBBB6FF89210F0485A9D815AB355DB30EA45CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c45581b983bf4317550d8c83b4a9bc25f9b9b009a1e436238feb079c81ff17c
                  • Instruction ID: 3e60da15cfd8e21068396b573fcdab8f2d5cec43458993d014ba579e32a25794
                  • Opcode Fuzzy Hash: 7c45581b983bf4317550d8c83b4a9bc25f9b9b009a1e436238feb079c81ff17c
                  • Instruction Fuzzy Hash: 2C41C075A00229CFEB60CF29D949BA9BBF2BB49304F1081EAD409A7249DB705E80CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c294f25b5b3229ef5478a0a0cc2521acce073d728ec59cafdd33c5141c12cd83
                  • Instruction ID: 359d23ef4c3814426441277c604a11e0d2b0daf413b0d00bfaae1d04b3081b52
                  • Opcode Fuzzy Hash: c294f25b5b3229ef5478a0a0cc2521acce073d728ec59cafdd33c5141c12cd83
                  • Instruction Fuzzy Hash: DC41CF75A04229CFEB64CF29D949BA9BBF2BB59304F0081EAD40DA7249D7705E84CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b306fee7123814b3137b8ca8d0e1d2743ec21de42debadc815c65872597f0590
                  • Instruction ID: 576e6fac53a7f568feb89efea656f14d093918b52e2a42c35191f9e2ebca7960
                  • Opcode Fuzzy Hash: b306fee7123814b3137b8ca8d0e1d2743ec21de42debadc815c65872597f0590
                  • Instruction Fuzzy Hash: 4E210D313082144FD725CB69E594966BBEBEFC1321B19C47AE90ECB256DB31EC81C754
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a852a8993d861d11e6a610c1f19f48f0a85f66255cf577bf6702e0b1983c3fca
                  • Instruction ID: 2b32c5e4a02734f3d35f77c8a1ad348a32b8d15a1369b8c012320889fa058871
                  • Opcode Fuzzy Hash: a852a8993d861d11e6a610c1f19f48f0a85f66255cf577bf6702e0b1983c3fca
                  • Instruction Fuzzy Hash: BC41C075A04229CFDB64CF19D949BA9BBF2BB49304F0081EAD409A7245DB705E84CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 51675d60413b8df2d9f15ca77620f6c070b1d2b6bbe68d065f030010c3d692eb
                  • Instruction ID: 6ddbf1ee1a2a06748d16e31c5d7420fa7c7a1f85000361d7654996965594c82d
                  • Opcode Fuzzy Hash: 51675d60413b8df2d9f15ca77620f6c070b1d2b6bbe68d065f030010c3d692eb
                  • Instruction Fuzzy Hash: 73314675E08229CBCB08DFA9D844AEEBBF6FB89300F10902AE515B3348D7345A41CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 24035dde2196766a3e898abc5cf64792cd349b00110c8dca28208996e2f96010
                  • Instruction ID: 82ff8704e21dd6e0e8253a6c146bd0d5ee237437fb064d419b4cb250e0ec3925
                  • Opcode Fuzzy Hash: 24035dde2196766a3e898abc5cf64792cd349b00110c8dca28208996e2f96010
                  • Instruction Fuzzy Hash: 0C31E3B2A08218EFCB15DFA4C84088EBBFAEF49300F04856AD545DB252DA31EC05CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bfb86ee267681e6caf702b625f54b0313dae9d9fdc797f7ef0e894d106f5779c
                  • Instruction ID: df5f35076297789f7f2f3bea632ed4aa339d6b6a617374867458aae98015320e
                  • Opcode Fuzzy Hash: bfb86ee267681e6caf702b625f54b0313dae9d9fdc797f7ef0e894d106f5779c
                  • Instruction Fuzzy Hash: 5541CD79E04229CFEB64CF25D959BA9BBB2BB59300F0081EAD449A7248DB705E80CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 96b91cddad2d8015d808a813d48935efa5b1e90300fc51d66632d9d7bc7a1ef1
                  • Instruction ID: d49308ea6d2f3be31680b6b312a5dbfd483579a205d9f4283fdfdc11d804dc51
                  • Opcode Fuzzy Hash: 96b91cddad2d8015d808a813d48935efa5b1e90300fc51d66632d9d7bc7a1ef1
                  • Instruction Fuzzy Hash: 37315070E1421ACFCB48DFA9D5406EEB7B6FF88210F109669D915AB354DB30DA45CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7524ba349b778b3c7e4ae2562fd9a1e7ca93a6f62947ada4315cea10027483be
                  • Instruction ID: 72083db7c39183032534fbf70d3fb6e1cfeb6c42706739bd3a4c7e18da42d411
                  • Opcode Fuzzy Hash: 7524ba349b778b3c7e4ae2562fd9a1e7ca93a6f62947ada4315cea10027483be
                  • Instruction Fuzzy Hash: 1C319274E01219AFCB14CF99D585AEEBBF2BF89310F10802AE915A7364DB71AD41CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc2064d2ab2ed8762edd2b09dfa32592723dab94f5deaa81dde063bf10c8a231
                  • Instruction ID: a1a5e33a61b437f0547c65c9e6bf800e636a862bec51a7746a5605f8a7c1e660
                  • Opcode Fuzzy Hash: cc2064d2ab2ed8762edd2b09dfa32592723dab94f5deaa81dde063bf10c8a231
                  • Instruction Fuzzy Hash: 6C310475E08219CBCB08DFAAD444AEEBBF6FB89304F10902AE515B7348D7345945CFA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4789be049f2e168f4be5820f7242ee0c1a3acf33d083590b61f0037e79ce5726
                  • Instruction ID: d0c24fe9c01e4cc20d17310b4ba28611d52ae02eb2d90d05e79f0df9b3484a06
                  • Opcode Fuzzy Hash: 4789be049f2e168f4be5820f7242ee0c1a3acf33d083590b61f0037e79ce5726
                  • Instruction Fuzzy Hash: 053129B890A609DFDB04DFA9D1487ADBBF1FF89309F10C0AAC415AB358D7744A94CB41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 46d7cf0bbfc49f27f6f0a3601ad7a8112554efb2cbe6e3b2aa2de852aa2bfb8c
                  • Instruction ID: 62027b86ce683b2829473c0b4c8a46838477dede4b890ee0314609b6f1a53067
                  • Opcode Fuzzy Hash: 46d7cf0bbfc49f27f6f0a3601ad7a8112554efb2cbe6e3b2aa2de852aa2bfb8c
                  • Instruction Fuzzy Hash: 6631F870905129CFDB34DF64E444BBDF7B6FB4A305F2095A9E819ABA46C7709984CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 48a092e7adea19bfcd8bddd99f16559db3f2dfbc7c0e4a86ac37781059704c2e
                  • Instruction ID: 501a6a3887a1f965ea71ab2046139e2fe21c75c886d57f052d0324d60dd90db6
                  • Opcode Fuzzy Hash: 48a092e7adea19bfcd8bddd99f16559db3f2dfbc7c0e4a86ac37781059704c2e
                  • Instruction Fuzzy Hash: E83189B4E05619CFDB08DFA9C8443EEBBB6FB89304F14846AC524B7244DB750984CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f22c61b696668fbcb0f8a0a17c0d3ed2352b95da5deaf5b8c10a862c160ed17
                  • Instruction ID: 6390ca2239856c1f413c92fc558dc4021fa6539fc2f1b7d7be679493a48d82dc
                  • Opcode Fuzzy Hash: 4f22c61b696668fbcb0f8a0a17c0d3ed2352b95da5deaf5b8c10a862c160ed17
                  • Instruction Fuzzy Hash: BC41DF75A0422DCFEB64CF25D959BA9BBB2BB59300F0081EAD40DA7248DB705E80CF11
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0a9e551e271d2da4ae2429e5e5c72899830780d9fee439f76f4102bc9aae7623
                  • Instruction ID: 90e898a8f7ec3cf8a0ac9d504b0ca37a55ca19e211a226456fb19c59bcfe7808
                  • Opcode Fuzzy Hash: 0a9e551e271d2da4ae2429e5e5c72899830780d9fee439f76f4102bc9aae7623
                  • Instruction Fuzzy Hash: 3A41BE75A00229CFDB64DF29D959BA9BBF2BB59300F1081EAD40DA7344DB705E80CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 49977073d23146678c9a0bbe4c4eb7c8fc57e828288bd2aef7b82f4b3c6c3f9b
                  • Instruction ID: 2e8947a8e17dc428891e83a55bd0cbeeb73d1a798e531a39f39ea526b70857ad
                  • Opcode Fuzzy Hash: 49977073d23146678c9a0bbe4c4eb7c8fc57e828288bd2aef7b82f4b3c6c3f9b
                  • Instruction Fuzzy Hash: 14218534B006198FCB04EF68D54486EB7B6EFC9200B10412AD50697324EF70AD46CBE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ed30af8a8570ab279f8416221065a902aca19e30161f045e47421fadee7dfe2a
                  • Instruction ID: c3300d99ca0078c0b0ddacd21ca2885f874726d1c2abe6b92916c8add6323c0f
                  • Opcode Fuzzy Hash: ed30af8a8570ab279f8416221065a902aca19e30161f045e47421fadee7dfe2a
                  • Instruction Fuzzy Hash: 6A212874D052198BCB04DFA9E8097FEFBB6EB8A314F04906AD815B7740DB741A84CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 78a8cb22e313d5a224cb5f7cd23b8c48d283391a4710607ab122258f264ea604
                  • Instruction ID: a82e1ed49e7d70e3ea1fa535e54c36a7ed8f3be4042aad25c22292c804ab676c
                  • Opcode Fuzzy Hash: 78a8cb22e313d5a224cb5f7cd23b8c48d283391a4710607ab122258f264ea604
                  • Instruction Fuzzy Hash: 4021D772B012148FC758AF7C9444A1D3BF7EF88711B1181AAE415DB3A5EF35DC468B91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 015e6b6d81cf5d7fb2691e7fa21aced97f2faeb22a1e0062b583974bddf25bef
                  • Instruction ID: 8626f3ed35d1e8b268d3dd2bc5491a2443112d549c434ebf8fc8d54055b6c9ae
                  • Opcode Fuzzy Hash: 015e6b6d81cf5d7fb2691e7fa21aced97f2faeb22a1e0062b583974bddf25bef
                  • Instruction Fuzzy Hash: D7216231A141199FCF05CF58C4499DDBFB7EB8C320F148129E911A7390CB729886DBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 507284f17fbf55173fe45b239d58f69d596462a672535dd0dcc5921db056d4ba
                  • Instruction ID: 3e8c0fb69dab1bb64a4aef88652128266c0c1a922265baff11b138c8e57a24cc
                  • Opcode Fuzzy Hash: 507284f17fbf55173fe45b239d58f69d596462a672535dd0dcc5921db056d4ba
                  • Instruction Fuzzy Hash: 6A41D175A00229CFDB64DF25D959BA9BBF2BB59300F1081EAD40DA7349DB705E80CF11
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 93af6235db9fba46fed8741fc95b2ce171c0eb0866203f251e39adad13e23ae7
                  • Instruction ID: de0cc49b4dcf2b71d02ff7d6fc95f6741f77ec02351929ddb22763e17db02e3c
                  • Opcode Fuzzy Hash: 93af6235db9fba46fed8741fc95b2ce171c0eb0866203f251e39adad13e23ae7
                  • Instruction Fuzzy Hash: FF3138B890A50DDFDB08EFA9D1447ADBBF1FB89309F10C0A9C425A7348DB744A84CB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1cb761e84475c3c0dc9930874f299594244047f3d28d844c24de16853f9fa32
                  • Instruction ID: 2f5755bf5c0d0621e89462fe512cafbe6de204258e596de58c422adedb33177e
                  • Opcode Fuzzy Hash: d1cb761e84475c3c0dc9930874f299594244047f3d28d844c24de16853f9fa32
                  • Instruction Fuzzy Hash: A5217A71E00269DFDF00DFB8C504BAEBBF9AF08350F148066D919D7290EA38CA41CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 796efe1049681e3c5cbcc350aba5f75a20b022ad048b30ce8326757aca53e956
                  • Instruction ID: 09307bf645d584e14f832b873f22f5b08319856985b1567dd77fbb0310480079
                  • Opcode Fuzzy Hash: 796efe1049681e3c5cbcc350aba5f75a20b022ad048b30ce8326757aca53e956
                  • Instruction Fuzzy Hash: C3211836601218AFCB05CFA9D888E99BFB6FF49310B0640A9E6099B372D731EC15DB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f57fdc414276ab8afe99f4a301c25c31b891a6d0553f8aa560789cd87e0be324
                  • Instruction ID: 67e96fedfac3af607cf6f9a30e9bc667f571ac4f1c73f06e1afdb36dae2669f2
                  • Opcode Fuzzy Hash: f57fdc414276ab8afe99f4a301c25c31b891a6d0553f8aa560789cd87e0be324
                  • Instruction Fuzzy Hash: 94213935A402188FDB14DF54C545ADDB7F2FF88301F1045A4E801BB3A2DB36AD41DBA9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1705035161.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_11cd000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3811f283ad2ef7ce786eb5594605e76cb0cae006f5105523380ff92b61497b12
                  • Instruction ID: 66c4126148378e5c5a75c04800f1654416b3098ba31362f1223d7d18d5b3dd66
                  • Opcode Fuzzy Hash: 3811f283ad2ef7ce786eb5594605e76cb0cae006f5105523380ff92b61497b12
                  • Instruction Fuzzy Hash: 5D2121B1504200DFCF09DF58E9C0B66BF65FBA4B24F20C17DEA094A656C336E446C6E2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1705242919.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_11dd000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3bdd93412fe3bb52095279964de4a3f11b99bd22c3cec32cbebcabecd02a65e0
                  • Instruction ID: 307d24b016a05752545d9cf760afabbf0d90082da2ca65f2a85771df2ed7a72b
                  • Opcode Fuzzy Hash: 3bdd93412fe3bb52095279964de4a3f11b99bd22c3cec32cbebcabecd02a65e0
                  • Instruction Fuzzy Hash: 06210371104240DFCF19DF58E984B27BF65EBC4354F20C569E9090B286C336D44AC6A2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0f13cb3148cc4d8f9ae8812cfa190ffdb9e2c87adb30529cd93e4920e1e00a5d
                  • Instruction ID: 62bfd3f40a0294c89aa2b68046b234e56643ba5b9d0f49cae7b1fa98d08d6aa9
                  • Opcode Fuzzy Hash: 0f13cb3148cc4d8f9ae8812cfa190ffdb9e2c87adb30529cd93e4920e1e00a5d
                  • Instruction Fuzzy Hash: 3D21D4316102059FCB08EB69E84A76FBBE6FB88304F008939E419C7794EF71984697A5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 00ad84c8446a443c58fd8a834f8d60d74a9c754fd94c836060ba11bc85c789af
                  • Instruction ID: a3819f49815d2dc6ffc47172ea8c4ce0036d0bb28901c3c4c9198c47415fc84a
                  • Opcode Fuzzy Hash: 00ad84c8446a443c58fd8a834f8d60d74a9c754fd94c836060ba11bc85c789af
                  • Instruction Fuzzy Hash: 9C219874F00619CFCB05EF64D4448AEBBB6EF89300B10416AD5069B764EB74AD46CBE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 997cb56c8a0e841360f6bde68e5d57e9b0f8defe990d5944298597113c7e5912
                  • Instruction ID: 91d9e44582af7aa114159c255a5628aec96e8d3a0c4f2393e8397d55458eb807
                  • Opcode Fuzzy Hash: 997cb56c8a0e841360f6bde68e5d57e9b0f8defe990d5944298597113c7e5912
                  • Instruction Fuzzy Hash: 18211735A402198FDB04DF94C644ADDB7F2FF88300F1045A4E805BB3A1DB36AD45CBA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c0fb3fcdf78d09594f47c39730f577f457e1e5d0adb2689a6418361e19adf74
                  • Instruction ID: e2311cf08a5b2ce417dbf0615c1c93df56832ff1858797fd1a51fe2697e00c3c
                  • Opcode Fuzzy Hash: 7c0fb3fcdf78d09594f47c39730f577f457e1e5d0adb2689a6418361e19adf74
                  • Instruction Fuzzy Hash: 5A213474D05229CBCB04DFA9D4483EEFBB6EB89310F00906AD81AB7740DB741A80CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6d3238018f9bdba9f41cfef5e51ef7d5f1728327e2c07a070198568589b4efa2
                  • Instruction ID: f34cb75440181067a3e619d863b7acdec0877a66321bee6c1aca0364b415b970
                  • Opcode Fuzzy Hash: 6d3238018f9bdba9f41cfef5e51ef7d5f1728327e2c07a070198568589b4efa2
                  • Instruction Fuzzy Hash: 1A21D030A04A2AEFCB05DF58CA94AAAFBB9FB44340F41C165D8065B205D330F995CB89
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e9715a7639f2050ce1b48becf8dc9d8d0b7be5bfb9ac6ce395528c3d515ba05d
                  • Instruction ID: 6d5b2e6463a7737762f15cf276add830d04594bca7becee1e7688262223806fa
                  • Opcode Fuzzy Hash: e9715a7639f2050ce1b48becf8dc9d8d0b7be5bfb9ac6ce395528c3d515ba05d
                  • Instruction Fuzzy Hash: 1D214AB4E05209DFDF14DFA9D044AEEBBB2BB49300F20C169D625A7344D7749981DF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6392504e1c9bcddaa937d3c5727af537f888ba6b39b26335cfae87c96ed171e0
                  • Instruction ID: a04903b8d13ad356d7fd46b209e2937ac186ad185165d071f85533dcb7784837
                  • Opcode Fuzzy Hash: 6392504e1c9bcddaa937d3c5727af537f888ba6b39b26335cfae87c96ed171e0
                  • Instruction Fuzzy Hash: 2F214175A002298FCF14EF66D944AAFBBF6FF88750F004529D90597355E731A842CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0bcf0d6e9fe9b7ff6170e5809fa18a43ee3a0c73e1452b0bfb6c8f51636e035b
                  • Instruction ID: a9f357772797048255cfeb2e72f831c4c96d7f6629c5eec9af1b0b0340ff78bc
                  • Opcode Fuzzy Hash: 0bcf0d6e9fe9b7ff6170e5809fa18a43ee3a0c73e1452b0bfb6c8f51636e035b
                  • Instruction Fuzzy Hash: 6D113A717453146FCB01DB14DC58B6A7FBADB89300F1040EAE009DB29ADE31AC55D7A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 37941d45cc673c951b40c048a42b502a6b539d02e29d7e03e3b928e1803357c7
                  • Instruction ID: 5904e50d36812df30a73a2077471df97ad5487c878a4d3a42c395197ccc3e3c7
                  • Opcode Fuzzy Hash: 37941d45cc673c951b40c048a42b502a6b539d02e29d7e03e3b928e1803357c7
                  • Instruction Fuzzy Hash: AD21D5316102059FCB04EB69E44576EFBE6FB84304F008939E009C7794DF71984687A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3071b0c2faeaea8d8aa4fd7b9b56d0726d1161e3df34174585715b98be47b4f5
                  • Instruction ID: cc60f3e0e069776572e847ffe2460dffc0647c2b2479f3c97913a041cd1138d2
                  • Opcode Fuzzy Hash: 3071b0c2faeaea8d8aa4fd7b9b56d0726d1161e3df34174585715b98be47b4f5
                  • Instruction Fuzzy Hash: 5D212474D05629CFCF18CFA9D8446EEBBF6EB89310F1490AAD919A7250D7341985CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1705242919.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_11dd000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1304db02b9aadda1b6be89928643553b3bf60db437979e4c7ad58020c9e388a
                  • Instruction ID: dac62b7718407674774a478ebe895637f9cc13f1c10bb1fc1dcdbc7dd149e1d6
                  • Opcode Fuzzy Hash: a1304db02b9aadda1b6be89928643553b3bf60db437979e4c7ad58020c9e388a
                  • Instruction Fuzzy Hash: A021CF764093808FCB07CF24D994B16BF71EB85314F2881EAD8448B693C33AD41ACB62
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca7b22ccebe7f7d3a34b4f1b6f0238ee3066c5559123cd15cc39a8e0c6d439e6
                  • Instruction ID: 0577e16b0224e66b3dd4b393d5dbf09ea6ad487c2adaa7892cce4f56c179ac03
                  • Opcode Fuzzy Hash: ca7b22ccebe7f7d3a34b4f1b6f0238ee3066c5559123cd15cc39a8e0c6d439e6
                  • Instruction Fuzzy Hash: F02138B4D0421A9FCB04CFA8C880ABEBBF5FF49310F14855AE854A7355C7389A41CF91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c76d5c10f5e48fc3e4da98ee6bef0264cbe690b1969eda09ca28f4f16e0fe9d
                  • Instruction ID: b353356b356651945f89ea3646f7c547e1cf8cad1915ded0a03fe34570638270
                  • Opcode Fuzzy Hash: 3c76d5c10f5e48fc3e4da98ee6bef0264cbe690b1969eda09ca28f4f16e0fe9d
                  • Instruction Fuzzy Hash: 3511EB31B04219BFDB10CF798805BA97FF6BB48711F14846AEA45D7380DE75C941D760
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d5559ce19f65cfe75456745a54a3fe9119212b7c038cab10cb6063d6b44e6505
                  • Instruction ID: c0e11f899b84f3c709a27d30e6e6c4ae9d3a07229f53f89dc58f1779fa6bdb8c
                  • Opcode Fuzzy Hash: d5559ce19f65cfe75456745a54a3fe9119212b7c038cab10cb6063d6b44e6505
                  • Instruction Fuzzy Hash: 7D113474D05629CBCF48CFA9C4846EEBBF6EB88310F14906AD919B7204D7742A85CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ed10a2ed61cffd387552b038092a5a8dc41f1365257d0ceba987d5a4568f94f1
                  • Instruction ID: 71c79c356fd410308eba8fc27f5bb4fa9ebd95a279f2497acd655dd535f70d25
                  • Opcode Fuzzy Hash: ed10a2ed61cffd387552b038092a5a8dc41f1365257d0ceba987d5a4568f94f1
                  • Instruction Fuzzy Hash: CD114970D0420DAFCF40CFA9D881AAEBBB6FB58300F10C5A5E818E3201D2749A419B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 673adbc77e755ae68ac840e96e7ae3ca648e71dfa6a72f6b0b076ac86b488e9c
                  • Instruction ID: 3aa0b1ed3327de99689a2cd877b68dde7a5a0eaf24c1236ff68d88a1453fd75f
                  • Opcode Fuzzy Hash: 673adbc77e755ae68ac840e96e7ae3ca648e71dfa6a72f6b0b076ac86b488e9c
                  • Instruction Fuzzy Hash: 39318478A01229CFCB65CF28C984AD9BBF1FB48304F1081E9E858A7355D7309E91DF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1705035161.00000000011CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_11cd000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                  • Instruction ID: f7ea02fbb06ab0a01c8bcbfedb2e4c372394bd1b823e782f81de6bbd3171858a
                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                  • Instruction Fuzzy Hash: C411CD72404280CFCF06CF54D9C4B56BF71FB94324F24C5A9D9090BA56C336E45ACBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 046875b04b5e7676bcd4a1aa356d5b935c5e3df99a3260bf50bedaecb5abaed0
                  • Instruction ID: 21c479fe200524fc5b98e2a20d2dc4b00b7786e394f0104eb190b58a523d2db3
                  • Opcode Fuzzy Hash: 046875b04b5e7676bcd4a1aa356d5b935c5e3df99a3260bf50bedaecb5abaed0
                  • Instruction Fuzzy Hash: 9E218B78A42619AFCB04CFA8D594EADBBF2BF49300F244058F906AB360CB35AD41DF54
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b0bbc70a3e5bf8e3f06a46a63798d9a8b9400aa0861c2c18ccdb20c4398c23d5
                  • Instruction ID: 5416fb029860f7308ee332668161146e72af0cb2d3fea79cac14ccc7571d9b94
                  • Opcode Fuzzy Hash: b0bbc70a3e5bf8e3f06a46a63798d9a8b9400aa0861c2c18ccdb20c4398c23d5
                  • Instruction Fuzzy Hash: 4311C630B00218AFDB14DF699805BAE7BF6AB88311F10846AEA15DB380DE35C941DBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a9114b3810fd948768eb81af4f2dc8a572e5c1ff4b9f9b6bd3e10a158a7f751e
                  • Instruction ID: bfb8e7f7bb5e80666957ad43f6ef226b65a6af7e6139ce8fc637d5e8ecc26dd5
                  • Opcode Fuzzy Hash: a9114b3810fd948768eb81af4f2dc8a572e5c1ff4b9f9b6bd3e10a158a7f751e
                  • Instruction Fuzzy Hash: 85118EB5904119EFDB04DF99E489BADBBF6FB46304F1594A9D418AB348D770A940CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7a66e71627eeb3af598d0f18d544a6bb3b3bd6581bbab7d7f9123b4502936854
                  • Instruction ID: df29f6c5dfd19d22642ab16da23b0b1cf28d6e07d928df93a3148a84f0f2e969
                  • Opcode Fuzzy Hash: 7a66e71627eeb3af598d0f18d544a6bb3b3bd6581bbab7d7f9123b4502936854
                  • Instruction Fuzzy Hash: 18116D74905228DFEB14DF69E884BEDBBF6FB4A304F5080A8E409AB345CB745984CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d486f70c3ca64f4ac31461d1d99563669cc11090e9ecf9704c73820b9ad80aef
                  • Instruction ID: 2233a371b0a223d627d13ae2f110cf191d06bbd00324d479e1da5ecda4078524
                  • Opcode Fuzzy Hash: d486f70c3ca64f4ac31461d1d99563669cc11090e9ecf9704c73820b9ad80aef
                  • Instruction Fuzzy Hash: 8301A736350214BFDB008F59DC84FAB7BA9FB89B61F108026FA15CB3A0DAB1D801D760
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f1de49965470099756e9ada40d74c0c2f1c8c36997500145b2e74066db0e5a9
                  • Instruction ID: fbae68464d8007caf3a7797e4ef705b39d0912180b1799ed67a0bdf59bf14803
                  • Opcode Fuzzy Hash: 3f1de49965470099756e9ada40d74c0c2f1c8c36997500145b2e74066db0e5a9
                  • Instruction Fuzzy Hash: C621C474D1521CCFEB24CF64D948BEDBBB1FB09304F1081A9E55AA3291EBB00A84DF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 71293cf385eade0970e597ab34cee70716e2b5ba868c248f3055c4990bc014ea
                  • Instruction ID: 4dd095f8a6c55239350bc46c2dec0b733f7b2e8aa89ed66105d3695cc3402c1c
                  • Opcode Fuzzy Hash: 71293cf385eade0970e597ab34cee70716e2b5ba868c248f3055c4990bc014ea
                  • Instruction Fuzzy Hash: 9611E5319097499BCB02DFA4C8009DDFBB0FF8A310B14959AD55877251DB32EA96CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 01850fdd39525fbab18993a7e041eeaa7b812b06b54b405ff9feb9c0988aa1eb
                  • Instruction ID: a64d6669b2fe7195d39a005978112aa68425f47c85b81a8411fbb3456b9032dd
                  • Opcode Fuzzy Hash: 01850fdd39525fbab18993a7e041eeaa7b812b06b54b405ff9feb9c0988aa1eb
                  • Instruction Fuzzy Hash: 48F042A2B4D2B50FD71215382C71059AF6AEBD31D070444BFED81CB243D5194C0593B6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 567a1957fc8e22570e53e2a8b655e757a6bd84ce3447bf4280a5965894cc60cf
                  • Instruction ID: ef68b974b1635254cdd8805d993e887315815578d1314b7742d17e46ffad8ec6
                  • Opcode Fuzzy Hash: 567a1957fc8e22570e53e2a8b655e757a6bd84ce3447bf4280a5965894cc60cf
                  • Instruction Fuzzy Hash: AE01F7313041149FC7119B5AD9889ADBBA6FF89320B404079F909CF37ADB31EC458750
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b5e8e521d558d60f487319c2825710fd0a58f953454b2805fa0fddd2af5fe3cc
                  • Instruction ID: a7e6ede4abee1c66fedf31c77c51923bbb149a4e896233d5f53b4c386fc57bfc
                  • Opcode Fuzzy Hash: b5e8e521d558d60f487319c2825710fd0a58f953454b2805fa0fddd2af5fe3cc
                  • Instruction Fuzzy Hash: B3110670A1522CCFDB68DFA5E894BADF7B2FB4A704F0081A9D40AAB254CB305D81CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 417dcc6194211dcb18d8a79825fb5073f4c1faf44ef4715f1e8ab4b5d619bfb5
                  • Instruction ID: 10dfb7338f97f58d51422e105f67e3003c9c193b9d50cafca264fc79665baae3
                  • Opcode Fuzzy Hash: 417dcc6194211dcb18d8a79825fb5073f4c1faf44ef4715f1e8ab4b5d619bfb5
                  • Instruction Fuzzy Hash: EC119E35610305CFCB05AF60E85506EBB73FF86312B10882DE80287390CF36A847DB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eb0f9559bc8030fc9be98632a902e50890de5cafdccdab847df72e8eb301bd9b
                  • Instruction ID: 2f7e0efc14502dbcef4229f5bc038dbcd5704c427943cf4886f337c6545a0224
                  • Opcode Fuzzy Hash: eb0f9559bc8030fc9be98632a902e50890de5cafdccdab847df72e8eb301bd9b
                  • Instruction Fuzzy Hash: 861179B8D0A258DBDB08CFD8D58479CBFB5EB49304F2094A9D408A7359C7324906CF41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3fa523a293220aea2828383b5e7be4224797dafde3f304c551dfb210c7d1cd7
                  • Instruction ID: 48c10140ad46a783f02822bd396b41f123bbf9631708a8105ac43f68f57ddd4f
                  • Opcode Fuzzy Hash: a3fa523a293220aea2828383b5e7be4224797dafde3f304c551dfb210c7d1cd7
                  • Instruction Fuzzy Hash: D70126303043585FC7299B34D454A3A7BA3ABC6310F144568E91A4B7A1CB70EC42D7A4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: de38cb60b46187066f146f98e761c5b42bdeedffb5758d34629af64b157509bf
                  • Instruction ID: 1a8b542c76571759a6824169c9cd2392d8cef928f61e90b2b16ffa06d036347b
                  • Opcode Fuzzy Hash: de38cb60b46187066f146f98e761c5b42bdeedffb5758d34629af64b157509bf
                  • Instruction Fuzzy Hash: AC116FB5E012288FDB68CF58CD95BE9BBB1AB88301F1484E9E90DE7351DA305E80CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0263aa9328e2c0a3cdf102f959a7cf5151a052480094a1b21de2509f80291a63
                  • Instruction ID: 4ca7bde5a5fe1fcfcd05814655c44667a5aae2e1841e9d6d55ffa62ba95f06a5
                  • Opcode Fuzzy Hash: 0263aa9328e2c0a3cdf102f959a7cf5151a052480094a1b21de2509f80291a63
                  • Instruction Fuzzy Hash: 6801D4383016149FC7099B34D11881A7BA2EFCD7127008169E90A8B7A9DF71EC03CBD5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 78003fffac3b70258b8262104a78b4ba906cc1187953c8d37b2aadd97c9a87e6
                  • Instruction ID: d45ea50153546ed99efbc4df3eb27ab40965240e778b390e139ba85fa2171e72
                  • Opcode Fuzzy Hash: 78003fffac3b70258b8262104a78b4ba906cc1187953c8d37b2aadd97c9a87e6
                  • Instruction Fuzzy Hash: A4014E31B4D3291FF70646285814B2ABBA59F89310F0504AAD94ADB395CF67AC8183D4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c8f43c712d2d53aabbb68dd9b9478b0fe728c819c4ff3e49fa3ca88d082ace7
                  • Instruction ID: 0bceec7690a0ad798559d2f031bfe7bb2eb077eb0f9266883b73399287e77ec7
                  • Opcode Fuzzy Hash: 9c8f43c712d2d53aabbb68dd9b9478b0fe728c819c4ff3e49fa3ca88d082ace7
                  • Instruction Fuzzy Hash: 3411B3B0E0020A9FCB48DFA9C9456AFBBF5FF88300F20856A9418A7354DB359A418B91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: af920ffbc72a59c102fa244fb2bebe13c20199bb322524c8fcec9e615a11005f
                  • Instruction ID: 4657eb3750fcff63621aa6ec7c7916a785d23d15131fca37f30057a65a0d83e5
                  • Opcode Fuzzy Hash: af920ffbc72a59c102fa244fb2bebe13c20199bb322524c8fcec9e615a11005f
                  • Instruction Fuzzy Hash: DC112A70E1021CCFDB24DF65D980BADB7B2FB86300F5080A9D409AB254CB305980CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e6264b418e1709e924da0a661af526df82f2c97e4a92551b380aacfd8c34d0b0
                  • Instruction ID: 42bf071cfc73d6f602975b8cc30c26a86fd581e0aa6ab7efdbbe7b5de6e94c54
                  • Opcode Fuzzy Hash: e6264b418e1709e924da0a661af526df82f2c97e4a92551b380aacfd8c34d0b0
                  • Instruction Fuzzy Hash: 9A01B5307007289FC7189B34D454A3A77A7BBC9310F14462CE91A4B795CB71EC42C7A4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cfef81fd8d1e25c7d6b15f7df4148538c03d86b3b9ce7299a7b8f80fe40b6076
                  • Instruction ID: 7e61114cae38ea326b5c6e2a640a0f8bcce8b0369cf406bf086e773dca3dee06
                  • Opcode Fuzzy Hash: cfef81fd8d1e25c7d6b15f7df4148538c03d86b3b9ce7299a7b8f80fe40b6076
                  • Instruction Fuzzy Hash: BAF02D303483388FC72B5A2098187693F6AAB42240F1804ABD5059B28ADA72FC05CB20
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 90644a2c2c61bc6019be9805d7ee8edeff7f2c42491533ecd2cbeafaf44ad2d3
                  • Instruction ID: ea52ddf78ae69e9fa297a0cfab13785807f53f782335e7b0a8a66db83d7eecd6
                  • Opcode Fuzzy Hash: 90644a2c2c61bc6019be9805d7ee8edeff7f2c42491533ecd2cbeafaf44ad2d3
                  • Instruction Fuzzy Hash: 44012DB0D0A209DFDF54DFB995406EDBBF2BB49300F1481AAD628E3205E7308684CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d46886646d1870bbd33c794af78f021c29e63b44c1f84fb2f937160474351c93
                  • Instruction ID: bee7c9b8fa823ef95350b6d6c1c22810fbbdf5ac771997f81ccbbea87d64132c
                  • Opcode Fuzzy Hash: d46886646d1870bbd33c794af78f021c29e63b44c1f84fb2f937160474351c93
                  • Instruction Fuzzy Hash: 2C01D835E04618DFCB01DFA9D50449EBBF5FF89310F1080A9E409E7314EB30AA09CBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f30373efa01e2acb78fee606dd8080f63050ebe032ec102dc5bdce468df822fa
                  • Instruction ID: f69a7e8dce6eecf4b1741ffcdb0db7b0d5a5cae6f4f0f47618ba0968305e0310
                  • Opcode Fuzzy Hash: f30373efa01e2acb78fee606dd8080f63050ebe032ec102dc5bdce468df822fa
                  • Instruction Fuzzy Hash: 1821D778904129CFDB64DF28D988AD9BBB1FB49308F1080E9E459A7765DB349EC8CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8e4d6ec5435359f1a978b673358698fd14c4bfedc10c332725278c48f16779a5
                  • Instruction ID: 9aac7fe5729f5b4d7cf6d1266bb1914eec1f0e31db882374307f4db34b35f816
                  • Opcode Fuzzy Hash: 8e4d6ec5435359f1a978b673358698fd14c4bfedc10c332725278c48f16779a5
                  • Instruction Fuzzy Hash: 2801D3B8D0525DAFCB44DFAAD8409BEBBF9EB48300F10856AE855E3344D7305A50DF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 77daa65add6d70353b9eba3cbcd62d70a5ed1858fba0e83801da71b10ff45917
                  • Instruction ID: eb70a2c19a7b166cc9885f542dbbe4b0cc2a26c08cd7efe0477ccb3fb6c6fde0
                  • Opcode Fuzzy Hash: 77daa65add6d70353b9eba3cbcd62d70a5ed1858fba0e83801da71b10ff45917
                  • Instruction Fuzzy Hash: C7F0FC35B0011CABDB19951ED488D7AB7AAEB84220B054026ED19D7321DE349D1A87D4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: daced5fa3c30efec3bf7a803b75c75e2c986008a1edecc878bed986da00a57ec
                  • Instruction ID: 3dfcb3679cfc29f2ee3a77d207b7d1b0972e560c195db92d125cf9354649a31e
                  • Opcode Fuzzy Hash: daced5fa3c30efec3bf7a803b75c75e2c986008a1edecc878bed986da00a57ec
                  • Instruction Fuzzy Hash: A2114F7894511ACFC764EF14D5847DABBB2FB54304F0080EA9419B3745DB305E81DF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0f1903e0b46ebbd8d8a8e45a5f67a482c2578493a10c141fe8006c8f2e2df7cb
                  • Instruction ID: 927942c14a7a6a094fe234045f5579b9c530ad36dbe2c0ffae0b9fd5427eae14
                  • Opcode Fuzzy Hash: 0f1903e0b46ebbd8d8a8e45a5f67a482c2578493a10c141fe8006c8f2e2df7cb
                  • Instruction Fuzzy Hash: B9F0C235304368AFC3018F29DC84D5A7BB9EFCAA6131580AAFA09CF222DA31DC05D765
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc26c57bc32887957c6b4da7473a14e31a97f7a8c782c955b5c70d6bc24ae4da
                  • Instruction ID: a055929cd5764e33ef4d1ef3e7c4cc7376aa29cb500ea304b4ef6fae56909525
                  • Opcode Fuzzy Hash: bc26c57bc32887957c6b4da7473a14e31a97f7a8c782c955b5c70d6bc24ae4da
                  • Instruction Fuzzy Hash: 7D01D6312443055FC711DB28D884D8BFBE9EF85310B05863AF45A8B665CB70E849C790
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40ed2fe9401ffb5b25ec02b21c6ee9561091e708a0b529235f6619e5c43ab6ee
                  • Instruction ID: c59f203faf104d9ea47454da34fffb6db8292fec385a49bcbd3e37f2d92c5928
                  • Opcode Fuzzy Hash: 40ed2fe9401ffb5b25ec02b21c6ee9561091e708a0b529235f6619e5c43ab6ee
                  • Instruction Fuzzy Hash: 72016970E0A208EFCB54DFA8D8406ECBBB5EB05300F1084AAD804A6350D6759A91EB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 385fe453883b7bf41f40f0a28db46b7f3b7568c1fc71c76b8975037cfced35ee
                  • Instruction ID: dd0547616aa61258177c053c8c9987db5e9ca3c529b896c5c6f4370a732946a2
                  • Opcode Fuzzy Hash: 385fe453883b7bf41f40f0a28db46b7f3b7568c1fc71c76b8975037cfced35ee
                  • Instruction Fuzzy Hash: 4F016D357016149BC709AB24D11491ABBA2EBCC7117108128E90A8B764CF35EC43CBD5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a6e722e44ae1c4d8d683af67e038a272cc83edf1c0f9cce90ebc44eeb7c82712
                  • Instruction ID: a713bb23bcce68269a2442deae2d99e85808a3dad9ee96190e1b57289ae68257
                  • Opcode Fuzzy Hash: a6e722e44ae1c4d8d683af67e038a272cc83edf1c0f9cce90ebc44eeb7c82712
                  • Instruction Fuzzy Hash: 2EF02B62F0E2A50FF71643282864335AF919FD6210F1844EAC4878F2AADA579843C394
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f2cb0fc2f2f9672d02c3ad2c19e04999b956ede64f329131aeaabe08967cd39
                  • Instruction ID: ea7d7adc59d2b114adf4dd50f7ec3b9bbeeb11e0d36c06c23c745ce471abd079
                  • Opcode Fuzzy Hash: 2f2cb0fc2f2f9672d02c3ad2c19e04999b956ede64f329131aeaabe08967cd39
                  • Instruction Fuzzy Hash: 82F0E936F442295FE7148618A814B2BF7AAEFCC720F144429E90B9B354DB77EC8287D4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61083a06b7d0187d429384c602cd25868a5444d8fcf5a3be39245ab07cf5ce73
                  • Instruction ID: df1f8e53518610bfc61b82b9dd40f9fde18768badcc9deb63f3657e7fc29f3a4
                  • Opcode Fuzzy Hash: 61083a06b7d0187d429384c602cd25868a5444d8fcf5a3be39245ab07cf5ce73
                  • Instruction Fuzzy Hash: 4CF062393403149FC7069B15D854E2A7BAAEFC9721F04806AF9068B370CA31EC02DB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: db752d86ba67b9e4443b094e8f2ac94236bf7c3a02bbbe7ea390e7bb615ed06d
                  • Instruction ID: e1e3e6882c040b1e959f14ae00a4a0a877e5b729de282d025568e82a3b0e87e6
                  • Opcode Fuzzy Hash: db752d86ba67b9e4443b094e8f2ac94236bf7c3a02bbbe7ea390e7bb615ed06d
                  • Instruction Fuzzy Hash: 940146B0D06208DFCB54CFA8D9443AEBBF5EB48301F1045EAD41AE3244E7344A80DB52
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 28dd386f6d7abc7af796d1fab542b17747dc0371dbdb7bf4b68547ad001b84db
                  • Instruction ID: 9c7a2b66a7c90a6b13a89c799e5a1ce52eac25cc8cde77e1e2acbc482faf5269
                  • Opcode Fuzzy Hash: 28dd386f6d7abc7af796d1fab542b17747dc0371dbdb7bf4b68547ad001b84db
                  • Instruction Fuzzy Hash: 2011E975A01208EFDB14EF58F499A9DB7F2FB49304F10856AE016AB364DB70AD41CF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ba9e07fa18dcf79ed3bc1c605269f48f09f60b01ffb7508dfaeabef375ddc13c
                  • Instruction ID: 46bf30da76d5c26bfa40df2757aa2d367faa2f9f41aca94f4e17d07ae0d53e43
                  • Opcode Fuzzy Hash: ba9e07fa18dcf79ed3bc1c605269f48f09f60b01ffb7508dfaeabef375ddc13c
                  • Instruction Fuzzy Hash: CBF06D6244E3E11FE7037B7C98B40C87F648E2322871A02E7C0D0CA4F3E459888AC78B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bb9355836aae34edb260a2f15239120d6feb84739ee34ce9412de9f1fe564b80
                  • Instruction ID: 803dfe11b3ebc97064eeb82d97d880936d8ee79959fe2a5ffec06c5eb4c34073
                  • Opcode Fuzzy Hash: bb9355836aae34edb260a2f15239120d6feb84739ee34ce9412de9f1fe564b80
                  • Instruction Fuzzy Hash: 39F06771A09208EFCB40DFA8D884B9CBBB4EB08300F2041EAE80893320D7719A91DB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 419656da3c9b33f6f15b300d86d19df56d441658267691a5ac2142bc134b8c8a
                  • Instruction ID: f36ca0e3243f2fca75c45b74f1e9c451f0643ca581bb68c4e44572d54c483609
                  • Opcode Fuzzy Hash: 419656da3c9b33f6f15b300d86d19df56d441658267691a5ac2142bc134b8c8a
                  • Instruction Fuzzy Hash: 5EF0B434E4E35D9FC746CBA8D95199D7FB0EB06201F1081EBD828DB35AC6319A02CB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f47aa90556456852556210c2bd0debd7e8f86933eb3dbc2fb08b1a7941f65d15
                  • Instruction ID: 024803e66517c1f0e6921655b4d854880ce2e7b83b290f171406fda9eed05312
                  • Opcode Fuzzy Hash: f47aa90556456852556210c2bd0debd7e8f86933eb3dbc2fb08b1a7941f65d15
                  • Instruction Fuzzy Hash: 30F062B480911CAFC741CB98D5415ACBFB5AF59301F10809AD85897356D6354A51DB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b139e93c152c3e5476da2c9018c2671e50f5088c413b5c9fb6adf47c13eefdb2
                  • Instruction ID: 7a4ef35334bbf1001f66397ae22c1e1c663d8095d568d6746604b42090ad7c41
                  • Opcode Fuzzy Hash: b139e93c152c3e5476da2c9018c2671e50f5088c413b5c9fb6adf47c13eefdb2
                  • Instruction Fuzzy Hash: 19F0E27290A20C9FC701DBF496457EEBBF8DB06200F1414E6DA04D7215F9319E01AB62
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ea57a4d79868d8d7bb3b691df5d6195c125d5b2acbb6ed874a2a28c837a694b8
                  • Instruction ID: cd3072fecd7798194e4f288b732af0dff7d0f45f2673b4a31cbb430f925bdf32
                  • Opcode Fuzzy Hash: ea57a4d79868d8d7bb3b691df5d6195c125d5b2acbb6ed874a2a28c837a694b8
                  • Instruction Fuzzy Hash: 8BF02E38A08318AFDB0ADF55D4882DCBFBAEB82212F04C096E445D7290EB700A81C794
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f01f92377c214ba31450ae55be8a6c402c588d07c66a8071b10143d06a9b128
                  • Instruction ID: 8fd02213ab9f57a6685a113d0a905f13c142fb05bd46ea4058e2be68bffc7faa
                  • Opcode Fuzzy Hash: 8f01f92377c214ba31450ae55be8a6c402c588d07c66a8071b10143d06a9b128
                  • Instruction Fuzzy Hash: 8FF0E5303503389FD729A678A81872A37AAEB81261F544479D60A8B388DE72EC01C3A0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f07ad8485e64492a9b4631d0b87a631df428ea23dcf364f7c4bd961946b604c
                  • Instruction ID: 810845f315296ea8da77b472fa2e8b498d2f5fdae72413f946747b7eccade0af
                  • Opcode Fuzzy Hash: 4f07ad8485e64492a9b4631d0b87a631df428ea23dcf364f7c4bd961946b604c
                  • Instruction Fuzzy Hash: ECF0967490975CAFCB51CFD5D844AFCBFB4EB0A200F14819AE86997345C6315A51DF60
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2056fb0e92cf5680c363d1f6ca64fe3c0688b1f025f5d69b38b80fefe8303a9d
                  • Instruction ID: 43a091fe27d8ad378269214e56be880f0ad081628d0d2d1ec7f6ec75af0968c2
                  • Opcode Fuzzy Hash: 2056fb0e92cf5680c363d1f6ca64fe3c0688b1f025f5d69b38b80fefe8303a9d
                  • Instruction Fuzzy Hash: F3F09AB5904208ABCB40CFD8C9456DDBBB1EF09300F209596DC1897314D6318B52DB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3efee5d48a550e43c4ca2000edbf157a50d16b56c6e41ea6dc94902a68fc8e98
                  • Instruction ID: 79484b832d9b126bf06421d212fdce915ebfd0f3655bfdea700850ae537ab16f
                  • Opcode Fuzzy Hash: 3efee5d48a550e43c4ca2000edbf157a50d16b56c6e41ea6dc94902a68fc8e98
                  • Instruction Fuzzy Hash: 89F090B190E3A89FC763CABCD44199E7FF49B02214F1505FAC540DB29AE7315582C762
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f8cf1f8e4306eba6a7d46241dbf1dbcb7d1f80f5d9f52a496398cac6b0809702
                  • Instruction ID: bba1ff1dd497aaaa5b96fe2546c8d752dad2dcbb8dd5c01edd76df8dbc08c34f
                  • Opcode Fuzzy Hash: f8cf1f8e4306eba6a7d46241dbf1dbcb7d1f80f5d9f52a496398cac6b0809702
                  • Instruction Fuzzy Hash: FEF05E393107049FC305DB19D454D2A77AAFFC9721B148069F90A8B360CA31EC02DB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5ba43744b23f0ecdf053a3426d7c963fcbb7923c57f3dd5dffb7f8272d2f8895
                  • Instruction ID: 8a1cf4e85f1d834e26690036c768d4befe031c4243374f3bb0786db23b7d9e52
                  • Opcode Fuzzy Hash: 5ba43744b23f0ecdf053a3426d7c963fcbb7923c57f3dd5dffb7f8272d2f8895
                  • Instruction Fuzzy Hash: 6F0114B4E0921CCFDB18DFA5CA48BEEBBB6BF49300F008195D00AAB215D770A945DF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3de695b67eb223bc59df8cfdb30aa4058f993b5be866e1e526b496c17fd139c6
                  • Instruction ID: ff9d972b7eaa681c26f8de0a8d918e9fa32dbdb310a94b3ca98ea7016ec62a29
                  • Opcode Fuzzy Hash: 3de695b67eb223bc59df8cfdb30aa4058f993b5be866e1e526b496c17fd139c6
                  • Instruction Fuzzy Hash: 2DF0E23450E258ABCB1BCBA4D5818ECBF749B03304F29C0EEE8485B397D6329903DB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 02bc1d487b8e3e52da223c7d0881ba87b716137150f5c29be83b60121d4a919f
                  • Instruction ID: c44a6c12206e41735befee6acce3c97d98758679e38aabf8205d68ff35532a21
                  • Opcode Fuzzy Hash: 02bc1d487b8e3e52da223c7d0881ba87b716137150f5c29be83b60121d4a919f
                  • Instruction Fuzzy Hash: C4F0E23591E2688FC342DBA4D4965987FB5EB06310F2880EACC088B256DA329D07CF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a688e9ee82ace743650b1779746db3d484ae2f8d201d007467116f247b5b4111
                  • Instruction ID: f216613aa332ce2043aeb8b8c3a601361e2842e30e919b10d975c1dca63c1cd2
                  • Opcode Fuzzy Hash: a688e9ee82ace743650b1779746db3d484ae2f8d201d007467116f247b5b4111
                  • Instruction Fuzzy Hash: 83F082B890A358ABCB55CBA8E440ABCFF74DB47310F1491D9FC845B282C6335952DAD1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8db10698eeeb7d542b760b74d3618d4bafe5209c23000a6f5e3281911d47688d
                  • Instruction ID: edef53b8a5e1b29f4539f18a75cef4cb7b21c34a8869ba2312170e58899f0aa9
                  • Opcode Fuzzy Hash: 8db10698eeeb7d542b760b74d3618d4bafe5209c23000a6f5e3281911d47688d
                  • Instruction Fuzzy Hash: 20011678904119CFEB18EF19E585B9CBBB2FB49304F10C0A9E409A7B44DB309D84DF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 39356d6597d89767ed1b19713aecb2835064c598390c0c67d4634b5b1e4f95c7
                  • Instruction ID: 76df7db22de4499ac14df26a1bac9d888cc6ef823ef8c8d00940a2daf7dade56
                  • Opcode Fuzzy Hash: 39356d6597d89767ed1b19713aecb2835064c598390c0c67d4634b5b1e4f95c7
                  • Instruction Fuzzy Hash: 3DE02B337151218FCB08DAB8A5417CA7FE9D749221F1440BBD40CC3780DA32C482C350
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab56eef45137275c65e6e5cd02ed5ab4645cb45275d5ffbd653b2a98ac88de0c
                  • Instruction ID: b97885ff4a2d692537bc616a97258cedfbb7f86eaf09702243c05432acfcec87
                  • Opcode Fuzzy Hash: ab56eef45137275c65e6e5cd02ed5ab4645cb45275d5ffbd653b2a98ac88de0c
                  • Instruction Fuzzy Hash: 9C016D34701204DFDB55DF28E5A5BAEB7F2BB99300F1086EA944A97394DB70AE40CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e010488cefe13edaf47d1d58470706d8747fda22a0134f891077481d5515ffd2
                  • Instruction ID: 574edbbb0658ade6ecdfc8a04a78ad435abc1c1b2f2dd9bdf93841f917ae7592
                  • Opcode Fuzzy Hash: e010488cefe13edaf47d1d58470706d8747fda22a0134f891077481d5515ffd2
                  • Instruction Fuzzy Hash: 71F082719091589BD714CFA8D54177DBB74DF17305F2C80D99C089B245C6325942CA41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6c65e6ce6353864fb2134be1eddd76e2549152d3900546fee5f125a9d7272620
                  • Instruction ID: 22b4cd38c7e876d731662a5725530805a67e68bcf3d33b3750e44a734607da65
                  • Opcode Fuzzy Hash: 6c65e6ce6353864fb2134be1eddd76e2549152d3900546fee5f125a9d7272620
                  • Instruction Fuzzy Hash: 19F0E534909246DFC715DFA4D441598BFB4EF03354F9491EAD8088B292CB316D96CB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3ec3867503d538a173ff76a4c41398aa3471220a2a7b9e63df632c09b29c228a
                  • Instruction ID: 24140f2a79291072fcada2b1626ab861f64319d567d463c6083eed875ebc4a62
                  • Opcode Fuzzy Hash: 3ec3867503d538a173ff76a4c41398aa3471220a2a7b9e63df632c09b29c228a
                  • Instruction Fuzzy Hash: 62F0A7312093465FC7129729ED98C5FFF59EEC1225304C536E0598722ACEB4AC4A87A0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 925d5be42a3659aed5f8070b2132b2466eaa766e9df55ff747ab5fa796b2581f
                  • Instruction ID: 117cc7ccea675218b2bb4cf2d1a0f92114d2e9d3611bc36be083cc117905f00e
                  • Opcode Fuzzy Hash: 925d5be42a3659aed5f8070b2132b2466eaa766e9df55ff747ab5fa796b2581f
                  • Instruction Fuzzy Hash: 51012870A14229CFCB64DF54D948BAEBBB1FB49304F4044E9D019A3A40CB345E84DF01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40527030d28732e47f426e2d80fdc1c5cf4ecbfef1948950e5e792bfc3a41d16
                  • Instruction ID: bd7403de263baa00dbffbb0d43f7cc3f36b0f2e335a0618c642e8446e5eb745c
                  • Opcode Fuzzy Hash: 40527030d28732e47f426e2d80fdc1c5cf4ecbfef1948950e5e792bfc3a41d16
                  • Instruction Fuzzy Hash: 5101DAB89041288FCB64DF18D898A9DB7B1FB48308F10C4E9E919A3344DB305E84DF14
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 10de88a5740f8db50191c05758a38dd564314037d8d2802fe7c88e8db0a2c0ce
                  • Instruction ID: 63bbb0a3417319eb6f0343b28a3c6333a545535ba7b0851c13c490109eeb08c5
                  • Opcode Fuzzy Hash: 10de88a5740f8db50191c05758a38dd564314037d8d2802fe7c88e8db0a2c0ce
                  • Instruction Fuzzy Hash: 7101F275A14B0ADBDB14EFA8C840A99BBB1FF99314F108619E559A7200DB30AA80CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f96d9c5182eba30f37b4b9efd8854716f1fd1427d48045e32b6953d63e7c1bce
                  • Instruction ID: c90173a55a7861bc7b22f3c8f3f4fb0f58809deffcdca96a807c3acc0cb5d44f
                  • Opcode Fuzzy Hash: f96d9c5182eba30f37b4b9efd8854716f1fd1427d48045e32b6953d63e7c1bce
                  • Instruction Fuzzy Hash: F8F0E2749493989FC7A1DBBCD58129CBFF0AB06214F2441E9C858CB3A6E3328A47C742
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7585ecc968afd82cfb286ca02f0a378a67454b1b2d2cf0d4c448ebbab63016aa
                  • Instruction ID: c5e5ce38ea4b1e6a0cd016225c54912d9aab588be6dbbec9e085006100a76788
                  • Opcode Fuzzy Hash: 7585ecc968afd82cfb286ca02f0a378a67454b1b2d2cf0d4c448ebbab63016aa
                  • Instruction Fuzzy Hash: C4F0C474E04218CFEB18DF5AE484BADBBB2FB8A704F50C0AAE519A7654DB345880CF11
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 63ca37d37bdda10924f6ed6f6eb0b07459a8ab9dc431b901788d7d1f24525f9c
                  • Instruction ID: 0d28c68f761a045a273a6c58a4f4351c9501e32fb47d3e25c0c313ba6f7c2086
                  • Opcode Fuzzy Hash: 63ca37d37bdda10924f6ed6f6eb0b07459a8ab9dc431b901788d7d1f24525f9c
                  • Instruction Fuzzy Hash: 92F01734909648EFCB95DFA8C4406ACBFF1EF4A310F14C1EADC5897361D6325A66DB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b7af4a2d7a82a847206115588f038e527238f913f5aec1dca0719f975c2c3ff8
                  • Instruction ID: 21d2e4b0b3a7c448880cb367bb71fa122836ef0d29aac8da9767ba7f3438a433
                  • Opcode Fuzzy Hash: b7af4a2d7a82a847206115588f038e527238f913f5aec1dca0719f975c2c3ff8
                  • Instruction Fuzzy Hash: 27F0E274909298EFCB00CFD8D4406ECBFB0EB06300F1480DAD85853392D6718A12EB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5265ab8e1fbc42e73fcc66403afc842fb6b0f80075022e59f280dc12bef8e205
                  • Instruction ID: c3c1eca5ee161dfc2ae8f1b882f7da51085529b17e306c3d6b0d7f7cedf88898
                  • Opcode Fuzzy Hash: 5265ab8e1fbc42e73fcc66403afc842fb6b0f80075022e59f280dc12bef8e205
                  • Instruction Fuzzy Hash: 35F0D474E59208DFCB54DFA8E8886ECBBB4EB49301F1080AAD914A7351E6349A45EB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 03e01c021ef3bd9fc5558b94dc0aa25b8bcccd80b498fd019e7cb237823dd844
                  • Instruction ID: 4efc01ed98d547c57c30382ef1065777893184cd55feebfbd2d0dd50c2dd4ed5
                  • Opcode Fuzzy Hash: 03e01c021ef3bd9fc5558b94dc0aa25b8bcccd80b498fd019e7cb237823dd844
                  • Instruction Fuzzy Hash: A3F08C3494924CAFCB91CFE8D9405FDBBB0EB59310F1480AAEC6987292C7359A62DB41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dc1699b93dde97d98aa8365816241b13e766da7b8aeff914a678372e03206d8e
                  • Instruction ID: 44923dcdbb39ef6616c24716e9209635ec97bdf25ea895c0250633a332860c8d
                  • Opcode Fuzzy Hash: dc1699b93dde97d98aa8365816241b13e766da7b8aeff914a678372e03206d8e
                  • Instruction Fuzzy Hash: 6D013139600154CFD755DF24E995AED77F6FB89304F1081AA980A9B354DB70AF45CF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: af3d5303b4ec8e232ab560367ff9526b4d2784cedc9e0fec1ace39e0e9736dae
                  • Instruction ID: dd4d4668acf920c386aab98b682a71e7d6d48e7f15307b4adee91e369f3f3f2a
                  • Opcode Fuzzy Hash: af3d5303b4ec8e232ab560367ff9526b4d2784cedc9e0fec1ace39e0e9736dae
                  • Instruction Fuzzy Hash: 5FE0226184B2488FC706EBF88A562CD3FB59F47300B0009E6D008CB159EA368E05C782
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7b6304cf143f48f6c7fc7e36962a8401295b9ed66c5ea2bac04e278352ed7206
                  • Instruction ID: 1a4c47a136154058e70cee975d0351876829afb7faf9e93afbb6f072ff0d3ec1
                  • Opcode Fuzzy Hash: 7b6304cf143f48f6c7fc7e36962a8401295b9ed66c5ea2bac04e278352ed7206
                  • Instruction Fuzzy Hash: 8F01FB397012149FD754EF28E995B9E77F2EB89304F1085EA944A97354DB706E40CF41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 37d3b9f0812d4d32eeb0af51062fd2d7726b181c98d71363e603408b5e3bbaaa
                  • Instruction ID: f9ca98112475052690e0b0ef9d3d90e3166ef1d9b5c9c0d3c7d11d747f3eb24d
                  • Opcode Fuzzy Hash: 37d3b9f0812d4d32eeb0af51062fd2d7726b181c98d71363e603408b5e3bbaaa
                  • Instruction Fuzzy Hash: 85F04F79A003089FDB44DF64E599DAEB7F2FB59304F508579940A9B368EB706D00CF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25ef3995d60d111d700a197944473b23661fa540a42fbd7b5448024d87c72460
                  • Instruction ID: ba07d834417e3b3da0b95d0724dd66d7d68b722e9d5682f6769873e62a230926
                  • Opcode Fuzzy Hash: 25ef3995d60d111d700a197944473b23661fa540a42fbd7b5448024d87c72460
                  • Instruction Fuzzy Hash: A8E0226140A3688EC712ABBC95503E93FB1CF52304F0004E7C4408F061D936CACAE752
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3227542b1e5d9bbce9c70eea34c7a7818d37da53ef9a0130f44ecd3f8c55321
                  • Instruction ID: 7fc7555d333df1a8ea91bdef06ffcabb4c931283dcee8e860d4ad39a43f49202
                  • Opcode Fuzzy Hash: a3227542b1e5d9bbce9c70eea34c7a7818d37da53ef9a0130f44ecd3f8c55321
                  • Instruction Fuzzy Hash: 35F0F874D0524CAFCB94DFA9D840AADBBFAAB48310F14C0AAE868D3341D6359B51EF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1e2537efa0a16d3140ddd7b4cb500fc80b379813d29807686ea7d6d09973b4a
                  • Instruction ID: 9829d5033b88c27c65e28913edd32c45a60017b8c16ac23ea66b0a2556f7532f
                  • Opcode Fuzzy Hash: a1e2537efa0a16d3140ddd7b4cb500fc80b379813d29807686ea7d6d09973b4a
                  • Instruction Fuzzy Hash: 33F08C3498929CEFCB05CFA9E4945BCBFF8AB06300F1890DAC86867366CA355A41DB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9d354a8e120b94bab8c90ba6637c573234d6409b3813993e00b654242ed07576
                  • Instruction ID: 2c6fa017c0104f0b9481457c9f4680931ab8fdbe4a87aedbc8d9cace78dfb1f9
                  • Opcode Fuzzy Hash: 9d354a8e120b94bab8c90ba6637c573234d6409b3813993e00b654242ed07576
                  • Instruction Fuzzy Hash: 75F0E774905128CFDB14DF64E688BACBBB2FB45309F1084A9E909A7745C7349E84DF42
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 77c3acd39b55bbfcc328232f13300db58fe3ddb01cfba5556c2123bc494dba40
                  • Instruction ID: 4f2b987015d7c25a4044a4381aaccc14d54c9792a6284d1b063d52421407581d
                  • Opcode Fuzzy Hash: 77c3acd39b55bbfcc328232f13300db58fe3ddb01cfba5556c2123bc494dba40
                  • Instruction Fuzzy Hash: D6F06D75A0821CAFDB09DF99D4886DDBFBAEB85211F04C499E40697250DF741A82CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1296fef335059d8b10c277d6dd92a4f7e96ccec86b59a0c3141e9d85640897ee
                  • Instruction ID: 28148a3a84b4547f20c715079801aee03b10a69536e6cd3c28fcc8f6d71176b3
                  • Opcode Fuzzy Hash: 1296fef335059d8b10c277d6dd92a4f7e96ccec86b59a0c3141e9d85640897ee
                  • Instruction Fuzzy Hash: 63F02B74E0D248AFD711DF94DC006EDBFB4EB46300F10C1A9E80423341C6719A51EB85
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6ba68dd6f862546938484c81f5237b38ef56cf4607b6df0706146df52ff740ae
                  • Instruction ID: acf63ebc103de785b808d327debb21a5fbcedf5b15a31f74c86b8517f37de491
                  • Opcode Fuzzy Hash: 6ba68dd6f862546938484c81f5237b38ef56cf4607b6df0706146df52ff740ae
                  • Instruction Fuzzy Hash: CCE0927091E398AFCB42EBBC985019C7FB49F46300F1404EAC844D7256D5304ED4C751
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e11f596bc8fbcf2756b43a265524708a2055897a9df27a2428f9c704407089e
                  • Instruction ID: 6b02728e39ca744f586eb7af43086486fe4b31c83d7633a848c1bfa70d8ae149
                  • Opcode Fuzzy Hash: 0e11f596bc8fbcf2756b43a265524708a2055897a9df27a2428f9c704407089e
                  • Instruction Fuzzy Hash: FCE0263131433C9FDF149570A8057F533AAAB89381F104836DF089F390C062E842C358
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 128171b7aafc44986a03e1b155972ab8809245daa887b28c1b752517db59239e
                  • Instruction ID: 096b8f3271cf6f37ded2af67225d8867784a393e883dc2b2c6400df42af7de1a
                  • Opcode Fuzzy Hash: 128171b7aafc44986a03e1b155972ab8809245daa887b28c1b752517db59239e
                  • Instruction Fuzzy Hash: B6E012313016065FC7109A2AE988C4FFF9AEEC0364710C639A11A87225DE70ED4A86A0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a585526627874a9a2082b65ddf6006eeab271afce10c71df68831b1d7c112b7
                  • Instruction ID: cfefb8ff03691fd59acfdc447b01e2f409a444077d4399513b124373201e5ba9
                  • Opcode Fuzzy Hash: 1a585526627874a9a2082b65ddf6006eeab271afce10c71df68831b1d7c112b7
                  • Instruction Fuzzy Hash: C2E02B3004D2848EC362D7ACE5446B87FF49F02210B0501D5CC948F6E3C6320951C746
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b710e1d893f04eb9bbd02a87fc9db0c697e2280f8e14b8c7c898d893a5157c46
                  • Instruction ID: 0024e198300e18ea632b9522df08296f34bd4f91466e00dcd2c3b4ac5e883619
                  • Opcode Fuzzy Hash: b710e1d893f04eb9bbd02a87fc9db0c697e2280f8e14b8c7c898d893a5157c46
                  • Instruction Fuzzy Hash: F4F03974909208EFCB54CF98D840AADBBF8EB49310F24C4AAEC5893341C631AA61EF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 783ef417e795e8dae1800149ac17e5988ab6024d3a2024bcf9a8eb1705d1474e
                  • Instruction ID: 2c0807a96368be6a2587348e28358205f2db25f668d68376af0366198edca5dc
                  • Opcode Fuzzy Hash: 783ef417e795e8dae1800149ac17e5988ab6024d3a2024bcf9a8eb1705d1474e
                  • Instruction Fuzzy Hash: FBF0A574E05208EFCB94DFA9D540A9CBBF5EB48310F10C0AAEC1997350DA319A51DF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 820d094b112a9c013811101df4587fceafc90f6633a909bae1f1eae79098bfb3
                  • Instruction ID: 585608e1927d5d191013d18cc9019ba60c03137ca7891ba770a5938c53be3816
                  • Opcode Fuzzy Hash: 820d094b112a9c013811101df4587fceafc90f6633a909bae1f1eae79098bfb3
                  • Instruction Fuzzy Hash: 5BF0E571909258CFCB05DFB8950495CBFF6AB05201F1690EEC4489F261D7309A44CB01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d4645b1c906680383d71235bd66038d2cd803b356d5f46d85a862bcac78b0236
                  • Instruction ID: 55cceebe3e036a0adf16e26481fe18882b98f1ab066fd60f3c88a794226bfd34
                  • Opcode Fuzzy Hash: d4645b1c906680383d71235bd66038d2cd803b356d5f46d85a862bcac78b0236
                  • Instruction Fuzzy Hash: 5EE06D307601168FEB14EF39E518B2A7B77EF80304F2044A8D80ADF6A8DBB48844CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d51f44ef55211a1ae1ddff8abb9c3417fc31421724687ba0794cfc896a63bff0
                  • Instruction ID: 7d2b759dc2ce988772f1cd79b85c3d89b6cbbe184b171507926dc07012856732
                  • Opcode Fuzzy Hash: d51f44ef55211a1ae1ddff8abb9c3417fc31421724687ba0794cfc896a63bff0
                  • Instruction Fuzzy Hash: 01E09A31842108AFD754DBA8960869A3BB1DB09305F1405E6D808FB110EA324EA4C792
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8d20d451bda4ea9eff966a06956d2528c283447241e1289b448e6820093eefa3
                  • Instruction ID: d6f39c590deb48b218cbf12322f79b471abcd6f43e90264718e3b3be798427a9
                  • Opcode Fuzzy Hash: 8d20d451bda4ea9eff966a06956d2528c283447241e1289b448e6820093eefa3
                  • Instruction Fuzzy Hash: D8E0CD3035433C5BCF18A57569407A532BDEB89711F604475DE0D5F380D962E841C369
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: df9bc98f56e583fa78a313b553a2a7e6f30b836ed3d081dd94024523123dc470
                  • Instruction ID: 1500c0206f1e26324471d0cbc8a0721cf69afbf328b25342a08779523d33e914
                  • Opcode Fuzzy Hash: df9bc98f56e583fa78a313b553a2a7e6f30b836ed3d081dd94024523123dc470
                  • Instruction Fuzzy Hash: 25F0FFB49062288FEF70DF24D84879EBBB2BB45304F1000A9D61EA3244DB749A858F4A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 439cf742892adf4300dc7b12ade8f45b0d93c1b068554b89acc822ba8d2211c4
                  • Instruction ID: dd93c9a3d2963bc9e8e28e5eb95b9721bb957d6ee240c339ef7ab676a3798e9a
                  • Opcode Fuzzy Hash: 439cf742892adf4300dc7b12ade8f45b0d93c1b068554b89acc822ba8d2211c4
                  • Instruction Fuzzy Hash: 39F03A74A1522DCFC764DF18D948A9AB7B2FB48708F1080E9E819A3349CB309E81DF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e7e45c65416953d2327f33304a772885fd10636320b18d8f62824889c9fc593b
                  • Instruction ID: cc0b258149512384eae8cd2ff83cec83b94b653cc000ce640282506b7c0ff932
                  • Opcode Fuzzy Hash: e7e45c65416953d2327f33304a772885fd10636320b18d8f62824889c9fc593b
                  • Instruction Fuzzy Hash: F7E0C974E0520CEFCB94DFA9D44169CBBF5EB48310F10D5A9E81993340D6719A51DF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e7e45c65416953d2327f33304a772885fd10636320b18d8f62824889c9fc593b
                  • Instruction ID: 65ac15190e95592cc22a03587105d700cd1eba15f4ae3f47c23ef270c21bb0c2
                  • Opcode Fuzzy Hash: e7e45c65416953d2327f33304a772885fd10636320b18d8f62824889c9fc593b
                  • Instruction Fuzzy Hash: B2E0C974E0520CEFCB94DFA9D841A9CBBF5EB48314F10C4AAD85893351D6719A51DF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e7e45c65416953d2327f33304a772885fd10636320b18d8f62824889c9fc593b
                  • Instruction ID: c8dcf81f2c877a755e7b621e9b1fa8bfe9845430cc894cc273afbd67a8d3b56b
                  • Opcode Fuzzy Hash: e7e45c65416953d2327f33304a772885fd10636320b18d8f62824889c9fc593b
                  • Instruction Fuzzy Hash: 1BE0C274E0520CEFCB94DFA9D441AACBBF5EB88310F10C4AAE818A3341D6759A51DF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ea1d6113c6de90aa40036aabc28861d4a32388a04b5c1bc2b98f74e48fd3cfb4
                  • Instruction ID: ea826d43e174c0f217019e9283a7bf326ddbf1e326d78050b2fe3793fae579db
                  • Opcode Fuzzy Hash: ea1d6113c6de90aa40036aabc28861d4a32388a04b5c1bc2b98f74e48fd3cfb4
                  • Instruction Fuzzy Hash: 08E0ED7490520CEFCB44DF98D5409ACFBF9EB48310F10C0AAEC5997355C7319A51DB54
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54a31971959665afe2e8a4a75bdfafa29ffaa0cb508ab660d93f2b61c76e87f3
                  • Instruction ID: ceaf38c3f0402408b898fbb2d7683537cde9a4eb2808beb3593a59ca32091a89
                  • Opcode Fuzzy Hash: 54a31971959665afe2e8a4a75bdfafa29ffaa0cb508ab660d93f2b61c76e87f3
                  • Instruction Fuzzy Hash: E0F01279A05228CFDB14EF60D954B9DBBB2FB45304F0082EAD009A7388CB301E85CF20
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cad6e20242fb4139e7589df951c30b0609461c732e2d1015d7be4af452cf6b14
                  • Instruction ID: a6842fa9cede0ce5a24ace9f3fcba515c5fa203129e521c5bbae3e3cd32ab25f
                  • Opcode Fuzzy Hash: cad6e20242fb4139e7589df951c30b0609461c732e2d1015d7be4af452cf6b14
                  • Instruction Fuzzy Hash: 92F0B274A15218CFDB59EF64E584BACBBB6BB4A304F1084A9E95AA7344CB705D808F12
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e6a198db5a360f276dfb3f7a819cf85451edaca41bc68b194d6c7782d0a1de6
                  • Instruction ID: c3f351c469c1ec3c1499421ed0e4052625631f2ef17e75c509de270518a591d0
                  • Opcode Fuzzy Hash: 2e6a198db5a360f276dfb3f7a819cf85451edaca41bc68b194d6c7782d0a1de6
                  • Instruction Fuzzy Hash: 6DE0E570D05208EFCB54DFA8D5406DDBBF5EB48300F1084AAD814A6310D7755AA1EF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e6a198db5a360f276dfb3f7a819cf85451edaca41bc68b194d6c7782d0a1de6
                  • Instruction ID: 2209eb52105c4238b502156fdf80c04c392b0726fc325e0c08fab932037cc37b
                  • Opcode Fuzzy Hash: 2e6a198db5a360f276dfb3f7a819cf85451edaca41bc68b194d6c7782d0a1de6
                  • Instruction Fuzzy Hash: D0E0E574D05208EFCB54DFA8D8406DDBBF5EB48300F10C1A9D809A3350D7759A90EF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6cb225676affd5f26417d42e33aa798dedb6ae5ed66cb572f8d87a4f4b50b4c9
                  • Instruction ID: d2f9a65a5c135029aa4bb4b38464ade7317bbd293264095ed006dfbb8f2c668d
                  • Opcode Fuzzy Hash: 6cb225676affd5f26417d42e33aa798dedb6ae5ed66cb572f8d87a4f4b50b4c9
                  • Instruction Fuzzy Hash: 4EE0E574E0520CEFCB94DFA9D4816ACBBF4EB48300F10C5A9D81993340D6719A81DF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6cb225676affd5f26417d42e33aa798dedb6ae5ed66cb572f8d87a4f4b50b4c9
                  • Instruction ID: 032bdc5cef634075f95ac3d012187bf97fbcc12881f85c39a620bf4ce63cb57b
                  • Opcode Fuzzy Hash: 6cb225676affd5f26417d42e33aa798dedb6ae5ed66cb572f8d87a4f4b50b4c9
                  • Instruction Fuzzy Hash: 15E0E574E0520CEFCB94DFA9D4416ACBBF4EB48300F10C4A9D81C93340E6359A42DF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6cb225676affd5f26417d42e33aa798dedb6ae5ed66cb572f8d87a4f4b50b4c9
                  • Instruction ID: 3112a9643c3a08497d276615b10ff90377b1b1ab6c52abde06a254bfebebe1dc
                  • Opcode Fuzzy Hash: 6cb225676affd5f26417d42e33aa798dedb6ae5ed66cb572f8d87a4f4b50b4c9
                  • Instruction Fuzzy Hash: 5AE0E574E0620CEFCB94DFA9D4416ACBBF4EB48304F10C4A9E81893340D7319A45CF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ada2c7f5d7e2354088fc66e231bfd8ae2b8fb20e5cd53b727131058989fa294b
                  • Instruction ID: f2d99ca0e68672b2d8db0a23a5a8dca29ba0bdc3cf5dd7bea58b7869b1f4704d
                  • Opcode Fuzzy Hash: ada2c7f5d7e2354088fc66e231bfd8ae2b8fb20e5cd53b727131058989fa294b
                  • Instruction Fuzzy Hash: 7AE0DF367192608FC3896B78A9288197BFBEF8861031145AAE849C7374EE36CC80C702
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0b5f40c292c8a8f00fcbce0e9d9b310d8981641a51642951945692838b861261
                  • Instruction ID: b4370b47cf2c25f1d305c17a6848a4848c82b046c6d5e9c44905f9b047e7663a
                  • Opcode Fuzzy Hash: 0b5f40c292c8a8f00fcbce0e9d9b310d8981641a51642951945692838b861261
                  • Instruction Fuzzy Hash: E9E01A74D09218EFCB54DF98D440AECFBB5EB48310F24C1AAED5453341C6719A52EB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 15b685099662f65ad83507df6317f6fef28a4d08afa2873472b7852cf9990ac2
                  • Instruction ID: 2231ab66ba759f51661fecbcb6d187b20b2824ae07a86e47cffedc1a4d3788c2
                  • Opcode Fuzzy Hash: 15b685099662f65ad83507df6317f6fef28a4d08afa2873472b7852cf9990ac2
                  • Instruction Fuzzy Hash: 7DE0867890911CEBC704DF9DD4419BDBFBCEB49311F20D0A9E84457341CA719B51DB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a16694b88bb262af23bfe4ca8d88930fe40a03d6466941bd5d02e79bba6f752c
                  • Instruction ID: 68c44e5dec25bf109f17d47ae7670e89c42e9f6fd04a2a6a39f4dff13eccaabf
                  • Opcode Fuzzy Hash: a16694b88bb262af23bfe4ca8d88930fe40a03d6466941bd5d02e79bba6f752c
                  • Instruction Fuzzy Hash: 39F0157A8042688FDB06EFA4C844B9CBBB1EB26200F044196D009B7259DB388A84CF24
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5f353d377b71c47448689ab20f78f451639aaff08f556f049babe56de81d4ee6
                  • Instruction ID: ce64a387cc7b8a3a388ec1c8b8b5a8b06deb41bc0c773179d2b4baed3660a6f3
                  • Opcode Fuzzy Hash: 5f353d377b71c47448689ab20f78f451639aaff08f556f049babe56de81d4ee6
                  • Instruction Fuzzy Hash: CFE0D632A422099FCB01CFA8EB0029CBBA2EB01204B1082EDD008E3290E7318E148702
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e707a4da147ccb53d13a33ab1884396b01c1bc20e82b9f1d66cc8e898b4a79e8
                  • Instruction ID: 1bd1e08d8550f4de1d0e7709c627652ec7f8590c45f65b5ab8f7c41be75a3978
                  • Opcode Fuzzy Hash: e707a4da147ccb53d13a33ab1884396b01c1bc20e82b9f1d66cc8e898b4a79e8
                  • Instruction Fuzzy Hash: 62E01230A06208AFCB84DBA8D4846A8BBF4EB0A204F2080A9980C97740EA319A81CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a7924c7385385aaaade374c5c7cb9c2dadfde014bcb8c8a8476c27d8280681d6
                  • Instruction ID: 268540805cb242d0a2d51f6cd5c56b1308389449db23e2af317c53017e8bebc3
                  • Opcode Fuzzy Hash: a7924c7385385aaaade374c5c7cb9c2dadfde014bcb8c8a8476c27d8280681d6
                  • Instruction Fuzzy Hash: 63E02C3A340018AB8F05DE18E8400EDBBA1FB8A2103009069F952C3200CA305C26D7E5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3a0de4f6d9bbf9571bda03f908b3f01ea91105efa32dd11174e04ec8b2f660b
                  • Instruction ID: e24aa613145b3dfbe9a67995fab9ab8495a0d8cde789eea1446456d7252cf3af
                  • Opcode Fuzzy Hash: a3a0de4f6d9bbf9571bda03f908b3f01ea91105efa32dd11174e04ec8b2f660b
                  • Instruction Fuzzy Hash: BEE08634A09108EBC714DF98D4449ECBBB5EB45310F10D1A9DC0413340C6715E51EB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa5d63cbe38ef12e4a2aa870f720db767844e033d2dfe1c0e43b4e3ef814587d
                  • Instruction ID: ab858a1f2ea2ff2a59b1254e3f3b4b1accd6f3c91ec58b7d00e0855728f3997a
                  • Opcode Fuzzy Hash: aa5d63cbe38ef12e4a2aa870f720db767844e033d2dfe1c0e43b4e3ef814587d
                  • Instruction Fuzzy Hash: BDF0A578902218DFEB54CF58E888B9DBBB2FF09314F5481A9E419A3355DB719984DF01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0b7be518d369073a408bee31d511817c2c2e43c656a13caa0ccf7cc998a43f7c
                  • Instruction ID: d7cbe1c42bf6874a12800e52f9a92382a0417f1e877324114f1eaff8dc8a9011
                  • Opcode Fuzzy Hash: 0b7be518d369073a408bee31d511817c2c2e43c656a13caa0ccf7cc998a43f7c
                  • Instruction Fuzzy Hash: A3E01A34D0A10CEFC754DB99D4415ACBBB4EB48300F2080E9E81863345C6325A42DB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cf45e5bf2358a94a502164c2a899bdf427739aa31bcd73371aaab562a442e319
                  • Instruction ID: b9d7b1461d51378e66accd02e7333e91c1bbaaab082a546560e83291ab621d08
                  • Opcode Fuzzy Hash: cf45e5bf2358a94a502164c2a899bdf427739aa31bcd73371aaab562a442e319
                  • Instruction Fuzzy Hash: 8FE08634909108EBCB04DF98D4809ACFBB9EB45314F10D0A9DC0417345C6315E51EB84
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1b4421426a3a6165691a12d384cc79958e9f4ddd4a0033332fd882badb9df0b3
                  • Instruction ID: 0311337fa98c90c5791fa93c3a4bd4df3d0d6856e39a162ae3d7cc4e20c6315e
                  • Opcode Fuzzy Hash: 1b4421426a3a6165691a12d384cc79958e9f4ddd4a0033332fd882badb9df0b3
                  • Instruction Fuzzy Hash: 52E04F34905208DFC794DFACD44069CBBF4EB48204F2084A9D80893350D7319A42CB41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 96077e276af2e978fddff450f27253e69cd20a30199554d658f984a0b52fdc79
                  • Instruction ID: f71d88aee8e23c20e416fff1df74344b628dbcc0e5deac0b7f931dbd1d7a684f
                  • Opcode Fuzzy Hash: 96077e276af2e978fddff450f27253e69cd20a30199554d658f984a0b52fdc79
                  • Instruction Fuzzy Hash: D3E01A34D49108EBC754DF99E4805ACBBF8EB48300F1480A9D85857355DA319A41DB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d67e2d8144071bdb0a63ef0304c1d9465842ad546cd07f689824f4c19e106b27
                  • Instruction ID: 8ffea539f47535bcc573a81aefe928753c0c97dfd880ca6aa11e6c89e7a93e10
                  • Opcode Fuzzy Hash: d67e2d8144071bdb0a63ef0304c1d9465842ad546cd07f689824f4c19e106b27
                  • Instruction Fuzzy Hash: BAD0C77020A009EBC308CA98E0406B8B3B8DB06218F1091D8EC089B210CA728E42D780
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ddfa978c414ac6b96d55e80325a8d35c97a01109cd2eb1f59aca0685f73bb16c
                  • Instruction ID: 9f112a9d1ae55b2c77ffa30b4cf2eab90ae2f7528e0cdb45551d3f53bc198669
                  • Opcode Fuzzy Hash: ddfa978c414ac6b96d55e80325a8d35c97a01109cd2eb1f59aca0685f73bb16c
                  • Instruction Fuzzy Hash: 91E0C270909109FFC714CA98D401AA8B7B8DB02304F10D1DDDC0817241CAB2AF51C782
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f4256ee2d75cf9f9e916e706a5538853879f931a6e7f7f9bf8d0a3048432bf9
                  • Instruction ID: 832b3989049ac4562802d9b84780a0da6985eb55096f06758cdf1476f9ba8c4a
                  • Opcode Fuzzy Hash: 3f4256ee2d75cf9f9e916e706a5538853879f931a6e7f7f9bf8d0a3048432bf9
                  • Instruction Fuzzy Hash: 28E0EC34909218DBC714DF98E581ABDFBB8EB46314F2891E9DC0817341CA325E92DB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fbafb4a18f9ce170f8c0e19fd5523fa90477963a3a1fb286d0ddfaf84d3648c
                  • Instruction ID: 1285aec2b18a2cb925b7925fac680f564584b42641fa9d70277836390361f146
                  • Opcode Fuzzy Hash: 0fbafb4a18f9ce170f8c0e19fd5523fa90477963a3a1fb286d0ddfaf84d3648c
                  • Instruction Fuzzy Hash: 74E0127194220C9BC710EFF8D50469E7BF9DB45300F1054E6D40497110EE715A94AB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c7839ce62e667df26c293bf4fe097b2f094c84325cb5f2886c464d11c372ec6
                  • Instruction ID: dfe84059ae55013b2189f33577f4f1f8e650b6bf6c6daa46c6c86817d7ca92a9
                  • Opcode Fuzzy Hash: 4c7839ce62e667df26c293bf4fe097b2f094c84325cb5f2886c464d11c372ec6
                  • Instruction Fuzzy Hash: 0BE0C23054310CEBC714EFF8D5086DE7BF9EB45304F1040A5D405A7110EF325A80DB96
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ae279166f0f66f73e447921f00a7946069e00023b6fff09b7868cd9ec6331b9c
                  • Instruction ID: 1caf8b04f812b901f179353a5899c018c865787fe02d377af089a1b424f32cab
                  • Opcode Fuzzy Hash: ae279166f0f66f73e447921f00a7946069e00023b6fff09b7868cd9ec6331b9c
                  • Instruction Fuzzy Hash: 1BD0C2303083650F8706822869198527EF74B8920030AC1A6A885C73A5EA50DC054790
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 006b860ea9bfa564285f47c894bbdcfabc719c4d3ba8cd2865efb93a8c2e6590
                  • Instruction ID: 5247bbf7d8318809f17f1dbe45d5665740e3cb232f1b59b080e6f9c45c59b7e5
                  • Opcode Fuzzy Hash: 006b860ea9bfa564285f47c894bbdcfabc719c4d3ba8cd2865efb93a8c2e6590
                  • Instruction Fuzzy Hash: A6E0EC7096A20CDFC754DFACE8497DDBBF4AB09701F1054A9D809A3250EA705A90DB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c53850867787ec49a8994128fdaaa67a0c695d1cdbf840079f1274a4fb984a0f
                  • Instruction ID: 7db98012201a2fabbc7b805ba4a7c39c4ad15f7868e24fb96c693407f4ebd54c
                  • Opcode Fuzzy Hash: c53850867787ec49a8994128fdaaa67a0c695d1cdbf840079f1274a4fb984a0f
                  • Instruction Fuzzy Hash: FFE0EC3490910CDBCB18DF98E9415ACBBB9EB45324F2095A9DC0927345CB315E52DB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 01030787324f082b8b2a6e315f5f4f423c220a8a4a80a1a5642b5845aa14d94e
                  • Instruction ID: 068ca84c4ef77c470920db5363d156830d3844df873cb81b5fc53f32fff951de
                  • Opcode Fuzzy Hash: 01030787324f082b8b2a6e315f5f4f423c220a8a4a80a1a5642b5845aa14d94e
                  • Instruction Fuzzy Hash: D8E01238A09218DBCB18DFE8E5415ADBBB9EB45314F2095ADD80927345CB315F52DB81
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 633931575f5a1fc3fa471b803e28f7418ed3e3c787de6bd1540a1e3d8b05e47f
                  • Instruction ID: 00825ee501522045e940a8ce645093aeb3df639c93c84aa2d88f18b2a87578c1
                  • Opcode Fuzzy Hash: 633931575f5a1fc3fa471b803e28f7418ed3e3c787de6bd1540a1e3d8b05e47f
                  • Instruction Fuzzy Hash: 07E0EC70D4621CDFCB54EFB894446ACBBF9AB04205F6055A9D84896254E7715A90CB41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6a5c03e7e6b5c92e11475677b2de9e9ce369264c27638527d90f98dda11a1bbe
                  • Instruction ID: 8bb4105ffeaac7e8c04a6907dc2981015e25e1bbfc271022244d08555bc5a848
                  • Opcode Fuzzy Hash: 6a5c03e7e6b5c92e11475677b2de9e9ce369264c27638527d90f98dda11a1bbe
                  • Instruction Fuzzy Hash: 6EE0177194320CEBCB14EBFCD604A9E7BF9EB45300F1055A9D80997210EE769A909B92
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ea1d2a17a65ff96e7d68e482c59f54dde68f3f6fa301afe54e99c52d8232ad5c
                  • Instruction ID: 8e37200ec861d1b3602acb88382679ec02889e80a409f7f92e24f1357c1ce193
                  • Opcode Fuzzy Hash: ea1d2a17a65ff96e7d68e482c59f54dde68f3f6fa301afe54e99c52d8232ad5c
                  • Instruction Fuzzy Hash: 1AE0EC709562189FCB54EBBC944569DBBF8EB04300F5050A9D809A3244E6305A94CB51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0481e26a4de6e04d78d708f9c616957243d10040c57946865ce1401664db5d2b
                  • Instruction ID: 949ca3a196e21da72d41812a4ed06460087cc5c236a07beabf6dc0e2185f8f62
                  • Opcode Fuzzy Hash: 0481e26a4de6e04d78d708f9c616957243d10040c57946865ce1401664db5d2b
                  • Instruction Fuzzy Hash: ECE0ED74905104DBE704DF54F184BADB7B1FB02319F108459E5116BA55CB749880CB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e2a8b83c5b9194df483e7ffe957696a7e7a992920c8d569b8854411a7bceb3eb
                  • Instruction ID: 0225d26cf05da431df645dea7e9ecb1252737bacc85ca77fe7ba285d2d03e055
                  • Opcode Fuzzy Hash: e2a8b83c5b9194df483e7ffe957696a7e7a992920c8d569b8854411a7bceb3eb
                  • Instruction Fuzzy Hash: 6BE01235A00209EFCB04DFB4F95166EB7B6EF95204F6089A9D404DB344EF315E00A791
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 64d3677e73be78780ae78f5a40ad85f7ce5f9ed44af7885626a29319c820ba72
                  • Instruction ID: bb16702c19b14207b7671555b51f8f98d1a8a6220d1094a9d9bcc776ef1913e3
                  • Opcode Fuzzy Hash: 64d3677e73be78780ae78f5a40ad85f7ce5f9ed44af7885626a29319c820ba72
                  • Instruction Fuzzy Hash: BEE0123490510CDFC754EFACD5416ACBBF8EB45314F5480A9D80957745DB31AE52CB41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7605fba06bebd3197afb52825616f922ca752b002c8400b4d0be077df36209a2
                  • Instruction ID: 45167eadd9b0864da84e3c9aab69fa765e4743e005ba7431de0f4c4b8c6fa863
                  • Opcode Fuzzy Hash: 7605fba06bebd3197afb52825616f922ca752b002c8400b4d0be077df36209a2
                  • Instruction Fuzzy Hash: E5D05E7050A108EBC758CA98D440AA8B7BCDB46314F1091DCDC0857351CA72AE41C781
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 34e45157751106406731f5a261d9a9f7c25ed6fefc3baf78ff7ffd30b209d3ed
                  • Instruction ID: aef0e7e0377ccf9cf245cd6c240b5fd074ba0337a1b5f3795acd6c09b2470e0e
                  • Opcode Fuzzy Hash: 34e45157751106406731f5a261d9a9f7c25ed6fefc3baf78ff7ffd30b209d3ed
                  • Instruction Fuzzy Hash: 73E01235A01208EFCB04DFA4E54069DBBF5EB45304F1085A8D409D7344DB319F55A7A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3d458605c148439185d4938b20c05dfac27e8f5cb28c52ed7eb1075d25ad2eeb
                  • Instruction ID: 3dfcaaaab91c2f44802aef0c5c50e1c2a3fa93c86be4c3bf8eb5ddb5ecf4fe63
                  • Opcode Fuzzy Hash: 3d458605c148439185d4938b20c05dfac27e8f5cb28c52ed7eb1075d25ad2eeb
                  • Instruction Fuzzy Hash: FED05EBA54C3885FC7038B20D8458A03F745E1A21134941E2E5458F273C272AC08C791
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9a9f7f31e86b6065269272f85e7f8ddd3077afa9fe94199e966d24f9c8f2eea
                  • Instruction ID: c320d00fa8244aa6fe81c726b81e4316630401277f4c68b0e027cd7bd915f3ae
                  • Opcode Fuzzy Hash: c9a9f7f31e86b6065269272f85e7f8ddd3077afa9fe94199e966d24f9c8f2eea
                  • Instruction Fuzzy Hash: 35D0A77050A108EBC754DF98D444AB9B7BDEB45314F10949CE8094B341DA329E41CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 020992f9ba5fcd75aaa94a42d6a8c1213fcf2c39caaa871639cfce9b4f558c3b
                  • Instruction ID: e9473f11e79b8a2ac463b6a2e142fc9d5cb3d19b0869a7b9a7a6fadb7dbc5469
                  • Opcode Fuzzy Hash: 020992f9ba5fcd75aaa94a42d6a8c1213fcf2c39caaa871639cfce9b4f558c3b
                  • Instruction Fuzzy Hash: 40E0E5B8A24218CBD7949F20E894B9DBBB6FB59208F0084D9D81963658CB301D85DF01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c07cb4691b0684cc89b10cbbf3be57585fe33d1b5547e1af115f005ace62d614
                  • Instruction ID: be15b94ddf0e160968a01f9b283a19c48ac74f72b5ebcb20490b64905c2d4fb9
                  • Opcode Fuzzy Hash: c07cb4691b0684cc89b10cbbf3be57585fe33d1b5547e1af115f005ace62d614
                  • Instruction Fuzzy Hash: FBE04F74A1421C8FC718DF60E444B9DBBB2FB56308F4084E9D80AA7344CB301D80DF41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2b18c5b444a554ed2d2343c088aedd755e02799d50cd59cce5a1df809916f7bd
                  • Instruction ID: 895fe876c14c74fc2b3a619cc4b2fdde63da841d232b5b2937412202aed6e508
                  • Opcode Fuzzy Hash: 2b18c5b444a554ed2d2343c088aedd755e02799d50cd59cce5a1df809916f7bd
                  • Instruction Fuzzy Hash: 6DE01A78A142188FC764EF20E989B9DBB71FF96308F0080D8E5096B354CB705D80DF52
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 36edd3a4b826742923fda7793d704f96731a802dd1a6211fa055c131e5df8793
                  • Instruction ID: 55b84f5d511188dc89988dfeae46aa1d97e2f3ba7c1b07dca818dc0e3b53edc4
                  • Opcode Fuzzy Hash: 36edd3a4b826742923fda7793d704f96731a802dd1a6211fa055c131e5df8793
                  • Instruction Fuzzy Hash: 6FD05E35A0120DEFCB04EFA8EA0065DBBF9FB45208B1082E8D408E3344EB316F109BA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 67a9cce53c44474e587a327e30fe8be6981ba81047728c9de4f50645fbc03fb7
                  • Instruction ID: 0abfedd58f41acd3564c84e44ceee95d37018a608b088795413bc352037882b7
                  • Opcode Fuzzy Hash: 67a9cce53c44474e587a327e30fe8be6981ba81047728c9de4f50645fbc03fb7
                  • Instruction Fuzzy Hash: 76D0E270C122198FCB80EFB8A44825DBBB4FA04301B0046BAD829E6608EB3056858B92
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 67be6e69009fb5dba867524d971108af3dc6124d8f0c9f08a8aba3fd7727d3d0
                  • Instruction ID: 22469027da7867171f6bef9498eef426942715a28f0e2e64fd6aae16180a9ec2
                  • Opcode Fuzzy Hash: 67be6e69009fb5dba867524d971108af3dc6124d8f0c9f08a8aba3fd7727d3d0
                  • Instruction Fuzzy Hash: 53E0E534A042289FC7A4EF20E884799BBB5FB56309F10C4D8E849A3244CB301D84DF46
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1493db8ee3dce4bbf7468f3425e90f7779906316a746681a3e3efb615c781d8f
                  • Instruction ID: 4aeb8c730fe6ee08bc3f26778bd3e6327f463ba1761df1c8bf61128db4a13565
                  • Opcode Fuzzy Hash: 1493db8ee3dce4bbf7468f3425e90f7779906316a746681a3e3efb615c781d8f
                  • Instruction Fuzzy Hash: A8E0E5B4A11219CBE718AF60E964B99BB71FB99305F10C199D409A7394CB301D40DF21
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 09de0c3c602af0e5a5194fc5b1b500341d4f9f5e383a11385cca3a4ba609f2d2
                  • Instruction ID: 1d3e01e1d754f9bc19d457d01f29aa9bd71a224e1b33a7d2187c98d334d36867
                  • Opcode Fuzzy Hash: 09de0c3c602af0e5a5194fc5b1b500341d4f9f5e383a11385cca3a4ba609f2d2
                  • Instruction Fuzzy Hash: 3BE01A74A111189BDB54DF14E998B99BBB1FB99304F108199D409A7344DF305D84DF25
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08c3333e07860ef836dcf23b925019b8295b30f6f23328a8b70bd516de1fe6cb
                  • Instruction ID: 4e576daffb4598dae130304a824ce49714d273b5345b22c332ee364350dbbf47
                  • Opcode Fuzzy Hash: 08c3333e07860ef836dcf23b925019b8295b30f6f23328a8b70bd516de1fe6cb
                  • Instruction Fuzzy Hash: FCE04F749142298FC718DF20E954BAEBBB2FB55304F0080D9E80A63384CB305D80DF02
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c01eeac3ee6106c9c520d368221eb013409bfc59c4bf36f6f6e352d9b1613ad7
                  • Instruction ID: 0d19eafaef7d4ebccfdf97869297905901ac95a8ec8646e429b98f4c451dd224
                  • Opcode Fuzzy Hash: c01eeac3ee6106c9c520d368221eb013409bfc59c4bf36f6f6e352d9b1613ad7
                  • Instruction Fuzzy Hash: 83E0EC34A00128CADB24CB64E4487DCB775EF85315F0480A6954DA2140CAB406C4DF02
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f9982b69c0283f25b5799e35228ce2581c7d30793245b8ec00277727ac01b5f2
                  • Instruction ID: 5c7a338fe0d6ba1269eda0a749257a4fc30842d1b456ace53af9870b0dc8408a
                  • Opcode Fuzzy Hash: f9982b69c0283f25b5799e35228ce2581c7d30793245b8ec00277727ac01b5f2
                  • Instruction Fuzzy Hash: 0BD0C7BE2951149FC305EE49DC81F457375F749731B054565ED04C7366D739F8078A60
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa1e283478b5b82827be92c1741c8fcd963c6af3584830b52fdd0c7ca34daaf7
                  • Instruction ID: 77ac3cc2c41d706f466b674ce8c321654c48579abe9ce96a8f1f989d4543dd85
                  • Opcode Fuzzy Hash: aa1e283478b5b82827be92c1741c8fcd963c6af3584830b52fdd0c7ca34daaf7
                  • Instruction Fuzzy Hash: A5D0A9301036008BE278A7F8B90C39D3B218FA5217F285166F02AB28589AB588D5C323
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 130ace47d102520b872c6485f661936f52641a71f886fb8470a684da0b163f42
                  • Instruction ID: 1da7f58404fa8e9ddf26bf5c53e32ad49cbc7dd1dea44be32ec0870263f0a004
                  • Opcode Fuzzy Hash: 130ace47d102520b872c6485f661936f52641a71f886fb8470a684da0b163f42
                  • Instruction Fuzzy Hash: 6BE0FE74902668CFDB64DF24D988B9CBBB1EB49305F1185EA981FB6244DA351AC5CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 838aa3f56d4c68836e28db59b1589c4fd00d19d7d8fd3399d5d317ce6dd9e374
                  • Instruction ID: 5205a57f0e0b1eccaac01708a038c35e448b18db3cca3efa9c9c486c1d19e7f1
                  • Opcode Fuzzy Hash: 838aa3f56d4c68836e28db59b1589c4fd00d19d7d8fd3399d5d317ce6dd9e374
                  • Instruction Fuzzy Hash: 31D05E34508118CBCB24DF24E680BAAB7B2FB46308F008084980E77798CB705D80DF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ed799d4a5426566a8b18dec5b53d03d3f8e3aa5af7b7c95e5ae29ce380a88e0e
                  • Instruction ID: 96912329bbad6181b1c775715a1a6da28a04240c85cdce4a7a5d47eb8bc5873a
                  • Opcode Fuzzy Hash: ed799d4a5426566a8b18dec5b53d03d3f8e3aa5af7b7c95e5ae29ce380a88e0e
                  • Instruction Fuzzy Hash: C6C0C0525000650BCB09823C4C5837C1795FF0210BB8D04C2C400DE071E70CC4119200
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6b7f615065fad90ed6a73302d47670988e53907e6656d7b658b367b81a43d174
                  • Instruction ID: d4cdd55d685437bf27c517f5446dac6ff3048aa93e1637b2ef1f7ee512ae327d
                  • Opcode Fuzzy Hash: 6b7f615065fad90ed6a73302d47670988e53907e6656d7b658b367b81a43d174
                  • Instruction Fuzzy Hash: DEC08C30003A0887D238B7E8F80C3AC77B89F44317F141030F42D024148FB054D0C726
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3bfc9879df9040274c64a24f77068d4d440923cf431d39ee9e43344115171afd
                  • Instruction ID: eb4da37ad662bc1064abaf47dc541e0fa7dc0ad57182a38b874569581778175e
                  • Opcode Fuzzy Hash: 3bfc9879df9040274c64a24f77068d4d440923cf431d39ee9e43344115171afd
                  • Instruction Fuzzy Hash: 0FD012A281F1C18FC75A17746D580A47F319E5703135C02D6D0ED894F3D5254456C711
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1029c9e756cc8bfe8ed72db779bf13611d364c8baab3eaab9327468eff7c4a1a
                  • Instruction ID: 5c8a3e62cfca89efdea8d33bcb3482c72ce74514a2e35193d2378729899e160f
                  • Opcode Fuzzy Hash: 1029c9e756cc8bfe8ed72db779bf13611d364c8baab3eaab9327468eff7c4a1a
                  • Instruction Fuzzy Hash: DDD012B3444204BFDB418F24D845F007F64EB1A710F0940A1F60C8B371C636E810D755
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e897b3eece1e1896cf6c79e9aafa5b6bd8333c8eae1cf2f84500e00e4ee83b95
                  • Instruction ID: 1842924e77cdf22bb2b763d0db68bc3ada6aabd11ce6c6aa0593ded061387520
                  • Opcode Fuzzy Hash: e897b3eece1e1896cf6c79e9aafa5b6bd8333c8eae1cf2f84500e00e4ee83b95
                  • Instruction Fuzzy Hash: 33D01C78808209CFCB59DF64E489BACBBB1BB04305F5481AAD009A3242EBB00A849F42
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 99fdfda7fa24a7d85dc5052326196e77dfd07cbe2e0a22b92a1cb827b67d2899
                  • Instruction ID: 71e98e434fdfe0e8d780763e5e9e3f1976fb33e3e0a69ec07b6c06499b3f42f2
                  • Opcode Fuzzy Hash: 99fdfda7fa24a7d85dc5052326196e77dfd07cbe2e0a22b92a1cb827b67d2899
                  • Instruction Fuzzy Hash: BDD09E7891911A8BDB28DF14D919BA9B772FB54304F0041A9D5156778AD7301D40DF41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c4bcbbd11997b9a5d25e8944cfcc1a2ddc02ff481534fe84657b1776c89f594d
                  • Instruction ID: e68673effa0caa5de50f2ac72b66e06d0e137f6f6e7de946ee5047ae3e8f6a27
                  • Opcode Fuzzy Hash: c4bcbbd11997b9a5d25e8944cfcc1a2ddc02ff481534fe84657b1776c89f594d
                  • Instruction Fuzzy Hash: C3C08C3005A13A8BCA247FB4B4482283B31E7403023000AA1E8260D91CCF6044D58B93
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 813bbf84feedc1c7a387c98e7db78d390adf98dab2175886a40818ecb7a697a5
                  • Instruction ID: ddc969134cf5c59abc23033e5233959bc3f7432caf5d1f7c205d16568a38dbfb
                  • Opcode Fuzzy Hash: 813bbf84feedc1c7a387c98e7db78d390adf98dab2175886a40818ecb7a697a5
                  • Instruction Fuzzy Hash: 19C0013E2402088F8708EF99E485C11B3B9EB89A153118196E9098B32ADB32FC51CA80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f9a86753ebfb8700e10bbdd601ae54a102813b7b3c6f99d9602c48f63e56717
                  • Instruction ID: 80ec9f22d2c3b6c17bd99047b0c385f8f4248c00fa92c07fb40c075a0fc2f481
                  • Opcode Fuzzy Hash: 7f9a86753ebfb8700e10bbdd601ae54a102813b7b3c6f99d9602c48f63e56717
                  • Instruction Fuzzy Hash: 05C04C76E1011E9BCF00DBD9E4409DCFB74EF94321F404036D214A7104D6305526DF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0bc8e3eb883d34fa68206c87cd77c2d68ec2fbffcfb21d2bf9e82a4028513d91
                  • Instruction ID: 57c4231744c21a4df29191533f120ac8b82d1a87e7d5544f7b32e1e2c5c46db8
                  • Opcode Fuzzy Hash: 0bc8e3eb883d34fa68206c87cd77c2d68ec2fbffcfb21d2bf9e82a4028513d91
                  • Instruction Fuzzy Hash: 48B0928794818247E3820FAC18983906A26A732606FC946564801832D9E60D98A89601
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5289e6a4edd29168097151a247ad464a9769e97242a417127ac0b2ff48b97b0e
                  • Instruction ID: 41ed46b2afd97f21b09d50011137c0e4feca8fb2bda42554d84f5b16d6c4846a
                  • Opcode Fuzzy Hash: 5289e6a4edd29168097151a247ad464a9769e97242a417127ac0b2ff48b97b0e
                  • Instruction Fuzzy Hash: 58B012302067080E169057B62C0872A32AC960040474040769C1DC0111F680D0101250
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bd709559645134c22aed42dd309283fe593ef310cd4d849c7818a725b2d1cf2f
                  • Instruction ID: 3c2a74bd50f9f30e1bd6e58fcb83fee8cb2b7a687125cf1fdd1d09050758f280
                  • Opcode Fuzzy Hash: bd709559645134c22aed42dd309283fe593ef310cd4d849c7818a725b2d1cf2f
                  • Instruction Fuzzy Hash: F3B0124CF5D59805EF431210AC0D93235068E631D3F9104D24C40D9441840C5180347B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8c5c0b1b6d35aaa2c3acf09b94b6b7546169c46faedecf185e97c87bc3fad992
                  • Instruction ID: 25839370ac9c95e96bf4e0cae680e3013baef2232f6c12794c0fa78d4dcaa760
                  • Opcode Fuzzy Hash: 8c5c0b1b6d35aaa2c3acf09b94b6b7546169c46faedecf185e97c87bc3fad992
                  • Instruction Fuzzy Hash: A8C04C6055E7C26EDB1386748D1AB417F701B42741F0744D2A281AE1D3A6945984C7E7
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                  • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                  • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                  • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e2eba0d088d9baafb877882790973f56815cac9db2723c413c2b52d16b9407c4
                  • Instruction ID: d4720e12b4aa04c2a2014f47f98c0fee7871244cdfdf99529a09503d90bf90e0
                  • Opcode Fuzzy Hash: e2eba0d088d9baafb877882790973f56815cac9db2723c413c2b52d16b9407c4
                  • Instruction Fuzzy Hash: B9B09232100208EB86049BC4E804855BBA9AB59600700C029F60A0A112CB72E862DB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 12ad80fa113ad583fc568548a418fc96f44311a594bcbbd16f6a49a952f4add1
                  • Instruction ID: 1c7b855c80f8cac265390b628d497e57e89831316d5d6d8ce117482823d8ccc7
                  • Opcode Fuzzy Hash: 12ad80fa113ad583fc568548a418fc96f44311a594bcbbd16f6a49a952f4add1
                  • Instruction Fuzzy Hash: 07A01230003508CF829C2750B40D0147B3DAA451263801030A02D400046A3414504B40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f441a9ea44a9fa70ed9d48b0017c3769efe6561a5e055fca6651a6ca70eb478
                  • Instruction ID: fed168925076edb02daa470b92a44a1205f24aefe56f15570e97ea312661d8c2
                  • Opcode Fuzzy Hash: 2f441a9ea44a9fa70ed9d48b0017c3769efe6561a5e055fca6651a6ca70eb478
                  • Instruction Fuzzy Hash: C790223000220C8B080023C8300C000B30C800000038000A2B00C02C020B3820000A82
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3db723d964a43599d1f54adc92432f5ab06237df8554687ac1bec7ce27ffd0ea
                  • Instruction ID: 1edc41178f09b767702906e848adb122e0f8c71f1cf81805d77bd0bcbb405644
                  • Opcode Fuzzy Hash: 3db723d964a43599d1f54adc92432f5ab06237df8554687ac1bec7ce27ffd0ea
                  • Instruction Fuzzy Hash: C4B012354091205ECB059604D90BC09FB61DFE0300700C836700081114DB31C810F520
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: TJpq$Tekq$xbnq
                  • API String ID: 0-3321955333
                  • Opcode ID: 425e034df555c0743f55a2c2a99f51904ce7b2c649a804d22171b8c9ee923395
                  • Instruction ID: f72cde8feb6f2e8c1775dbd1a62258cdfdf73dbf698d622206382b2ba6ff8852
                  • Opcode Fuzzy Hash: 425e034df555c0743f55a2c2a99f51904ce7b2c649a804d22171b8c9ee923395
                  • Instruction Fuzzy Hash: A3C16675E016188FDB68CF6AC9446DDBBF2BF89300F14C1AAD909AB365DB305A81CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724473536.0000000005910000.00000040.00000800.00020000.00000000.sdmp, Offset: 05910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5910000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$,oq
                  • API String ID: 0-616274613
                  • Opcode ID: eae952769c51e4a99bc0352b7eef9d536d0a645ea37b0cb3ad90f1e380c422d3
                  • Instruction ID: 49767230200e84d18756464922216034248bde2bc7efc8c6ecb6fdad7dfd4c05
                  • Opcode Fuzzy Hash: eae952769c51e4a99bc0352b7eef9d536d0a645ea37b0cb3ad90f1e380c422d3
                  • Instruction Fuzzy Hash: 01D10A34A00219CFCB14DF69C588A6AB7F6FF88354F25C5A9E819AB365D730EC81CB54
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: o^r
                  • API String ID: 0-1623704425
                  • Opcode ID: 386a75ae30c92fa6e38d675ff3d34e853d8e39eda159700626f38be14a6a6ad8
                  • Instruction ID: 3ed14ee7f69652ce51adeec026d37cd96ac6a9392abd5aeca8a9a850dbc20e36
                  • Opcode Fuzzy Hash: 386a75ae30c92fa6e38d675ff3d34e853d8e39eda159700626f38be14a6a6ad8
                  • Instruction Fuzzy Hash: 4912A371E046199BDB18CFAEC98069DFBF2FF88304F24C169D419AB21AD734A946CF54
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: cd2f243934271bc68d8d8d908309ac54fe484259e7c10df28f20e0b1046c76d1
                  • Instruction ID: a5da39fbf9638e01bfac0193a7e9373a9a197afeef8af5e70e0080afe87562ae
                  • Opcode Fuzzy Hash: cd2f243934271bc68d8d8d908309ac54fe484259e7c10df28f20e0b1046c76d1
                  • Instruction Fuzzy Hash: 2D51E431A052A54FDB01EF7D99A02DABFA2EF86214B1881E6C590CB356D734D88AC7D4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: doq
                  • API String ID: 0-3318987180
                  • Opcode ID: eb2354b53de713615fec0ee89d08355d54fc487fc843efc1c847eef86f64101d
                  • Instruction ID: 99e691aa44404b1846e9aca35134f6ce9785015fd70a2fbcb7658ea30c766c44
                  • Opcode Fuzzy Hash: eb2354b53de713615fec0ee89d08355d54fc487fc843efc1c847eef86f64101d
                  • Instruction Fuzzy Hash: 1E715C74D18228CFDB24DFA9E984BEDBBB2FB49304F108069D419AB359DB345986CF50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: doq
                  • API String ID: 0-3318987180
                  • Opcode ID: b6fe70d5c5938f922a2f5baddb181e5b56abce90b28836b42540701b51a9257c
                  • Instruction ID: 6fc8cd8228dd8e6c78fdd8b3cb56997447bcc3a4778adf8bf5429cca28070b34
                  • Opcode Fuzzy Hash: b6fe70d5c5938f922a2f5baddb181e5b56abce90b28836b42540701b51a9257c
                  • Instruction Fuzzy Hash: 71717D74D18228CFDB24DFA9E985BEDBBB2FB49304F108069D419AB359DB345986CF40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1725181164.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_59b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8
                  • API String ID: 0-4194326291
                  • Opcode ID: 3000db544d1e113659f16fb87c20c2cf8f108c80e1affb8de017e40ab91b900b
                  • Instruction ID: 02e99e1795d566d76987a805a861d16db14f69de5191b0b7e75bbd289d461a41
                  • Opcode Fuzzy Hash: 3000db544d1e113659f16fb87c20c2cf8f108c80e1affb8de017e40ab91b900b
                  • Instruction Fuzzy Hash: C1515971D056688BEB28CF6BDD446CAFAF3AFC8300F14C1EAD44CA6255DB705AC58E51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1b85bab5706b863c3ec9db2908271ff5679aa78ee2419d3fea13c7dab8d75e52
                  • Instruction ID: f36f2109eb8b028040b91228a219068bff7a5517416655ccda0a9bf777f099b5
                  • Opcode Fuzzy Hash: 1b85bab5706b863c3ec9db2908271ff5679aa78ee2419d3fea13c7dab8d75e52
                  • Instruction Fuzzy Hash: 6FB1E274E05358CFDB14DFA9D884BADBBF2FB49314F20906AE809AB295DB745985CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f178d80d4a4f256717fa59722cc4faeec667401010b0a790780fe9cb9a255a75
                  • Instruction ID: e62c5de357f647d297a14ed800dfca3db196967a1b3802b2f636e03694312539
                  • Opcode Fuzzy Hash: f178d80d4a4f256717fa59722cc4faeec667401010b0a790780fe9cb9a255a75
                  • Instruction Fuzzy Hash: 34B10274E05318CFDB14DFA9D884BADBBF2FB49314F20906AE809AB295DB745985CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6fd736e2a14d892d9302731d6eefb37810227a4b92133c6df20b58ee094f5e3f
                  • Instruction ID: 893e76acedabc8d05b2eb67a99a864c06b8a7947461af1785f5b1d0784df0ad3
                  • Opcode Fuzzy Hash: 6fd736e2a14d892d9302731d6eefb37810227a4b92133c6df20b58ee094f5e3f
                  • Instruction Fuzzy Hash: FA915A74E05228CFDB04DFA4E894BADBBF2FB4A304F20842AE419A7758DB746841CF50
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f2c775be5b8dcde5bdbec10fa15fc75bcdd4a71b3771551f6de52a7a024a54fc
                  • Instruction ID: a8b2a433fd0898d27207c9ee1dd240f04f646d0db6b5e28dbd98123bc0e1615d
                  • Opcode Fuzzy Hash: f2c775be5b8dcde5bdbec10fa15fc75bcdd4a71b3771551f6de52a7a024a54fc
                  • Instruction Fuzzy Hash: 0581E3B0D05228CBDB18CFA9C5447EDBBF1EB49314F2090AAD819BB244D7798A85CF65
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7ee0eb0e8bdbcbbdaa07cf713b9e40d66643abd109ad8f3295fac785261670bf
                  • Instruction ID: f3be9e817ace7b29b2eecd70a7c4cd317539d51a64f30a3ec8bafa30a0245981
                  • Opcode Fuzzy Hash: 7ee0eb0e8bdbcbbdaa07cf713b9e40d66643abd109ad8f3295fac785261670bf
                  • Instruction Fuzzy Hash: A6713874E09208CFDF54DFA9E484BADBBF6BB49314F109069E80AA7395DB349995CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e99dfa08005797257b7851d3753e756a96007ea48622f7b7755a68e707a66104
                  • Instruction ID: f6b85327c110bb00061840f466fdf08082ac9d92cb7f5f458629467c48e70f4a
                  • Opcode Fuzzy Hash: e99dfa08005797257b7851d3753e756a96007ea48622f7b7755a68e707a66104
                  • Instruction Fuzzy Hash: 677129B4D0421CCFDB24DFA6C845BEDBBB6BF89340F1094A9D40AAB251DB719A85CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6be90b9dd5a68af287fa5e44f0c011c55ee031733b695d398351af946a99bad7
                  • Instruction ID: 43e813bbe4e14a01642b4a64677800a21134b61afeecbc56496951cf4c16bdd2
                  • Opcode Fuzzy Hash: 6be90b9dd5a68af287fa5e44f0c011c55ee031733b695d398351af946a99bad7
                  • Instruction Fuzzy Hash: D6713874E09208CFDF54DFA8E484BADBBF6BB49314F109069E80AA7395DB349995CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 087065e2becccc56d162907d425073bd86d3268927972e6ee41614f4dbd8906f
                  • Instruction ID: b697b38f62ad21c97f94ef939b89bbc25cacf57df5ef11df6d2994b0ca968de2
                  • Opcode Fuzzy Hash: 087065e2becccc56d162907d425073bd86d3268927972e6ee41614f4dbd8906f
                  • Instruction Fuzzy Hash: 62612036F106258FD754DB69D880B5EB3E3AFC8711F1AC1A8E805AB369DE74DD018B90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2c9a78b9be8d0bd5035ece99a035e7269476930dcac5ce7c580bd1aac3c2310a
                  • Instruction ID: 64aa28006014a7c666a7ab6f98bc66bc55cd8e750819f79eb7008c492ec6ffff
                  • Opcode Fuzzy Hash: 2c9a78b9be8d0bd5035ece99a035e7269476930dcac5ce7c580bd1aac3c2310a
                  • Instruction Fuzzy Hash: 58711A74E05208CFDF54DFA9E484BADBBF2BB49314F109069E80AA7359DB309995CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 782b7a4d1447ed4d6866c3702ff68fc506349447b9f2033fc7bf9d6b61aa1f0a
                  • Instruction ID: d5b337aae088cb053d1e01913d7f21293335fb6467ce12051465dde2466dca3f
                  • Opcode Fuzzy Hash: 782b7a4d1447ed4d6866c3702ff68fc506349447b9f2033fc7bf9d6b61aa1f0a
                  • Instruction Fuzzy Hash: AA612A75E09208CFDF54DFA9E494BADBBF2BB4A314F109069E80AA7355DB309985CF00
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 568d338f40e802311d943cde936f42e2ec2e8496b0ada7157554e2e393d441e8
                  • Instruction ID: efe2c88b9dccfed1f83d5b1d0e2b609694062e0b25f0f00644fdab1a197f6390
                  • Opcode Fuzzy Hash: 568d338f40e802311d943cde936f42e2ec2e8496b0ada7157554e2e393d441e8
                  • Instruction Fuzzy Hash: 4371E6B4E003199FDB64DF59D840B9EBBB6BF89300F10C4A9951DA7354DB309E858F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 82359db88e34f8afff73a1c4ea92bdec091adfe5de2cc954a09ea5797f014ebe
                  • Instruction ID: 746d3974412cfdf4cc294b565c34d6318acfc8c87b5018003c3378d1d1a7116b
                  • Opcode Fuzzy Hash: 82359db88e34f8afff73a1c4ea92bdec091adfe5de2cc954a09ea5797f014ebe
                  • Instruction Fuzzy Hash: EA71E4B4E003299FDB68DF59D840B9EBBB6BF89300F10C4A9951DA7354DB30AE858F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a0ed9392d3c107ae308af173f084f4f728a0e26636f6f8f640f25d877f0d1e9c
                  • Instruction ID: 1b91be7e3878e0ff31090ae07a98638ac06624ac4f2e81de4c5faa49ec7d5ae6
                  • Opcode Fuzzy Hash: a0ed9392d3c107ae308af173f084f4f728a0e26636f6f8f640f25d877f0d1e9c
                  • Instruction Fuzzy Hash: CA61F474D06228CFDB60CF59D888BD9BBB6BB89311F1480EAD80DA3250DB755AD9CF10
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6aa73601ec212611e2dc6e1d0d5cc37032fed615619255f366f14786876796dd
                  • Instruction ID: 87c0cab2da7e9ffc0d28ec6ac0d01886c4561f4492e68689ced68d5d9f4351ed
                  • Opcode Fuzzy Hash: 6aa73601ec212611e2dc6e1d0d5cc37032fed615619255f366f14786876796dd
                  • Instruction Fuzzy Hash: E7512578D19218CFDB14DFA8E584AEDBBB6FB4A304F24906AE405AB649DB345845CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e894b6673c97420e0d7ff55ea4a43f904dc026b900d6ad9fa617574fba64f1f
                  • Instruction ID: 479416abfde01f641eeb9e9c0c3ac0844fb6eecfd48667f9b3faa2f986b4dcec
                  • Opcode Fuzzy Hash: 0e894b6673c97420e0d7ff55ea4a43f904dc026b900d6ad9fa617574fba64f1f
                  • Instruction Fuzzy Hash: 0361F474D06228CFDB64CF59D848BE9BBB6BB89311F1094EAD80DA3250DB751AD8CF14
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 632542e76f7e1c32987abb556f642c3eb6411b4a2328a7e1f0b2eef11fad688e
                  • Instruction ID: 3f27903c6d9498a2cfbcb3ba467deadc385ce87df9291cf1235d81d890682ae2
                  • Opcode Fuzzy Hash: 632542e76f7e1c32987abb556f642c3eb6411b4a2328a7e1f0b2eef11fad688e
                  • Instruction Fuzzy Hash: AA511574D19228CFDB14DFA8E584BEDBBFABB4A304F10902AE419AB748DB745845CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc0b62d544ada1b2f964cfdbc88e998554b87d9d9fd976fadbee0fd6cf85f208
                  • Instruction ID: 78bf78ac781679d4d8dfcdc62516b34c0c32a0252fcddf0148b0a13644a6e2cf
                  • Opcode Fuzzy Hash: cc0b62d544ada1b2f964cfdbc88e998554b87d9d9fd976fadbee0fd6cf85f208
                  • Instruction Fuzzy Hash: A2510374D19228CFDB14DFA8E584BEDBBF6FB4A304F10902AE405AB648DB345845CB44
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d5a0f996445125256a163f2bbde54b3846bea75937709ea1d625ee3ba20377c6
                  • Instruction ID: df5ee94f05160a7e8c40c7f83ffcb2fc9553824232587cce0ea699bf80c2deaf
                  • Opcode Fuzzy Hash: d5a0f996445125256a163f2bbde54b3846bea75937709ea1d625ee3ba20377c6
                  • Instruction Fuzzy Hash: E8513674E06219CFDF44CFA9E544AEEBBF2BB89310F10802AE919A7350DB745985CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2d6731f7d42b3467f44084d88d34682aeab7961e92e9c03d4609284e2f4394d7
                  • Instruction ID: 30fa57532c3d916ece9b67acd01a6a961a08e9704a6d5a3089fc7d4a9a233138
                  • Opcode Fuzzy Hash: 2d6731f7d42b3467f44084d88d34682aeab7961e92e9c03d4609284e2f4394d7
                  • Instruction Fuzzy Hash: 904148B1E016198BDB18CFABC94069EFBF3BFC8310F14C07AD958AB254DB7459468B54
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cfdf03a43e4e0282cb5207cc5ae997f07e161c1c4986085ffe76dd81639a8d8b
                  • Instruction ID: a27a9243f0232151cb69e022ceb884fee0ede80e37d7526204db870c2179a82b
                  • Opcode Fuzzy Hash: cfdf03a43e4e0282cb5207cc5ae997f07e161c1c4986085ffe76dd81639a8d8b
                  • Instruction Fuzzy Hash: 59512574E06219CFDF44CFA9E544AEEBBF2BB89310F10802AD919A7350DB745995CF90
                  Memory Dump Source
                  • Source File: 00000000.00000002.1725181164.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_59b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9c57c649960cb182dc88c2c86aa70c796966ef842f3919a3176cf9a8b7c8119d
                  • Instruction ID: 95c9cb69aabce8942597fa87eabe84a9769e6f5cae0b52e56d4d3c39c1f6107f
                  • Opcode Fuzzy Hash: 9c57c649960cb182dc88c2c86aa70c796966ef842f3919a3176cf9a8b7c8119d
                  • Instruction Fuzzy Hash: F5515EB1D056548BE729CF6B8D442CAFAF3AFC9300F18C1FA944CA6265DB740AC58F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa266cc78f5e2da9da5c37185cecdeeb9818cfb916600b8e2ef314438dde8c40
                  • Instruction ID: fce855563ad9df47c27c4d3751133d299fcd97782312bc8aa4446dbfe67bf0db
                  • Opcode Fuzzy Hash: aa266cc78f5e2da9da5c37185cecdeeb9818cfb916600b8e2ef314438dde8c40
                  • Instruction Fuzzy Hash: A8519D71D05A188BEB28CF6B8C407DAFAF3AFC9301F14D1B9D51DAA265DB7049868F01
                  Memory Dump Source
                  • Source File: 00000000.00000002.1725181164.00000000059B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_59b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1f61dfd22d782460f9f7b9ee29c5e23fe4067985e09de2d34ef132863fe7dc86
                  • Instruction ID: 3d6e9710549a4cce2bafdea1a5397b50e33bb757bdbff9273b2c680a7d561097
                  • Opcode Fuzzy Hash: 1f61dfd22d782460f9f7b9ee29c5e23fe4067985e09de2d34ef132863fe7dc86
                  • Instruction Fuzzy Hash: 5C41E0B4D04358DFEB14CFA9D984BDDBBF5BB09300F209529E419AB250D7B49885CF85
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a36aefb177ab9d664957849f152115bd37692fcf9d5ffff08155d24592c538e1
                  • Instruction ID: 9e836d048ae07f3732cd7e420249cb3a652115b5056eb4f00e688d2454eca105
                  • Opcode Fuzzy Hash: a36aefb177ab9d664957849f152115bd37692fcf9d5ffff08155d24592c538e1
                  • Instruction Fuzzy Hash: 2841FEB5D05258DFCB10CFA9D484AEEFBF4AB09320F14942AE455B7350C738AA49CFA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724947811.0000000005950000.00000040.00000800.00020000.00000000.sdmp, Offset: 05950000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5950000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ec2bf6e9dde8277fd96c183b8d0fd7a1895bdd57ec51c70b039ac7b820ce55fb
                  • Instruction ID: 351048ed535cc03908c79e97a631d169096d1697a0c94046bb2760bc09db4879
                  • Opcode Fuzzy Hash: ec2bf6e9dde8277fd96c183b8d0fd7a1895bdd57ec51c70b039ac7b820ce55fb
                  • Instruction Fuzzy Hash: 4741EFB5D05258DFCB10CFA9D584AEEFBF4AB09320F14942AE455B7350C738AA49CFA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 120468b699d6bb07c2b883cb2904a4fbb01d2b31ecea5be872a7a7f1955a32ce
                  • Instruction ID: feed97f7a2bb1ee11bc7761fee04a35575473c97c6e4631b042e4281929a2caa
                  • Opcode Fuzzy Hash: 120468b699d6bb07c2b883cb2904a4fbb01d2b31ecea5be872a7a7f1955a32ce
                  • Instruction Fuzzy Hash: FE41D770E046298BDB68CF5BC84879ABAF2BF89300F14C5FAD41DA6655DB344BC09F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62058e7c2a6c465b1e6218457fa92556a08b992b1c278683443220964879dab8
                  • Instruction ID: 409ee1875e29338c2a2d532abc80317fe3757f0f7491dacadf58a5c82c89aece
                  • Opcode Fuzzy Hash: 62058e7c2a6c465b1e6218457fa92556a08b992b1c278683443220964879dab8
                  • Instruction Fuzzy Hash: C43109B1D44618CBEB28CFAAC8457AEFBF6AF89300F14C56AC409A7259DB750585CF41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 67549877ec718d50e327c82fad70c42636fa727876e790ecfd9ad64cedc7ae3e
                  • Instruction ID: cbbda8c582e62301e809ec3394609c7aa5f9207e5e147bfdb85f8337abd26ee4
                  • Opcode Fuzzy Hash: 67549877ec718d50e327c82fad70c42636fa727876e790ecfd9ad64cedc7ae3e
                  • Instruction Fuzzy Hash: D331E4B0D44618CBEB28CFAAC8457EEFAF7AF89300F24C46AC409A7259DB740585CF41
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b50490df809ee3e218d2ebd380025493d0a7dfa18aaa97433375f6b47b4c58d7
                  • Instruction ID: df2896dc0691e8421d9773415dbe809b5f88a4ac02dfabc2f04c9cb6ecc98f9f
                  • Opcode Fuzzy Hash: b50490df809ee3e218d2ebd380025493d0a7dfa18aaa97433375f6b47b4c58d7
                  • Instruction Fuzzy Hash: 4131A8B1D056288BEB18CF5BC9447DEBBF3AFC9300F14C1AA9809AB214DB744A859F40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8dbb0a0e4ee562e6eaea21a3b4ebec8de0434521c712bb0314c7a6f9a83df71b
                  • Instruction ID: 87623811c6d366498ad139c3fa4dfa309e239795cf3184e21e2bf0595baaaf62
                  • Opcode Fuzzy Hash: 8dbb0a0e4ee562e6eaea21a3b4ebec8de0434521c712bb0314c7a6f9a83df71b
                  • Instruction Fuzzy Hash: E13164B1D05628CBEB68CF6BC85878AFAF7AB88305F54D1A9C4086A254DB740A85CF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724030010.00000000057B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_57b0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8a5960360c81f9f60001215cf8f07b49291f61ab2a1ad7ef195920b48ea7cdf
                  • Instruction ID: a767489f368fed6baedc6d37bb27ae199fed2bede3e52c872da13743aa598da0
                  • Opcode Fuzzy Hash: a8a5960360c81f9f60001215cf8f07b49291f61ab2a1ad7ef195920b48ea7cdf
                  • Instruction Fuzzy Hash: 1B3197B1D056288BEB18CF9AD9457DEBBF3AFC9300F14C1AA9409AB214DB744A859F40
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cf6514fccb5b916655a79ef083f3dad5c822d114b0f85de51ea4254c718a97a4
                  • Instruction ID: 2b7a04a9d84cec4d29b4fddd319327de1217bd08b7fb9652540b74865ea06ceb
                  • Opcode Fuzzy Hash: cf6514fccb5b916655a79ef083f3dad5c822d114b0f85de51ea4254c718a97a4
                  • Instruction Fuzzy Hash: D42102B5D04218CFCB10CFA9D980AEEBBF4BB49310F14942AD805B7214C735A945CFA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8559c72f6525f60f1bfec79c570e0ed85ffaaeb28c2518bc878a91d4c7d4a3b5
                  • Instruction ID: 74be6ac31ac333173bd2e637007614fba319b2e9a2b085714bafc8fc4102a110
                  • Opcode Fuzzy Hash: 8559c72f6525f60f1bfec79c570e0ed85ffaaeb28c2518bc878a91d4c7d4a3b5
                  • Instruction Fuzzy Hash: B221EBB5D042189FCB10CFA9D980AEEFBF4FB49320F10942AE849B7210C735A945CFA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1707390212.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2b50000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 871cc5fcceb91d8905f0a3f9cb31eb66dd43b930d57edc0ecb3616b366152599
                  • Instruction ID: 654d011918f7f7e0f057efdb19e136c677f22e164427ef41157e6be258e5f892
                  • Opcode Fuzzy Hash: 871cc5fcceb91d8905f0a3f9cb31eb66dd43b930d57edc0ecb3616b366152599
                  • Instruction Fuzzy Hash: 98314AB1D056188BEB68CF6BC95878AFBF3AFC8305F54C1A9C40CAA254DB7506858F51
                  Memory Dump Source
                  • Source File: 00000000.00000002.1726406267.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5c20000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fe25d09152e453f816204e7edbe361af2128b5e65f517c67f371f7ef748b099
                  • Instruction ID: e987b0518564f52a6ef207ec9bd9072484d5a901bb81f8fc76c3f3cfbde57942
                  • Opcode Fuzzy Hash: 0fe25d09152e453f816204e7edbe361af2128b5e65f517c67f371f7ef748b099
                  • Instruction Fuzzy Hash: 4121C971D046298BEB28CF6BC84879AFAF7BFC4300F04C5FA941CA6255EB740A819F50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1724598965.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_5920000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (_kq$(_kq$(_kq$(_kq
                  • API String ID: 0-3111510350
                  • Opcode ID: 38e0d6fd27444a0fa7d4977fccfd14b24c8889ad8f12ff2cdfbb2b2cfdd3c8cc
                  • Instruction ID: ae39fe45f5d06046c2ae3a691fd85c6f687ffa2d5cb8e1e72924966fb959c36e
                  • Opcode Fuzzy Hash: 38e0d6fd27444a0fa7d4977fccfd14b24c8889ad8f12ff2cdfbb2b2cfdd3c8cc
                  • Instruction Fuzzy Hash: AC61F135B042548FC704EF78C85456E7BB2FF8A304B248469E406DB3AADB35DC42CB90
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Drq$t
                  • API String ID: 0-206804598
                  • Opcode ID: 7b5d677dbe93b0c108e260179ee9f440070e65957b190149382ff4b3576c8723
                  • Instruction ID: 0f4190012a1ae461dea1ad2da5e3a9b617e137dfe986d8105d451cf2a7b1a9b0
                  • Opcode Fuzzy Hash: 7b5d677dbe93b0c108e260179ee9f440070e65957b190149382ff4b3576c8723
                  • Instruction Fuzzy Hash: 91A1BE74A002048FDB14EF29D5A4A5EBBF2FF88310F118169E805AB3A5DB34EC46CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Drq$H
                  • API String ID: 0-591194865
                  • Opcode ID: b732d6922860a8e37dcb24b74384c270fb9aa430b2d04f37cc1b77d393cffe66
                  • Instruction ID: 526f4adfd260836a2add633cfcfa2088ea6abb2c7b882f898ff923962f354f60
                  • Opcode Fuzzy Hash: b732d6922860a8e37dcb24b74384c270fb9aa430b2d04f37cc1b77d393cffe66
                  • Instruction Fuzzy Hash: AC616C78A406008FCB14DF29D5A4A59BBF2FF88310B15C1A9E81AEB365DB30ED45CF94
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$(oq
                  • API String ID: 0-3207256227
                  • Opcode ID: 5efa194a8f7751ebd9fd4ff7d870d3a8b60fb2fc087f85a13f19d7d240a6ba93
                  • Instruction ID: ea056b80f1ce5b46b5b13a0739489c2ad761fa231d4a7b7c3b92da17dec11fdc
                  • Opcode Fuzzy Hash: 5efa194a8f7751ebd9fd4ff7d870d3a8b60fb2fc087f85a13f19d7d240a6ba93
                  • Instruction Fuzzy Hash: 47312931B083894FCB119F78981019F7FF29F93351B1945ABC159E7392EE34590AC791
                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID: Tekq
                  • API String ID: 0-2319236580
                  • Opcode ID: a866261c37e5ac6c8b3f18e067b0007bdb3e5240ae76b9da708b707b0589573f
                  • Instruction ID: 3c777c8b944efb5868de8d495bae8a2c1d6a2b6150fb02cf06012b99f6ccf486
                  • Opcode Fuzzy Hash: a866261c37e5ac6c8b3f18e067b0007bdb3e5240ae76b9da708b707b0589573f
                  • Instruction Fuzzy Hash: FB21B530B00104CFD704AF79C4647AFBAE7AF89740F644469E607AB3A4CE759C01CB94
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 67d190f1e1d83667d7e2f176e774ffbb7b142fdd306ec088d6a5dc99dca2f35e
                  • Instruction ID: f7571f279099670812f6db124a32f478f51f858fdf447face798b34cd4a65a62
                  • Opcode Fuzzy Hash: 67d190f1e1d83667d7e2f176e774ffbb7b142fdd306ec088d6a5dc99dca2f35e
                  • Instruction Fuzzy Hash: E3413D30E102198BDB15EFA9D864BEEBBF2BF88750F148065E416A7394DB349D05CF60
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 751705d5978357e4705880d72955512b38bf54d3b38a0eab000fa358277be66a
                  • Instruction ID: 5ea3447eb7b22ab56e7bef33040986334b9a698445da02a2c6a72531a991766c
                  • Opcode Fuzzy Hash: 751705d5978357e4705880d72955512b38bf54d3b38a0eab000fa358277be66a
                  • Instruction Fuzzy Hash: 32315E70D08604DFD704EFA9C4683ADBBF6EB84305F9080A9D00A5B395EBB859CACF41
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 429d8e7d8469acf29967a65371d77e713b13df6422133ac4dde64d4e57e3fd19
                  • Instruction ID: 198a430081ef2357dce12a80e0150b232db14952f6b234512dba57f6e114a074
                  • Opcode Fuzzy Hash: 429d8e7d8469acf29967a65371d77e713b13df6422133ac4dde64d4e57e3fd19
                  • Instruction Fuzzy Hash: 69312B70D08604DBD704EF99C4683ADBBF6EB84305F9094A9D10A9B355EBB85D8ACF41
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f8caa64fd964cfbd0a7261066df1965bd912638087f0eadec8d24403b122343d
                  • Instruction ID: 8b0b6643045b5eae3b527821a92854d9328024a872f7773bde23b17ba5c5d542
                  • Opcode Fuzzy Hash: f8caa64fd964cfbd0a7261066df1965bd912638087f0eadec8d24403b122343d
                  • Instruction Fuzzy Hash: 1B214C78A09100DBE309DF6AE055762BBE2EF96700F09C5F9D04A4F36ADB349D82CB41
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6c6649663ab0a13bec079bd3d896b90665ee6e81509819e0c85207aa9155c3b9
                  • Instruction ID: 4ca07f28d04a82fb6578e17bb527c97186f5e0395e537ffdf0145d92bc198156
                  • Opcode Fuzzy Hash: 6c6649663ab0a13bec079bd3d896b90665ee6e81509819e0c85207aa9155c3b9
                  • Instruction Fuzzy Hash: A51161387452148FD754DB34E468B793BE5BF4A750F1640EAE54ACF3A1EB608C41CB52
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa11a5625d39af4aad26cb523a075664b196ba347e523aa02cfe01dc0fa24b8e
                  • Instruction ID: 208de89a4933667de3955eae1c213639f58113c535b04441d80e5a24ea29c252
                  • Opcode Fuzzy Hash: aa11a5625d39af4aad26cb523a075664b196ba347e523aa02cfe01dc0fa24b8e
                  • Instruction Fuzzy Hash: DAF08771D0824A8FCF01DBB898151EEBFB1EE96310F1145AAD158F7151E770168ACB91
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e902fd619c5fe219f3e720fd9ac84dac1990a800b4deda4d13985682a3db2a5
                  • Instruction ID: ca132a5ae67e5068f05d705ce8e3e740897052b22ed313ab063ba5ecacf57130
                  • Opcode Fuzzy Hash: 0e902fd619c5fe219f3e720fd9ac84dac1990a800b4deda4d13985682a3db2a5
                  • Instruction Fuzzy Hash: 04E01A35A09015CBE708DF169850755B7A5FF89700B4AE4A9C40A9B226EB30EC82CE80
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad97541af3b157462b9b76e67ef5f3e26a233429b6464ab7d684fc71cae1c1cb
                  • Instruction ID: 09184b35f1829044a67e964fb3cdc3eb7102fd7a9cc012d78747123415e37318
                  • Opcode Fuzzy Hash: ad97541af3b157462b9b76e67ef5f3e26a233429b6464ab7d684fc71cae1c1cb
                  • Instruction Fuzzy Hash: CAD02E322086A09FC3023B6868202DC7FE8CEAB21230A00D7E18DCB3A3CF000D4083A6
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 908a6b1c7427ba5af78e5282d119c123ff5064e702f47b9d7fba2b4da58bd4c1
                  • Instruction ID: 3858b178c9ecac1537caad61b4469ea3e2e1fa74a2c1ae5edbf3d4b2eeb47bc9
                  • Opcode Fuzzy Hash: 908a6b1c7427ba5af78e5282d119c123ff5064e702f47b9d7fba2b4da58bd4c1
                  • Instruction Fuzzy Hash: 4CC01266408B8A8FC70203256C04384BF28982362438D02C6E688C32F3AA0024068369
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f984b3323e69ff095ebf0d1c3b6ac851b3dd74fdff58ac3a3676a2ebbb8c270c
                  • Instruction ID: 8b2ebf35254cc7c80996e6faafffd509719f5ff4a83b74879b9e8c4dee466703
                  • Opcode Fuzzy Hash: f984b3323e69ff095ebf0d1c3b6ac851b3dd74fdff58ac3a3676a2ebbb8c270c
                  • Instruction Fuzzy Hash: CBC08C323001349B060433A878280AC76DDCBCAA6330100AAE50ECB380CF551D4047DA
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ddeabe20aab2744184a517bce88069cd52512704c3fc22e8f59fb4065db26b5f
                  • Instruction ID: 68a056f1cf6fed5da3be416b9521ff51a3f08ad151d919aec7969fae7e0dedad
                  • Opcode Fuzzy Hash: ddeabe20aab2744184a517bce88069cd52512704c3fc22e8f59fb4065db26b5f
                  • Instruction Fuzzy Hash: 18D0126294EBC94FCB2767F0186411C3FB58C1311078A04EBC08C8F1B3E98C486C8303
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5c4d6b7c116510ca1484a0400678f415a5cdb2ae90a43c5c9a56eb7add8007f8
                  • Instruction ID: 9b391c0ab207e8e64098c7a69c7b5f697a46b6ae15872ac8d3873004df791470
                  • Opcode Fuzzy Hash: 5c4d6b7c116510ca1484a0400678f415a5cdb2ae90a43c5c9a56eb7add8007f8
                  • Instruction Fuzzy Hash: 82C01230A04108AFCB182BA0E82097C7AB2FB44300F044069F812626A0CA690C809B01
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2b27b6de4621a1fbc001370548cf0f1d91efdce2e18f4ce3e7b7cc6ad9fce544
                  • Instruction ID: 9cd25e068eb0ac6afd5c757ab597b4eaac97943cb6bfa76d35af69feb24d4bf3
                  • Opcode Fuzzy Hash: 2b27b6de4621a1fbc001370548cf0f1d91efdce2e18f4ce3e7b7cc6ad9fce544
                  • Instruction Fuzzy Hash: 29C04C78E00304CBCF885F74A85C21C7AE2B789605B404869E80BC3350DE3448C09F51
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 881e13db612c2d0a528e27e8cf507c0748847eb79a72dce6887cb53b5dc3738e
                  • Instruction ID: e2ce8e85871dc2fd0090311307eabf99d27ed9f53754af096b7e6ea1319a73c8
                  • Opcode Fuzzy Hash: 881e13db612c2d0a528e27e8cf507c0748847eb79a72dce6887cb53b5dc3738e
                  • Instruction Fuzzy Hash: 17A0122094070D07C90223F424482183B9C45441003D00010940D4B201DC5C94580140
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b4268ad2be18f4712134a5ebc86e4b261b4f81f7cdf44fbf5b76bb45aaf5abb5
                  • Instruction ID: 3429498111910a92ae62ddf6cff03519f16dc9f23785e8832b2624d2dc262dbc
                  • Opcode Fuzzy Hash: b4268ad2be18f4712134a5ebc86e4b261b4f81f7cdf44fbf5b76bb45aaf5abb5
                  • Instruction Fuzzy Hash: 45A02230002B0C82C300B2B0202002AB38C0A802083C000BE830E08A320833E8A0CC88
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 91b3d2250d2a15626d957379c63e418b9e80ddeead202bb645c17609a0804ef9
                  • Instruction ID: f3d1bbf3ce55a58205ce705b98a1614a522325b8ec6275cb32d3ca88921d5822
                  • Opcode Fuzzy Hash: 91b3d2250d2a15626d957379c63e418b9e80ddeead202bb645c17609a0804ef9
                  • Instruction Fuzzy Hash: 6190023214464C8B45416796690979D7B5CA5455157900052BA0D455125A9565104595
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 24e022b15125fe59ab00b392ebe8049ef69f9556208e52dd0d0c4bfba161a9f7
                  • Instruction ID: be5a46c96e8716f3b82f209dcd67171e3ea1a86ec6e38a5e3e5cbfd9681a3f04
                  • Opcode Fuzzy Hash: 24e022b15125fe59ab00b392ebe8049ef69f9556208e52dd0d0c4bfba161a9f7
                  • Instruction Fuzzy Hash: 94900231444A0D8B475027957C09755775DA5545157C80051A90E825616E95645046D9
                  Memory Dump Source
                  • Source File: 00000001.00000002.2941127644.00000000026A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_26a0000_Zzh4Ti7eW0.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5f23c5f3eca5ef4fa2f58c43af46eaee782da950ec47593e3b7ebb5d511d5865
                  • Instruction ID: 700b5f3675e38984477c06a8c0c03e14b596743a01a52cdaba0ccf8e69068895
                  • Opcode Fuzzy Hash: 5f23c5f3eca5ef4fa2f58c43af46eaee782da950ec47593e3b7ebb5d511d5865
                  • Instruction Fuzzy Hash: