Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Receipt.exe

Overview

General Information

Sample Name:Receipt.exe
Analysis ID:714970
MD5:59082912cb9d1d4ece0567b1354d0f34
SHA1:a3c3e88b6c905eaee872bb21916c792a3ec1d7e7
SHA256:7ef24f6499dd9fc7809783a98febc44c2dc25a3f74d02c9bf8ddbae0d3b781c6
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Initial sample is a PE file and has a suspicious name
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
PE file contains executable resources (Code or Archives)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Receipt.exe (PID: 4740 cmdline: C:\Users\user\Desktop\Receipt.exe MD5: 59082912CB9D1D4ECE0567B1354D0F34)
    • powershell.exe (PID: 5996 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Receipt.exe (PID: 2912 cmdline: C:\Users\user\Desktop\Receipt.exe MD5: 59082912CB9D1D4ECE0567B1354D0F34)
    • Receipt.exe (PID: 572 cmdline: C:\Users\user\Desktop\Receipt.exe MD5: 59082912CB9D1D4ECE0567B1354D0F34)
    • Receipt.exe (PID: 3492 cmdline: C:\Users\user\Desktop\Receipt.exe MD5: 59082912CB9D1D4ECE0567B1354D0F34)
  • Jzqbsob.exe (PID: 676 cmdline: "C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe" MD5: 59082912CB9D1D4ECE0567B1354D0F34)
  • Jzqbsob.exe (PID: 2892 cmdline: "C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe" MD5: 59082912CB9D1D4ECE0567B1354D0F34)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.599774933.000000000360C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000008.00000002.618961337.000000000394C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000002.578345911.0000000006B00000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0x10185:$x1: NanoCore.ClientPluginHost
          • 0x101c2:$x2: IClientNetworkHost
          • 0x13cf5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Receipt.exe.6b00000.4.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            7.3.Receipt.exe.5010e10.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              7.3.Receipt.exe.5010e10.3.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                7.2.Receipt.exe.5770000.1.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.Receipt.exe.6b00000.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    Click to see the 6 entries
                    No Sigma rule has matched
                    Timestamp:103.141.138.125192.168.2.524980496972841753 10/03/22-13:30:23.588911
                    SID:2841753
                    Source Port:24980
                    Destination Port:49697
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.5103.141.138.12549697249802025019 10/03/22-13:30:08.258701
                    SID:2025019
                    Source Port:49697
                    Destination Port:24980
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.5103.141.138.12549697249802816766 10/03/22-13:30:23.935676
                    SID:2816766
                    Source Port:49697
                    Destination Port:24980
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Receipt.exeReversingLabs: Detection: 35%
                    Source: Receipt.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeAvira: detection malicious, Label: HEUR/AGEN.1252994
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeReversingLabs: Detection: 35%
                    Source: Yara matchFile source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTR
                    Source: Receipt.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeJoe Sandbox ML: detected
                    Source: Receipt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: Receipt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmp

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.5:49697 -> 103.141.138.125:24980
                    Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.5:49697 -> 103.141.138.125:24980
                    Source: TrafficSnort IDS: 2841753 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon (Inbound) 103.141.138.125:24980 -> 192.168.2.5:49697
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA.crt0
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA.crl0E
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA.crl0L
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/json
                    Source: Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/jsonschema
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTR

                    System Summary

                    barindex
                    Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
                    Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
                    Source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
                    Source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
                    Source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
                    Source: initial sampleStatic PE information: Filename: Receipt.exe
                    Source: Receipt.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                    Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
                    Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                    Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
                    Source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                    Source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
                    Source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_018111B00_2_018111B0
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01815BD10_2_01815BD1
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BF71200_2_01BF7120
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BF33A80_2_01BF33A8
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BF8CB80_2_01BF8CB8
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BF30430_2_01BF3043
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BF2E900_2_01BF2E90
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_016211277_2_01621127
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_016230007_2_01623000
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_01625BE07_2_01625BE0
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_01625BD17_2_01625BD1
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_018891D87_2_018891D8
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_018833A87_2_018833A8
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_01882FEF7_2_01882FEF
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_032E9E007_2_032E9E00
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_0590D5D07_2_0590D5D0
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_05900CF07_2_05900CF0
                    Source: Receipt.exeStatic PE information: Resource name: RT_VERSION type: ARC archive data, packed
                    Source: Jzqbsob.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARC archive data, packed
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQnwarliipjooijoxqlleev.dll" vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000002.530701855.0000000005891000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethats.exe" vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000002.559896437.0000000005D91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethats.exe" vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Receipt.exe
                    Source: Receipt.exe, 00000000.00000002.461260742.00000000033B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethats.exe" vs Receipt.exe
                    Source: Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Receipt.exe
                    Source: Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Receipt.exe
                    Source: Receipt.exe, 00000007.00000000.457523111.0000000000702000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamethats.exe" vs Receipt.exe
                    Source: Receipt.exe, 00000007.00000003.470098072.000000000488E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUwtpxswhphuvnrulrb.dll" vs Receipt.exe
                    Source: Receipt.exeReversingLabs: Detection: 35%
                    Source: C:\Users\user\Desktop\Receipt.exeFile read: C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: Receipt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Receipt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exe
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exe
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exe
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe "C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe "C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe"
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==Jump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeFile created: C:\Users\user\AppData\Roaming\BouqiJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_twhdr2os.ade.ps1Jump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@12/7@0/0
                    Source: C:\Users\user\Desktop\Receipt.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: Receipt.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Receipt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6008:120:WilError_01
                    Source: C:\Users\user\Desktop\Receipt.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Receipt.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: Receipt.exeStatic file information: File size 4574208 > 1048576
                    Source: Receipt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Receipt.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x44fc00
                    Source: Receipt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdb source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net40/Newtonsoft.Json.pdbSHA256w^ source: Receipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: 0.2.Receipt.exe.6b00000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.3.Receipt.exe.5010e10.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.3.Receipt.exe.5010e10.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.Receipt.exe.5770000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Receipt.exe.6b00000.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.Receipt.exe.5bd1038.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.3.Receipt.exe.4c90db0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.Receipt.exe.5bd1038.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.3.Receipt.exe.4c50d90.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.Receipt.exe.5770000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.3.Receipt.exe.4c30d70.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000002.599774933.000000000360C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.618961337.000000000394C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.578345911.0000000006B00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.596522547.0000000002EEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.444317098.00000000059D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.614181534.000000000322B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.466500426.00000000036FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.599218252.0000000003355000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000003.491615975.0000000005010000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.461260742.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.635737864.0000000005770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000003.470098072.000000000488E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Receipt.exe PID: 4740, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Jzqbsob.exe PID: 676, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Jzqbsob.exe PID: 2892, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BFE0E0 push 0000003Bh; ret 0_2_01BFE0E2
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BFE0D2 push 0000003Bh; ret 0_2_01BFE0D4
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BFD2D5 push FFFFFF8Bh; retf 0_2_01BFD2DF
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 0_2_01BFDFA8 push 0000003Bh; ret 0_2_01BFDFAA
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_05909C4A pushfd ; retf 7_2_05909C51
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_05900FB0 push ss; ret 7_2_05900FE9
                    Source: C:\Users\user\Desktop\Receipt.exeCode function: 7_2_05900F58 push ss; ret 7_2_05900FE9
                    Source: C:\Users\user\Desktop\Receipt.exeFile created: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run JzqbsobJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run JzqbsobJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (102).png
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exe TID: 5036Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 260Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 160Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8239Jump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: Base64 decoded Start-Sleep -Seconds 50
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: Base64 decoded Start-Sleep -Seconds 50Jump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==Jump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeProcess created: C:\Users\user\Desktop\Receipt.exe C:\Users\user\Desktop\Receipt.exeJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Users\user\Desktop\Receipt.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Users\user\Desktop\Receipt.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Receipt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Receipt.exe, 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                    Source: Receipt.exe, 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
                    Source: Yara matchFile source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Receipt.exe PID: 3492, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts1
                    PowerShell
                    1
                    Registry Run Keys / Startup Folder
                    11
                    Process Injection
                    11
                    Masquerading
                    OS Credential Dumping1
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Registry Run Keys / Startup Folder
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                    Remote Access Software
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                    Virtualization/Sandbox Evasion
                    Security Account Manager21
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Obfuscated Files or Information
                    Cached Domain Credentials12
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 714970 Sample: Receipt.exe Startdate: 03/10/2022 Architecture: WINDOWS Score: 100 31 Snort IDS alert for network traffic 2->31 33 Malicious sample detected (through community Yara rule) 2->33 35 Antivirus / Scanner detection for submitted sample 2->35 37 7 other signatures 2->37 7 Receipt.exe 1 5 2->7         started        11 Jzqbsob.exe 2->11         started        13 Jzqbsob.exe 2->13         started        process3 file4 25 C:\Users\user\AppData\Roaming\...\Jzqbsob.exe, PE32 7->25 dropped 27 C:\Users\user\...\Jzqbsob.exe:Zone.Identifier, ASCII 7->27 dropped 29 C:\Users\user\AppData\...\Receipt.exe.log, ASCII 7->29 dropped 39 Encrypted powershell cmdline option found 7->39 15 powershell.exe 16 7->15         started        17 Receipt.exe 7->17         started        19 Receipt.exe 7->19         started        21 Receipt.exe 7->21         started        41 Antivirus detection for dropped file 11->41 43 Multi AV Scanner detection for dropped file 11->43 45 Machine Learning detection for dropped file 11->45 signatures5 process6 process7 23 conhost.exe 15->23         started       

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Receipt.exe36%ReversingLabsWin32.Trojan.Woreflint
                    Receipt.exe100%AviraHEUR/AGEN.1252994
                    Receipt.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe100%AviraHEUR/AGEN.1252994
                    C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe36%ReversingLabsWin32.Trojan.Woreflint
                    SourceDetectionScannerLabelLinkDownload
                    7.0.Receipt.exe.400000.0.unpack100%AviraHEUR/AGEN.1232002Download File
                    0.0.Receipt.exe.c60000.0.unpack100%AviraHEUR/AGEN.1252994Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://james.newtonking.com/projects/json0%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.newtonsoft.com/jsonReceipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.nuget.org/packages/Newtonsoft.Json.BsonReceipt.exe, 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.467694143.00000000037A3000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000000.00000002.588758977.0000000006D50000.00000004.08000000.00040000.00000000.sdmp, Receipt.exe, 00000000.00000002.487184452.0000000004AB6000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.632548236.000000000449B000.00000004.00000800.00020000.00000000.sdmp, Receipt.exe, 00000007.00000002.601437093.00000000033DF000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000008.00000002.621710984.00000000039F4000.00000004.00000800.00020000.00000000.sdmp, Jzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://james.newtonking.com/projects/jsonJzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.newtonsoft.com/jsonschemaJzqbsob.exe, 00000009.00000002.619058249.00000000032D3000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          No contacted IP infos
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:714970
                          Start date and time:2022-10-03 13:26:47 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 38s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:Receipt.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:11
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@12/7@0/0
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 291
                          • Number of non-executed functions: 4
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          13:27:54API Interceptor13x Sleep call for process: powershell.exe modified
                          13:28:51AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Jzqbsob "C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe"
                          13:28:59AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Jzqbsob "C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe"
                          13:30:08Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\Receipt.exe" s>$(Arg0)
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\Receipt.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):1039
                          Entropy (8bit):5.3436815157474165
                          Encrypted:false
                          SSDEEP:24:ML9E4Ks2wKDE4KhK3VZ9pKhyE4KdE4KBLWE4K5AE4Kzr7a:MxHKXwYHKhQnoyHKdHKBqHK5AHKzva
                          MD5:6C24176D343957C767AA6536571797FA
                          SHA1:64512F67A49AF75E9A67474DF54FCCD3472905B2
                          SHA-256:63AB82B5B458425DB1E0831E1BB8CA642C602D9BCB0762A1E47C7836CACF3350
                          SHA-512:D0DFB30B723CC1F0ADB8D9448220AC67A1A21243499B7EB31402CAA0CE9F6A892073E10C52D132E59BF2321F05DBB0973B7E1026023992FC33DE5AB74A6979A4
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"System.Numerics, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\34957343ad5d84daee97a1affda91665\System.Runtime.Serialization.ni.dll",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b880
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):5829
                          Entropy (8bit):4.8968676994158
                          Encrypted:false
                          SSDEEP:96:WCJ2Woe5o2k6Lm5emmXIGvgyg12jDs+un/iQLEYFjDaeWJ6KGcmXx9smyFRLcU6f:5xoe5oVsm5emd0gkjDt4iWN3yBGHh9s6
                          MD5:36DE9155D6C265A1DE62A448F3B5B66E
                          SHA1:02D21946CBDD01860A0DE38D7EEC6CDE3A964FC3
                          SHA-256:8BA38D55AA8F1E4F959E7223FDF653ABB9BE5B8B5DE9D116604E1ABB371C1C87
                          SHA-512:C734ADE161FB89472B1DF9B9F062F4A53E7010D3FF99EDC0BD564540A56BC35743625C50A00635C31D165A74DCDBB330FFB878C5919D7B267F6F33D2AAB328E7
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:PSMODULECACHE......<.e...Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........<.e...T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):16484
                          Entropy (8bit):5.5525830267255625
                          Encrypted:false
                          SSDEEP:384:3te/Rq01vrCHRZ/09E4xn6uxRiJ9gSSJ3uzp1AYv:5HRRYE4x6ux1ScuRv
                          MD5:5E720B8C48A8866D6D7D049C08C1599B
                          SHA1:AEF8EF6A27518FF21B7555F3BCB91D967583706D
                          SHA-256:2F3A54859BBB76612C9C67167CD509C02496CE435E753FBADDEDBFC781EA5704
                          SHA-512:76BA201A564BB26F9B8AC3AA78D45FD5BD3260276971C9BCDD2B996148567BD69BC98C2BE5EECC25AFECFF41146DBB9E2CA74DDDA388DA4D15D6AC73D362FF57
                          Malicious:false
                          Preview:@...e...............................8.M..............@..........H...............<@.^.L."My...:'..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.............System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Users\user\Desktop\Receipt.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):4574208
                          Entropy (8bit):4.096422057850003
                          Encrypted:false
                          SSDEEP:24576:RzSiXemZQDLG5EeMRROEtrclFD0bWfeX7TXkQqAbTWP0BT3pWiQFEIJMmDwkchWa:
                          MD5:59082912CB9D1D4ECE0567B1354D0F34
                          SHA1:A3C3E88B6C905EAEE872BB21916C792A3EC1D7E7
                          SHA-256:7EF24F6499DD9FC7809783A98FEBC44C2DC25A3F74D02C9BF8DDBAE0D3B781C6
                          SHA-512:B0FF1A80EDF7A0D3CAC7882DE5626C2F54B415C63454C8AFE8D256560439D0B41709B57B1B0CE149E3D6B6859AB4DEFC3D39563E7C40731966E9310C4220EEF0
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 36%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:c..............0...D...........E.. ........@.. ....................... F...........`.................................x.E.S.... E.......................F...................................................... ............... ..H............text.....D.. ....D................. ..`.rsrc........ E.......D.............@..@.reloc........F.......E.............@..B..................E.....H.......l.E..............................................................s....(....*..(....*.0..`.......s......o....t....r...po......o....o.....1)~.....rI..p .......o....t....~.....(....&...,..o.....*........OU.......(....(....*..(....*.(.... ..D......%.....(....o....(....*...0..4.........(....o....o....(....s......o........,..o.....&...*.........%.........../.......0.......... ..........s...... ....(....o.....+<.o.............rq..p(..................o.......o.......o.....o..
                          Process:C:\Users\user\Desktop\Receipt.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):4.096422057850003
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:Receipt.exe
                          File size:4574208
                          MD5:59082912cb9d1d4ece0567b1354d0f34
                          SHA1:a3c3e88b6c905eaee872bb21916c792a3ec1d7e7
                          SHA256:7ef24f6499dd9fc7809783a98febc44c2dc25a3f74d02c9bf8ddbae0d3b781c6
                          SHA512:b0ff1a80edf7a0d3cac7882de5626c2f54b415c63454c8afe8d256560439d0b41709b57b1b0ce149e3d6b6859ab4defc3d39563e7c40731966e9310c4220eef0
                          SSDEEP:24576:RzSiXemZQDLG5EeMRROEtrclFD0bWfeX7TXkQqAbTWP0BT3pWiQFEIJMmDwkchWa:
                          TLSH:9326AEE9D16E04D5EC067EF598283EC34B3136B38EE40524277EBA444FB74BE8509D6A
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:c..............0...D...........E.. ........@.. ....................... F...........`................................
                          Icon Hash:7cf292aecae8e896
                          Entrypoint:0x851bce
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x633AB216 [Mon Oct 3 09:57:42 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x451b780x53.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4520000xcc00.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4600000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x44fbd40x44fc00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x4520000xcc000xcc00False0.37946155024509803data5.009048473408761IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x4600000xc0x200False0.044921875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "E"0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x4522600x800Device independent bitmap graphic, 48 x 96 x 4, image size 1152
                          RT_ICON0x452a700x400Device independent bitmap graphic, 32 x 64 x 4, image size 512
                          RT_ICON0x452e800x200Device independent bitmap graphic, 16 x 32 x 4, image size 128
                          RT_ICON0x4530900x1000Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors
                          RT_ICON0x4540a00xa00Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors
                          RT_ICON0x454ab00x800Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors
                          RT_ICON0x4552c00x600Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors
                          RT_ICON0x4558d00x4400Device independent bitmap graphic, 64 x 128 x 32, image size 16896
                          RT_ICON0x459ce00x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9600
                          RT_ICON0x45c2f00x1200Device independent bitmap graphic, 32 x 64 x 32, image size 4224
                          RT_ICON0x45d5000xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2400
                          RT_ICON0x45df100x600Device independent bitmap graphic, 16 x 32 x 32, image size 1088
                          RT_GROUP_ICON0x45e5200xaedata
                          RT_VERSION0x45e5e00x31aARC archive data, packed
                          RT_MANIFEST0x45e90c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          No network behavior found

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:13:27:40
                          Start date:03/10/2022
                          Path:C:\Users\user\Desktop\Receipt.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\Receipt.exe
                          Imagebase:0xc60000
                          File size:4574208 bytes
                          MD5 hash:59082912CB9D1D4ECE0567B1354D0F34
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.447622011.0000000005FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.578345911.0000000006B00000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.444317098.00000000059D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.466500426.00000000036FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.461260742.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:13:27:52
                          Start date:03/10/2022
                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==
                          Imagebase:0xb10000
                          File size:430592 bytes
                          MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:high

                          Target ID:2
                          Start time:13:27:52
                          Start date:03/10/2022
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff7fcd70000
                          File size:625664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:5
                          Start time:13:28:53
                          Start date:03/10/2022
                          Path:C:\Users\user\Desktop\Receipt.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Users\user\Desktop\Receipt.exe
                          Imagebase:0x350000
                          File size:4574208 bytes
                          MD5 hash:59082912CB9D1D4ECE0567B1354D0F34
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low

                          Target ID:6
                          Start time:13:28:54
                          Start date:03/10/2022
                          Path:C:\Users\user\Desktop\Receipt.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Users\user\Desktop\Receipt.exe
                          Imagebase:0x2a0000
                          File size:4574208 bytes
                          MD5 hash:59082912CB9D1D4ECE0567B1354D0F34
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low

                          Target ID:7
                          Start time:13:28:54
                          Start date:03/10/2022
                          Path:C:\Users\user\Desktop\Receipt.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\Receipt.exe
                          Imagebase:0xa70000
                          File size:4574208 bytes
                          MD5 hash:59082912CB9D1D4ECE0567B1354D0F34
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.634818451.0000000004556000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                          • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.633515113.00000000044DE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.599218252.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000003.491615975.0000000005010000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.635737864.0000000005770000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000003.470098072.000000000488E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:8
                          Start time:13:28:59
                          Start date:03/10/2022
                          Path:C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe"
                          Imagebase:0xdb0000
                          File size:4574208 bytes
                          MD5 hash:59082912CB9D1D4ECE0567B1354D0F34
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.599774933.000000000360C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.618961337.000000000394C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 36%, ReversingLabs
                          Reputation:low

                          Target ID:9
                          Start time:13:29:08
                          Start date:03/10/2022
                          Path:C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Bouqi\Jzqbsob.exe"
                          Imagebase:0x800000
                          File size:4574208 bytes
                          MD5 hash:59082912CB9D1D4ECE0567B1354D0F34
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.596522547.0000000002EEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000009.00000002.614181534.000000000322B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Reset < >

                            Execution Graph

                            Execution Coverage:15.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:32
                            Total number of Limit Nodes:0
                            execution_graph 20587 6d4c448 20588 6d4c45c 20587->20588 20589 6d4c465 20588->20589 20591 6d4c68a 20588->20591 20596 6d4c770 20591->20596 20600 6d4c8e8 20591->20600 20605 6d4c760 20591->20605 20597 6d4c7b4 20596->20597 20598 6d4c8ab 20597->20598 20609 6d4cb68 20597->20609 20601 6d4c8ee 20600->20601 20617 6d4ce30 20601->20617 20621 6d4ce20 20601->20621 20602 6d4c693 20602->20589 20606 6d4c768 20605->20606 20607 6d4c8ab 20606->20607 20608 6d4cb68 RtlEncodePointer 20606->20608 20608->20607 20610 6d4cb86 20609->20610 20613 6d4cbc8 20610->20613 20611 6d4cb96 20611->20598 20614 6d4cc02 20613->20614 20615 6d4cc2c RtlEncodePointer 20614->20615 20616 6d4cc55 20614->20616 20615->20616 20616->20611 20618 6d4ce3e 20617->20618 20625 6d4ce68 20618->20625 20619 6d4ce4e 20619->20602 20622 6d4ce30 20621->20622 20624 6d4ce68 RtlEncodePointer 20622->20624 20623 6d4ce4e 20623->20602 20624->20623 20626 6d4ceb1 20625->20626 20627 6d4ced7 RtlEncodePointer 20626->20627 20628 6d4cf00 20626->20628 20627->20628 20628->20619

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 797 1bf33a8-1bf33e1 800 1bf3406-1bf3412 797->800 801 1bf33e3-1bf33e5 797->801 802 1bf342d-1bf3463 800->802 803 1bf3414-1bf341b 800->803 804 1bf33fd 801->804 805 1bf33e7-1bf33f3 801->805 810 1bf3465-1bf3471 802->810 811 1bf34c1-1bf34d0 802->811 803->802 806 1bf341d-1bf342c 803->806 808 1bf33fe-1bf3404 804->808 805->802 807 1bf33f5-1bf33fb 805->807 807->808 808->800 808->801 812 1bf3477-1bf3486 810->812 813 1bf3843-1bf387d 810->813 811->813 814 1bf34d6-1bf34ec 811->814 812->813 815 1bf348c-1bf349b 812->815 820 1bf396c-1bf397d call 1bf3350 813->820 821 1bf3883-1bf3889 813->821 814->813 816 1bf34f2-1bf353b 814->816 815->813 817 1bf34a1-1bf34be 815->817 816->813 823 1bf3541-1bf3574 816->823 829 1bf397f-1bf3989 call 1bf2bf8 820->829 830 1bf398e-1bf3994 820->830 822 1bf388c-1bf3898 821->822 827 1bf389e-1bf38c7 822->827 828 1bf3997-1bf39c3 822->828 834 1bf357a-1bf357d 823->834 835 1bf3620-1bf362c 823->835 827->828 831 1bf38cd-1bf38f2 827->831 843 1bf39cb-1bf39f1 828->843 829->830 840 1bf3955-1bf395e 831->840 841 1bf38f4-1bf38f7 831->841 838 1bf3580-1bf358e 834->838 835->813 839 1bf3632-1bf3646 835->839 838->813 842 1bf3594-1bf35b5 838->842 844 1bf364c-1bf364f 839->844 845 1bf37e7-1bf37f0 839->845 840->828 849 1bf3960-1bf3966 840->849 848 1bf38fa-1bf390b 841->848 842->813 858 1bf35bb-1bf35ef 842->858 846 1bf3652-1bf365d 844->846 845->813 847 1bf37f2-1bf37fe 845->847 846->813 850 1bf3663-1bf3672 846->850 851 1bf3822-1bf3840 847->851 852 1bf3800-1bf3811 call 1bf3350 847->852 848->828 853 1bf3911-1bf392d 848->853 849->820 849->822 850->813 856 1bf3678-1bf3707 850->856 852->851 864 1bf3813-1bf381d call 1bf2bf8 852->864 853->828 865 1bf392f-1bf3946 853->865 871 1bf370d-1bf3710 856->871 872 1bf37c8-1bf37e1 856->872 858->813 869 1bf35f5-1bf361a 858->869 864->851 865->828 868 1bf3948-1bf3953 865->868 868->840 868->848 869->835 869->838 873 1bf3713-1bf3721 871->873 872->845 872->846 873->813 874 1bf3727-1bf3748 873->874 874->813 876 1bf374e-1bf377f 874->876 876->813 878 1bf3785-1bf3797 876->878 878->813 879 1bf379d-1bf37c2 878->879 879->872 879->873
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: adce7292349368de4d4b3a33ac9105fec48cdb7d7d145f12b79b6df1fb7012a4
                            • Instruction ID: b582eceb22ed9d13200c2188006f5a059b61c9efc109fd16a25a609cf6983ee1
                            • Opcode Fuzzy Hash: adce7292349368de4d4b3a33ac9105fec48cdb7d7d145f12b79b6df1fb7012a4
                            • Instruction Fuzzy Hash: E3220975E002198FCB19CFA9C8809AEBBF6FF88310F19C56AE915AB315D7359C45CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1133 1bf8cb8-1bf8cda 1134 1bf8e07-1bf8e0b 1133->1134 1135 1bf8ce0-1bf8ce6 1133->1135 1136 1bf8edf-1bf8ee3 1134->1136 1137 1bf8e11-1bf8e17 1134->1137 1138 1bf8d3d-1bf8d40 1135->1138 1139 1bf8ce8-1bf8cee 1135->1139 1140 1bf8ee9-1bf8eef 1136->1140 1141 1bf9124-1bf9154 1136->1141 1143 1bf8e7f-1bf8e82 1137->1143 1144 1bf8e19-1bf8e1f 1137->1144 1138->1134 1142 1bf8d46-1bf8d4c 1138->1142 1145 1bf8cf2-1bf8cfe 1139->1145 1146 1bf8cf0 1139->1146 1147 1bf8fb9-1bf8fbc 1140->1147 1148 1bf8ef5-1bf8efb 1140->1148 1248 1bf9156 call 1bf9161 1141->1248 1249 1bf9156 call 1bf9170 1141->1249 1150 1bf8d4e 1142->1150 1151 1bf8d50-1bf8d5c 1142->1151 1143->1136 1149 1bf8e84-1bf8e8a 1143->1149 1152 1bf8e23-1bf8e2f 1144->1152 1153 1bf8e21 1144->1153 1154 1bf8d00-1bf8d0b 1145->1154 1146->1154 1156 1bf8fbe-1bf8fd9 1147->1156 1157 1bf9019-1bf901c 1147->1157 1158 1bf8efd-1bf8eff 1148->1158 1159 1bf8f01-1bf8f03 1148->1159 1160 1bf8e8e-1bf8e9a 1149->1160 1161 1bf8e8c 1149->1161 1162 1bf8d5e-1bf8d8b 1150->1162 1151->1162 1163 1bf8e31-1bf8e3f 1152->1163 1153->1163 1165 1bf8d0f-1bf8d1b 1154->1165 1166 1bf8d0d 1154->1166 1193 1bf8fdd-1bf8fe9 1156->1193 1194 1bf8fdb 1156->1194 1157->1141 1167 1bf9022-1bf9067 1157->1167 1170 1bf8f0d-1bf8f3b 1158->1170 1159->1170 1168 1bf8e9c-1bf8eda 1160->1168 1161->1168 1206 1bf8d8d-1bf8d99 1162->1206 1207 1bf8d9b-1bf8dd4 1162->1207 1173 1bf8e43-1bf8e4f 1163->1173 1174 1bf8e41 1163->1174 1169 1bf8d1d-1bf8d38 1165->1169 1166->1169 1226 1bf9069-1bf9075 1167->1226 1227 1bf9095-1bf90dc 1167->1227 1189 1bf911a-1bf9121 1168->1189 1169->1189 1209 1bf8f3d-1bf8f49 1170->1209 1210 1bf8f4b-1bf8f83 1170->1210 1180 1bf8e51-1bf8e7a 1173->1180 1174->1180 1180->1189 1198 1bf8feb-1bf9014 1193->1198 1194->1198 1197 1bf915c 1198->1189 1206->1207 1216 1bf8dd9-1bf8e02 1206->1216 1207->1189 1209->1210 1217 1bf8f88-1bf8fb4 1209->1217 1210->1189 1216->1189 1217->1189 1226->1227 1234 1bf9077-1bf9084 1226->1234 1227->1189 1234->1227 1237 1bf9086-1bf9093 1234->1237 1237->1227 1241 1bf90de-1bf9117 1237->1241 1241->1189 1248->1197 1249->1197
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5535f592526063093c46e94fc8ec13c5dcecdbd17e85d7829d70ec983537446f
                            • Instruction ID: 4a0ec11c28339a33fe081860486f4811512c9836fc112a337e0ba860141af8d9
                            • Opcode Fuzzy Hash: 5535f592526063093c46e94fc8ec13c5dcecdbd17e85d7829d70ec983537446f
                            • Instruction Fuzzy Hash: 5ED16C757002158FCB6C9F79C058429B7E6FF8921831589EED10ACB362DF75DC4A8BA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f24bf10335ac403d778ff4e5a38a8e375f8ebb1d3d37ced64d47e2cccc2eacbf
                            • Instruction ID: 321c8d6776f76d3826f7e458be18df2627a53c4f1b2b2ad77431b4ce13c34fa2
                            • Opcode Fuzzy Hash: f24bf10335ac403d778ff4e5a38a8e375f8ebb1d3d37ced64d47e2cccc2eacbf
                            • Instruction Fuzzy Hash: 2A817C75B002158FCB18DFA9C89499EBBF6BF89300B1581A9D505EB365DF70EC4ACB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 117 6d4ce68-6d4ceb8 call 6d4cca0 call 6d4ccf8 122 6d4cebe 117->122 123 6d4ceba-6d4cebc 117->123 124 6d4cec3-6d4cecb 122->124 123->124 125 6d4cf27-6d4cf39 124->125 126 6d4cecd-6d4cefe RtlEncodePointer 124->126 128 6d4cf07-6d4cf1d 126->128 129 6d4cf00-6d4cf06 126->129 128->125 129->128
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 06D4CEED
                            Memory Dump Source
                            • Source File: 00000000.00000002.588642491.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6d40000_Receipt.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: 0c8c80b7877d5af53cb8e0af4fcea51da93beac644b70af609841b2e8453503e
                            • Instruction ID: 408d91dd4f778a257d6ed040a7e4f1e67604c029a353d4ecbc251bcfe7f18a19
                            • Opcode Fuzzy Hash: 0c8c80b7877d5af53cb8e0af4fcea51da93beac644b70af609841b2e8453503e
                            • Instruction Fuzzy Hash: 5B219AB18163548FCB90DF99E9497DEBBF4EB08314F14442AD454E7340C3789988CBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 131 6d4cbc8-6d4cc0a 134 6d4cc10 131->134 135 6d4cc0c-6d4cc0e 131->135 136 6d4cc15-6d4cc20 134->136 135->136 137 6d4cc81-6d4cc8e 136->137 138 6d4cc22-6d4cc53 RtlEncodePointer 136->138 140 6d4cc55-6d4cc5b 138->140 141 6d4cc5c-6d4cc7c 138->141 140->141 141->137
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 06D4CC42
                            Memory Dump Source
                            • Source File: 00000000.00000002.588642491.0000000006D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D40000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_6d40000_Receipt.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: ee42631a172c4c7c616d8cf2cfb6d65a68c8077bc86b3ba768e302f7172140f9
                            • Instruction ID: 11243026538a0f1a1b8990a544b97df99ab2191e70c039c1425e98742289693d
                            • Opcode Fuzzy Hash: ee42631a172c4c7c616d8cf2cfb6d65a68c8077bc86b3ba768e302f7172140f9
                            • Instruction Fuzzy Hash: 281159B0D112158FDB60DFA9D5487DEBBF4EB49358F108429D405A3700C779AA48CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 143 181eb90-181eba5 144 181ebb1-181ebe8 143->144 145 181eba7-181ebac call 181eaa0 143->145 148 181eded-181ee23 144->148 149 181ebee-181ebf7 144->149 145->144 164 181ee82-181ee89 148->164 165 181ee25-181ee72 148->165 150 181eca6-181ecad 149->150 151 181ebfd-181ec09 149->151 152 181ecdf-181ecee 150->152 153 181ecaf-181ecc1 150->153 151->148 154 181ec0f-181ec18 151->154 157 181ecf0-181ed16 152->157 158 181ed19-181ed25 152->158 153->148 156 181ecc7-181ecdd 153->156 159 181ec1a-181ec33 154->159 160 181ec7c-181ec8b 154->160 162 181ed28-181ed34 156->162 157->158 158->162 159->160 170 181ec35-181ec3b 159->170 160->148 163 181ec91-181eca0 160->163 162->148 167 181ed3a-181ed52 162->167 163->150 163->151 187 181ee7b 165->187 167->148 169 181ed58-181ed89 167->169 169->148 178 181ed8b-181ed9c 169->178 173 181ec47-181ec53 170->173 174 181ec3d 170->174 173->148 175 181ec59-181ec79 173->175 174->173 179 181ede3-181edea 178->179 180 181ed9e-181edab 178->180 180->179 184 181edad-181edda 180->184 184->179 187->164
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: d
                            • API String ID: 0-2564639436
                            • Opcode ID: 685568f0a40061afe621b6731ead448c2539e0f94b3d28c59dbc399c7a1642c1
                            • Instruction ID: 223eabc8d115154e6e2f64b117304dd3e2c49e96edaf9d87d5fb1e379cdce06e
                            • Opcode Fuzzy Hash: 685568f0a40061afe621b6731ead448c2539e0f94b3d28c59dbc399c7a1642c1
                            • Instruction Fuzzy Hash: DBB12475A0021ACFCB11CF98C8809AAB7B6FF88314B558695E905AB35AD734ED45CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 190 1bf7868-1bf789e 192 1bf78b8-1bf78d7 190->192 193 1bf78a0-1bf78b5 190->193 196 1bf7a1d-1bf7a29 192->196 197 1bf78dd-1bf790f 192->197 205 1bf7a2c call 33815e8 196->205 206 1bf7a2c call 3381a99 196->206 207 1bf7a2c call 3381cdc 196->207 208 1bf7a2c call 33813c0 196->208 209 1bf7a2c call 33813a3 196->209 210 1bf7a2c call 3381587 196->210 201 1bf7928-1bf7945 197->201 202 1bf7911-1bf7920 197->202 199 1bf7a2e-1bf7a34 201->196 202->201 205->199 206->199 207->199 208->199 209->199 210->199
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: 2
                            • API String ID: 0-450215437
                            • Opcode ID: e48b36dbf151f86e64bf9170497b51062b75f16cb73505bdfe14505e86d6fa5d
                            • Instruction ID: 1f0222559740ba8d5ab295a9cc29d78d7616860be7f19da3e9bd0bf70552e647
                            • Opcode Fuzzy Hash: e48b36dbf151f86e64bf9170497b51062b75f16cb73505bdfe14505e86d6fa5d
                            • Instruction Fuzzy Hash: E6318F35A01118EFDF05DFA8E850AEEBBB5FF88314F10806AE901A7351DB319919CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 669 1bfed4c-1bfed67 671 1bfed69 669->671 672 1bfedb1-1bfedc8 669->672 673 1bfed6c-1bfed89 671->673 675 1bfedca-1bfedcd 672->675 676 1bfedd1-1bfedda 672->676 684 1bfed9d-1bfedaf 673->684 685 1bfed8b-1bfed9b 673->685 675->676 678 1bfeddc 676->678 679 1bfee04-1bfee0d 676->679 680 1bfeddf-1bfee02 678->680 682 1bfeedb-1bfeedf 679->682 683 1bfee13-1bfee18 679->683 680->679 686 1bfeeeb-1bfeefb 682->686 687 1bfeee1-1bfeee5 682->687 689 1bfee22-1bfee50 683->689 684->672 684->673 685->684 694 1bfefa7-1bfefb0 686->694 695 1bfef01-1bfef0b 686->695 687->686 700 1bfee58-1bfeebb 689->700 697 1bfefb6-1bfefc5 694->697 698 1bff073-1bff07d 694->698 695->694 701 1bfef11-1bfef65 695->701 705 1bfefc8-1bfefce 697->705 706 1bff07f-1bff0b9 698->706 707 1bff0f3-1bff0fc 698->707 711 1bff477-1bff499 700->711 717 1bfeec1-1bfeed5 700->717 747 1bfef9d-1bfef9f 701->747 748 1bfef67-1bfef9b 701->748 705->711 712 1bfefd4-1bfefec 705->712 720 1bff0bb-1bff0be 706->720 721 1bff0c0-1bff0cd 706->721 709 1bff0fe-1bff101 707->709 710 1bff103-1bff110 707->710 714 1bff112-1bff118 709->714 710->714 726 1bff49f 711->726 727 1bff679-1bff67f 711->727 737 1bfefee-1bff016 712->737 738 1bff02b-1bff053 712->738 722 1bff12c-1bff16b 714->722 723 1bff11a-1bff12a 714->723 717->682 717->689 725 1bff0cf-1bff0ee 720->725 721->725 751 1bff1ac-1bff1bb 722->751 723->722 739 1bff16d-1bff1a6 723->739 757 1bff1fe-1bff202 725->757 726->727 733 1bff6b7-1bff6db 727->733 734 1bff681-1bff687 727->734 736 1bff6e1-1bff6e2 733->736 734->733 741 1bff689-1bff6b5 734->741 737->711 743 1bff01c-1bff029 737->743 738->711 744 1bff059-1bff061 738->744 739->751 741->736 753 1bff066-1bff06d 743->753 744->753 747->694 748->694 758 1bff1bd-1bff1e9 751->758 759 1bff1eb-1bff1f6 751->759 753->698 753->705 760 1bff208-1bff25f 757->760 761 1bff415-1bff44d 757->761 758->757 759->757 772 1bff3dd-1bff410 760->772 773 1bff265 760->773 768 1bff455-1bff457 761->768 770 1bff46f-1bff476 768->770 771 1bff459-1bff45f 768->771 774 1bff463-1bff465 771->774 775 1bff461 771->775 772->761 776 1bff268-1bff271 773->776 774->770 775->770 776->711 777 1bff277-1bff28f 776->777 781 1bff3cb-1bff3d7 777->781 782 1bff295-1bff2f7 777->782 781->772 781->776 782->711 785 1bff2fd-1bff328 782->785 789 1bff32a-1bff34e call 1bf9830 785->789 790 1bff350-1bff39a 785->790 789->790 794 1bff39f-1bff3c5 789->794 790->794 794->781
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6c87fdcc3ef3d844ee8f139d10b90af8c1b5fb10a28f741a5e68fc0d598ee913
                            • Instruction ID: d42415538e0ff4352253e2bf781f802603192d7b18a32e706d494f6a759e5273
                            • Opcode Fuzzy Hash: 6c87fdcc3ef3d844ee8f139d10b90af8c1b5fb10a28f741a5e68fc0d598ee913
                            • Instruction Fuzzy Hash: F252603A600514DFDB0ADF98C998D69BBB2FF49714B1A80D8E6059B272C732EC65DB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 880 1bf54fe-1bf5523 881 1bf5525-1bf5541 880->881 882 1bf5544-1bf5549 880->882 883 1bf554b-1bf5551 882->883 884 1bf5561-1bf556b 882->884 888 1bf5555-1bf555f 883->888 889 1bf5553 883->889 885 1bf5608-1bf5611 884->885 886 1bf5571-1bf5578 884->886 897 1bf5619-1bf5620 885->897 890 1bf557a-1bf5581 886->890 891 1bf55a5-1bf55ac 886->891 888->884 889->884 892 1bf58cd-1bf58f1 890->892 893 1bf5587-1bf5596 890->893 894 1bf5923-1bf5936 891->894 895 1bf55b2-1bf55b9 891->895 903 1bf58f8-1bf591c 892->903 900 1bf559c-1bf55a3 893->900 901 1bf5999-1bf59ad 893->901 909 1bf593d-1bf5968 894->909 902 1bf55bf-1bf55ce 895->902 895->903 898 1bf5626-1bf56a4 897->898 899 1bf5804-1bf5808 897->899 954 1bf56bb-1bf56d9 898->954 955 1bf56a6-1bf56b6 898->955 908 1bf580e-1bf5815 899->908 899->909 904 1bf55db-1bf55de 900->904 918 1bf59af-1bf5a9e 901->918 919 1bf596d-1bf5992 901->919 902->901 907 1bf55d4-1bf55d8 902->907 903->894 917 1bf55e7-1bf5605 904->917 907->904 912 1bf581b-1bf583c 908->912 913 1bf58c0-1bf58ca 908->913 909->919 925 1bf583e-1bf5841 912->925 926 1bf587d-1bf58bd 912->926 919->901 931 1bf5844-1bf584d 925->931 926->913 931->901 935 1bf5853-1bf587b call 1bf4b78 931->935 935->926 935->931 959 1bf5773-1bf5777 954->959 963 1bf56df-1bf56e8 954->963 955->959 959->899 961 1bf577d-1bf5791 959->961 961->899 967 1bf5793-1bf57ad 961->967 963->901 964 1bf56ee-1bf5713 963->964 973 1bf5715-1bf5722 964->973 974 1bf5724 964->974 967->899 975 1bf57af-1bf57cc 967->975 976 1bf5729-1bf572b 973->976 974->976 975->899 984 1bf57ce-1bf57eb 975->984 979 1bf572d-1bf5748 976->979 980 1bf5761-1bf576d 976->980 979->980 987 1bf574a-1bf575f 979->987 980->959 980->963 992 1bf57ed-1bf57f0 984->992 993 1bf57f2-1bf57fb 984->993 987->959 987->980 992->899 993->984 995 1bf57fd 993->995 995->899
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5b96307ac23048de9a727271d85a0c8bc547dcc1abb82079d05b11ea2d11306d
                            • Instruction ID: 75054f2d2f5ad7d4e24eb3861c61988150eae1027319456106880d4943036452
                            • Opcode Fuzzy Hash: 5b96307ac23048de9a727271d85a0c8bc547dcc1abb82079d05b11ea2d11306d
                            • Instruction Fuzzy Hash: 09021974A00208DFCB18DFA8D584AADBBF2FF49314F1581A9E5059B361DB34ED49CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 999 1bfbe81-1bfbea4 1000 1bfc0fb-1bfc0ff 999->1000 1001 1bfbeaa-1bfbeb0 999->1001 1002 1bfc105-1bfc10b 1000->1002 1003 1bfc260-1bfc264 1000->1003 1004 1bfbf8c-1bfbf8f 1001->1004 1005 1bfbeb6-1bfbebc 1001->1005 1010 1bfc10d-1bfc123 1002->1010 1011 1bfc128-1bfc12b 1002->1011 1006 1bfc2cb-1bfc2cf 1003->1006 1007 1bfc266-1bfc26c 1003->1007 1008 1bfbfdf-1bfbfe2 1004->1008 1009 1bfbf91-1bfbf97 1004->1009 1012 1bfbebe-1bfbec4 1005->1012 1013 1bfbf25-1bfbf2b 1005->1013 1022 1bfc3ac-1bfc3e9 1006->1022 1023 1bfc2d5-1bfc2ff 1006->1023 1007->1006 1014 1bfc26e-1bfc287 1007->1014 1008->1000 1019 1bfbfe8-1bfc012 1008->1019 1015 1bfbf9b-1bfbfa7 1009->1015 1016 1bfbf99 1009->1016 1044 1bfc39d-1bfc3a4 1010->1044 1017 1bfc12d-1bfc133 1011->1017 1018 1bfc187-1bfc18a 1011->1018 1020 1bfbec8-1bfbed4 1012->1020 1021 1bfbec6 1012->1021 1024 1bfbf2f-1bfbf3b 1013->1024 1025 1bfbf2d 1013->1025 1047 1bfc28b-1bfc297 1014->1047 1048 1bfc289 1014->1048 1027 1bfbfa9-1bfbfda 1015->1027 1016->1027 1030 1bfc137-1bfc143 1017->1030 1031 1bfc135 1017->1031 1018->1003 1026 1bfc190-1bfc1ba 1018->1026 1090 1bfc027-1bfc02d 1019->1090 1091 1bfc014-1bfc021 1019->1091 1032 1bfbed6-1bfbee1 1020->1032 1021->1032 1082 1bfc3f0-1bfc3fc call 1bf8500 1022->1082 1083 1bfc3eb call 1bf8500 1022->1083 1092 1bfc301-1bfc30e 1023->1092 1093 1bfc310-1bfc357 1023->1093 1028 1bfbf3d-1bfbf48 1024->1028 1025->1028 1094 1bfc1bc-1bfc1c9 1026->1094 1095 1bfc1cb-1bfc212 1026->1095 1027->1044 1042 1bfbf4c-1bfbf58 1028->1042 1043 1bfbf4a 1028->1043 1045 1bfc145-1bfc182 1030->1045 1031->1045 1035 1bfbee5-1bfbef1 1032->1035 1036 1bfbee3 1032->1036 1049 1bfbef3-1bfbefe 1035->1049 1036->1049 1051 1bfbf5a-1bfbf65 1042->1051 1043->1051 1045->1044 1053 1bfc299-1bfc2a4 1047->1053 1048->1053 1055 1bfbf0a 1049->1055 1056 1bfbf00-1bfbf02 1049->1056 1061 1bfbf67-1bfbf69 1051->1061 1062 1bfbf71 1051->1062 1066 1bfc2a8-1bfc2ba 1053->1066 1067 1bfc2a6 1053->1067 1071 1bfbf0c-1bfbf20 1055->1071 1068 1bfbf08 1056->1068 1069 1bfc3a7 1056->1069 1061->1069 1072 1bfbf6f 1061->1072 1073 1bfbf73-1bfbf87 1062->1073 1074 1bfc2bc-1bfc2c6 1066->1074 1067->1074 1068->1071 1069->1022 1071->1044 1072->1073 1073->1044 1074->1044 1098 1bfc404-1bfc410 call 1bf7e90 1082->1098 1083->1082 1096 1bfc02f 1090->1096 1097 1bfc031-1bfc03d 1090->1097 1091->1090 1106 1bfc0b2-1bfc0f6 1091->1106 1092->1093 1108 1bfc359-1bfc395 1092->1108 1093->1044 1094->1095 1109 1bfc217-1bfc25b 1094->1109 1095->1044 1100 1bfc03f-1bfc0ad 1096->1100 1097->1100 1100->1044 1106->1044 1108->1044 1109->1044
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ffe4aea47609b6f99a5f9594242e882e13d188d92d3daf80ff45d28860f11aa
                            • Instruction ID: 1eff946ef33705b5abc24496b601e65ea79b0379b1c7e5c7ac29ac14e97f4eef
                            • Opcode Fuzzy Hash: 8ffe4aea47609b6f99a5f9594242e882e13d188d92d3daf80ff45d28860f11aa
                            • Instruction Fuzzy Hash: F6F1BF75B002199FCB2C9B68C49497DBBE6FF89314B1484EED10ADB751CB34DC898BA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1250 1bf9cd0-1bf9cf5 1251 1bf9cf7-1bf9d03 1250->1251 1252 1bf9d05 1250->1252 1253 1bf9d07-1bf9d0c 1251->1253 1252->1253 1254 1bf9d0e-1bf9d25 1253->1254 1255 1bf9d28-1bf9d75 1253->1255 1254->1255 1262 1bf9d7b-1bf9d83 1255->1262 1263 1bf9e42-1bf9e57 1255->1263 1264 1bf9d85-1bf9da0 1262->1264 1265 1bf9da2-1bf9daf 1262->1265 1268 1bf9e59-1bf9e68 call 1bf8500 1263->1268 1269 1bf9e90-1bf9ea2 1263->1269 1271 1bf9db1-1bf9dcc 1264->1271 1265->1271 1268->1269 1275 1bf9e6a-1bf9e71 1268->1275 1277 1bf9ef8-1bf9efc 1269->1277 1278 1bf9ea4-1bf9ed4 1269->1278 1288 1bf9dce-1bf9dd9 1271->1288 1289 1bf9ddb-1bf9ddf 1271->1289 1275->1269 1279 1bf9e73-1bf9e8d call 1bf6298 1275->1279 1280 1bf9efe-1bf9f0f 1277->1280 1281 1bf9f2b-1bf9f43 1277->1281 1312 1bf9ffc-1bfa00f 1278->1312 1313 1bf9eda-1bf9ef3 1278->1313 1279->1269 1293 1bf9f1e-1bf9f28 1280->1293 1294 1bf9f11-1bf9f1c 1280->1294 1291 1bf9f9d-1bf9fb0 1281->1291 1292 1bf9f45-1bf9f4b 1281->1292 1288->1289 1295 1bf9df9-1bf9dff 1289->1295 1296 1bf9de1-1bf9df7 call 1bf6298 1289->1296 1303 1bfa016-1bfa01f 1291->1303 1297 1bf9f4d-1bf9f5d 1292->1297 1298 1bf9f65-1bf9f7a 1292->1298 1293->1281 1294->1293 1299 1bfa125-1bfa131 1295->1299 1300 1bf9e05-1bf9e20 call 1bf6298 1295->1300 1296->1295 1297->1298 1321 1bf9f5f-1bf9f63 1297->1321 1367 1bf9f7d call 1bfa701 1298->1367 1368 1bf9f7d call 1bfa710 1298->1368 1323 1bfa0c8-1bfa0d7 1299->1323 1324 1bfa133-1bfa139 1299->1324 1347 1bf9e26-1bf9e3c 1300->1347 1306 1bfa067-1bfa06b 1303->1306 1307 1bfa021 1303->1307 1318 1bfa06d-1bfa07e 1306->1318 1319 1bfa0c5 1306->1319 1311 1bfa024-1bfa039 1307->1311 1336 1bfa05e-1bfa065 1311->1336 1337 1bfa03b-1bfa041 1311->1337 1312->1303 1313->1303 1317 1bf9f83-1bf9f85 1317->1291 1325 1bf9f87-1bf9f95 call 1bf7868 1317->1325 1318->1319 1334 1bfa080-1bfa095 1318->1334 1319->1323 1321->1298 1328 1bf9fb2-1bf9fd5 1321->1328 1344 1bfa0fe-1bfa111 1323->1344 1345 1bfa0d9-1bfa0e8 1323->1345 1331 1bfa13b 1324->1331 1332 1bfa146 1324->1332 1338 1bf9f9a 1325->1338 1360 1bf9fd9-1bf9ffa 1328->1360 1361 1bf9fd7 1328->1361 1331->1332 1343 1bfa147 1332->1343 1341 1bfa097 1334->1341 1342 1bfa0a0-1bfa0a2 1334->1342 1336->1306 1336->1311 1337->1299 1346 1bfa047-1bfa055 call 1bf6298 1337->1346 1338->1291 1341->1342 1342->1319 1348 1bfa0a4-1bfa0bc call 1bf6298 1342->1348 1343->1343 1344->1324 1345->1344 1355 1bfa0ea-1bfa0ef call 1bf6298 1345->1355 1346->1336 1347->1262 1347->1263 1348->1319 1363 1bfa0f4-1bfa0f9 call 1bf7e90 1355->1363 1360->1303 1361->1360 1363->1344 1367->1317 1368->1317
                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 94106d58a214c8764355f056951041e90856191b5740dd92e5a526f976408f75
                            • Instruction ID: c9a0cfb1770ab9e5e87291845a09c2a956f7f4bd782e8852e3657433795403d4
                            • Opcode Fuzzy Hash: 94106d58a214c8764355f056951041e90856191b5740dd92e5a526f976408f75
                            • Instruction Fuzzy Hash: 38E13C74A001199FDB18DFA9D894AADBBF6FF48304F158099EA05AB364DB31EC49CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.461085717.0000000003380000.00000040.00000800.00020000.00000000.sdmp, Offset: 03380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3380000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d7549b2eaae84d5a4999a80e868acab557d53bedb2dc27fa60d23919081802f
                            • Instruction ID: 50e13ecd7c11e22cb6b52ff8dba38001d4a13c825c3a5bcb2c5131d5ffe871fa
                            • Opcode Fuzzy Hash: 1d7549b2eaae84d5a4999a80e868acab557d53bedb2dc27fa60d23919081802f
                            • Instruction Fuzzy Hash: 71B1C635F043549FCB24EF68C89049DB7F6BF85340B28446ED456AB741CB31AC8ACB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c730b56ef431d930d6c6f4f8136f796b65fbf2b8b7b268a6c289d09d9f469cb9
                            • Instruction ID: 5cdc73a1a1181ba861225d5e4ca1d14d5c3159467dcc23b2e0ab029a69987446
                            • Opcode Fuzzy Hash: c730b56ef431d930d6c6f4f8136f796b65fbf2b8b7b268a6c289d09d9f469cb9
                            • Instruction Fuzzy Hash: 65A190357042028FCB5D9BBCC85462A7BE6AFC6214B1985EDD609CB3A5DF31DC0AC791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5951b6418c2a29c7206be1129d209e34c8225914be3d8d0610117d34482a186
                            • Instruction ID: 23caea79f3d541fc5335fcabbd6859c1dae89fda99d85f064aab655eba9ac0a5
                            • Opcode Fuzzy Hash: b5951b6418c2a29c7206be1129d209e34c8225914be3d8d0610117d34482a186
                            • Instruction Fuzzy Hash: 5AA1AF71B002059FCB15EF68C850AAEBBB6EF89310B14856EE519DB761DB34EC09CB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5dd1614dc3c7195d987a3dc5e3fcb9919c08031b0741eb91473c20ad6b4bf31c
                            • Instruction ID: bbfcbf036f1f777a3547cf6b553b27ed96891c9a270a132a1042593d00d52da9
                            • Opcode Fuzzy Hash: 5dd1614dc3c7195d987a3dc5e3fcb9919c08031b0741eb91473c20ad6b4bf31c
                            • Instruction Fuzzy Hash: 3BB11675A00605CFCB18CFADD58499AFBF2FF88314B248A99E519DB762D730E845CB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20439396019a597cbd7c755432b11da111ea30f7f20e0b8403f7b1d1520be6d2
                            • Instruction ID: 1db54226cf5c0837aa6e0ae0be9c57382ff5cdf5ca91142f5742cd0f82b20499
                            • Opcode Fuzzy Hash: 20439396019a597cbd7c755432b11da111ea30f7f20e0b8403f7b1d1520be6d2
                            • Instruction Fuzzy Hash: 0CB1A374A002098FDB15DFA8C454BAEBBF2FF48304F248199D605AB3A5CB74DC89CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a677b16b43d09032f48cba7be6d87d9cb8f1e867eae6d87ceb7b9742a83bf05b
                            • Instruction ID: 14ac9c2293aaaa6af6c2928d369f2ff0e383fea2eae30c05a7872f768f6324ef
                            • Opcode Fuzzy Hash: a677b16b43d09032f48cba7be6d87d9cb8f1e867eae6d87ceb7b9742a83bf05b
                            • Instruction Fuzzy Hash: C1A15035A002199FCB15DFA8D884E9DBBF6FF48204F1581A9E515AB361DB31EC4ACB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.461085717.0000000003380000.00000040.00000800.00020000.00000000.sdmp, Offset: 03380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3380000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ce54a763d5f7f2dcb16cf093e062ffc8e7091a1182e9ee71eb2558cd7b5f01f
                            • Instruction ID: 12bceed1f8ff6c820acbe3b7bb8c34b82987be94718b62209129d85fdc4a7382
                            • Opcode Fuzzy Hash: 8ce54a763d5f7f2dcb16cf093e062ffc8e7091a1182e9ee71eb2558cd7b5f01f
                            • Instruction Fuzzy Hash: 7C919D71E003549FCB24EFA4C9805DDBBF2BF45300F28885EE455AB692CB35AC8ACB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4065d4637fefe13545c7e2d75936a4ae529cccf78e09d7aa48e3bd4bb6ab405a
                            • Instruction ID: 619ab618696cbaf33609c8d7877d4617e8fcb2e065c65e7e2310cadc3920edc5
                            • Opcode Fuzzy Hash: 4065d4637fefe13545c7e2d75936a4ae529cccf78e09d7aa48e3bd4bb6ab405a
                            • Instruction Fuzzy Hash: 4E710032B002158FCB29DBB8D8906AFBBB6FB85214F0045BDD2059B391DB349D4ACB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 271bb4b5127a0479f36abeb8317d66e375771496bbe7897b79cf192ff566ba73
                            • Instruction ID: cda5afa8498f7b02ecda7175e5046815f71c1f9f891316b729562a8d890e13f2
                            • Opcode Fuzzy Hash: 271bb4b5127a0479f36abeb8317d66e375771496bbe7897b79cf192ff566ba73
                            • Instruction Fuzzy Hash: FC81AB31A040299FCF18AB64D90D26C77E2FB99344F0546ECCA06BB394EF759C49C7A5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ca46daf4b898dc7c5cd7dde5e1357b27649ff28eb400daf98ab32b2bc90b4559
                            • Instruction ID: 8c8aa3952a43bf1f261202a6e299e9e43618ecff6db9b90f1ee534c88dec60f8
                            • Opcode Fuzzy Hash: ca46daf4b898dc7c5cd7dde5e1357b27649ff28eb400daf98ab32b2bc90b4559
                            • Instruction Fuzzy Hash: 1B81C171E002199FCB15DFA8D9849AEFBB6FF88310F1481A9EA16A7341C771EC45CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2d5a39ebe6f183955103b5d4a3b8fdc9a6009cc28ecb4f1379f249e1edff4bb2
                            • Instruction ID: fe8fa9924f11b0dd03b4786d76371b544d7706be1ad0ec3d6d930bc7738247e5
                            • Opcode Fuzzy Hash: 2d5a39ebe6f183955103b5d4a3b8fdc9a6009cc28ecb4f1379f249e1edff4bb2
                            • Instruction Fuzzy Hash: 00615E367042148FCB1DDB6DC8A8929B7E6FF8961471544EEE60ACB362CB31EC49CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5a1d3f3d6bd23b79080d5e411d5cd21a4554303a8465cb462e9eaa871eb3e5b4
                            • Instruction ID: dde9d233ac6d16bf524d00735ad83d27c309b2c1f2c47888b713f61b4bf15e60
                            • Opcode Fuzzy Hash: 5a1d3f3d6bd23b79080d5e411d5cd21a4554303a8465cb462e9eaa871eb3e5b4
                            • Instruction Fuzzy Hash: 04510134B00249DFCF09DF68C4546BFB7A6EB842A4F1485A9EA19CB341DB30DD498BD2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7974161bd030a84939b0af7fba2e7fd1e1336a8259e158383ad51ffbe7de758f
                            • Instruction ID: dd0f896129629ec2a4173fc1477ac0f94949246ac2956dd9a80574d9e1994cf1
                            • Opcode Fuzzy Hash: 7974161bd030a84939b0af7fba2e7fd1e1336a8259e158383ad51ffbe7de758f
                            • Instruction Fuzzy Hash: CE51A131A04645DFCB29DF6CC484AAFBBF6EF84254F04885DD6429B750CB31A94ACBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 04be70b6aee00fe6cd0c939cdcfd19f59ea6a891a03f6dcfc66fe2cc7a8e1f4a
                            • Instruction ID: 40f853e3754d02e63564fc34f0b5737dd416d2304764f2827daee1cb438da36a
                            • Opcode Fuzzy Hash: 04be70b6aee00fe6cd0c939cdcfd19f59ea6a891a03f6dcfc66fe2cc7a8e1f4a
                            • Instruction Fuzzy Hash: EF51B37060434A9FCF19DF68C8549AFBBF5EF45214B0984AEE958CB752E730E809CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: af3d2e8b3c489079798373c73e8770a53e1d1d8f23bc7fc31f38ebf3cfb13579
                            • Instruction ID: 50b0306f5ab992ed6546b268093bed1a5c6a2a69d975005355e826489236786e
                            • Opcode Fuzzy Hash: af3d2e8b3c489079798373c73e8770a53e1d1d8f23bc7fc31f38ebf3cfb13579
                            • Instruction Fuzzy Hash: A751D3317042158FCB2D9B3CC464629BBE6FF8A21471489EED14ACB791DF35DC4A8B92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8524839dc374c4b131139818cf96c59a9cd2ec837597a7f2c2d6608114d933aa
                            • Instruction ID: 3bb9a45bda545f6e392c7713fc8cd5cb5b111614c8316d1aa921f91bda7e7e00
                            • Opcode Fuzzy Hash: 8524839dc374c4b131139818cf96c59a9cd2ec837597a7f2c2d6608114d933aa
                            • Instruction Fuzzy Hash: 80510771B042558FCB09DB78C8908AEBBF2EF45614B0581EEE509DB363DB309C09CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ec814fa9f29b6276cbd8629da43baeee8195190dfe02866abbce77a60f12b91e
                            • Instruction ID: 829f1bf0fa431dd61fa78a9e4c9c0e709c8f219abbabd72e431030d525a08f4b
                            • Opcode Fuzzy Hash: ec814fa9f29b6276cbd8629da43baeee8195190dfe02866abbce77a60f12b91e
                            • Instruction Fuzzy Hash: 7541C3357042404FDB299B39D854B6A77BAEFCA610F1540BAD60ACB362DB34DC4AC7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.461085717.0000000003380000.00000040.00000800.00020000.00000000.sdmp, Offset: 03380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3380000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f0692cfe95ba5b266db93f51373c8e6022791e672ec8282ccdfdb7f634b35baf
                            • Instruction ID: 0de1c159b3e38a80ce644bc51c2e7ff23dd895e8b87a8242709a44887aeea5ac
                            • Opcode Fuzzy Hash: f0692cfe95ba5b266db93f51373c8e6022791e672ec8282ccdfdb7f634b35baf
                            • Instruction Fuzzy Hash: 86410B70E053448FDF25EB64C9506EDBBF7AF8A240F1884AAC046BB752DB355C86CB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eb5d26dbbd106d9473de523f3d93c573dfb737d014f114a3ff2092d0eed7ab00
                            • Instruction ID: 1005ce0a69563fa62e3425384004cc6d3319d434a0bffd2717f417ca18f47952
                            • Opcode Fuzzy Hash: eb5d26dbbd106d9473de523f3d93c573dfb737d014f114a3ff2092d0eed7ab00
                            • Instruction Fuzzy Hash: 7251C1719083848FCB19CF78C48069AFFF2EF8A304F2888ADD585DB612D731A949CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 960464e0fca1676b79a452650936ee742c325bc59ddbf849f60254a6498fd470
                            • Instruction ID: debdd49ef7fb5cc9defc583ae4309cfd17f347275b2d6146f8538fcf27fbd11c
                            • Opcode Fuzzy Hash: 960464e0fca1676b79a452650936ee742c325bc59ddbf849f60254a6498fd470
                            • Instruction Fuzzy Hash: 044117343082419FCB2D9B3CC9505AE7BE2EF8622470446EED54ACBB61DF218C4AC392
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 72fa67e5e56738917555391821e25a29c438f03d318bcf3b5d8e7b07ecc525db
                            • Instruction ID: edc07528c6ea2741d52c94507a9f459071532d183dfc6214ec39ccb6896b1632
                            • Opcode Fuzzy Hash: 72fa67e5e56738917555391821e25a29c438f03d318bcf3b5d8e7b07ecc525db
                            • Instruction Fuzzy Hash: 7641B674704626DBDB3D4E3C961022AFBA1DF40E81B14857E8A8A87744DB34CC8CCBE2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 54848b98b084a8e949e7e873e8a3a1cc9c67e6a97afb889ebf3c30dd94b192c1
                            • Instruction ID: fdbb235acf8d216b0e8109f7f02aa73e182ce969e2105a86a29b627ff89dc7a0
                            • Opcode Fuzzy Hash: 54848b98b084a8e949e7e873e8a3a1cc9c67e6a97afb889ebf3c30dd94b192c1
                            • Instruction Fuzzy Hash: 27512A74A002098FCB14DF69C984ADEBBF2FF88304F248599E505AB765DB71AD49CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d0fc565e0d88bd74af3cedb420fbbfe7a55c33914c7af9966bdd49cdae9b1e61
                            • Instruction ID: f85d4b32342a6e6fc5e8a16f6e5bb40b1c924b3d4c2376cd655f80d51aa38f1b
                            • Opcode Fuzzy Hash: d0fc565e0d88bd74af3cedb420fbbfe7a55c33914c7af9966bdd49cdae9b1e61
                            • Instruction Fuzzy Hash: 4A41A071E00209EFCB08CFB9D95169DB7F6EF89204F5484AED405EB741EB329D498B91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c08b319c57c3a1f1f6fdad80bf0098604081a6274b11812fed9b67f2de4fe5fe
                            • Instruction ID: ee6cf73eb1914062d7617453ce82ce6237d035f1e5f3b1578f1902a8994b49a1
                            • Opcode Fuzzy Hash: c08b319c57c3a1f1f6fdad80bf0098604081a6274b11812fed9b67f2de4fe5fe
                            • Instruction Fuzzy Hash: 7841AF70A042498FCB05DF64C85499DBBF2FF89200F1544E9E405AB7A2EB75AD49CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 42a2a4fe193ffb09b54e23cfeec6f98058a91eaaaf110f8fe4ead0e886f93ac2
                            • Instruction ID: 51d8c78163c29a1c35ab2f61021a483d3ed7d90624b36dd26c33565873141840
                            • Opcode Fuzzy Hash: 42a2a4fe193ffb09b54e23cfeec6f98058a91eaaaf110f8fe4ead0e886f93ac2
                            • Instruction Fuzzy Hash: 42315C363001215B8F1A7B3994506BFBB9BEFC295870445ADC60ADF741DF299C0D87EA
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 55fac5a7b46ca365ca8c60ebedf0854c22ab757617cee6d2085758fa91e89f57
                            • Instruction ID: 6cbf4ad7fc02fb9207a2bc29a9b4b619c62c53735bb4d2ee4f08d8a12aea8bf3
                            • Opcode Fuzzy Hash: 55fac5a7b46ca365ca8c60ebedf0854c22ab757617cee6d2085758fa91e89f57
                            • Instruction Fuzzy Hash: 6231E332A002589FCB15DFA4D8445AEBBF2FF89310F1480AAE905EB361D7358D55DBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3781c0169341eb9751ee9574b3b25cd74a21588dcaf87765bd0be6dbcb6c4cbc
                            • Instruction ID: 14bc0c3553930e4128faaf19415bcbc644a63e75abbe2822f3cbd9241ce66dd1
                            • Opcode Fuzzy Hash: 3781c0169341eb9751ee9574b3b25cd74a21588dcaf87765bd0be6dbcb6c4cbc
                            • Instruction Fuzzy Hash: 2C313A75B016089FDB18DF59D480AAE7BEAFB88304F108099E60ADB762D731DD058BA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 04ac33c825c44f868d39806e48cbe796fc94554c281d3340f1929048bd34d30b
                            • Instruction ID: d62123efc30ab6ce7684bc3946ee6d56008bcbb56292daaf2a4e09dc9c144b24
                            • Opcode Fuzzy Hash: 04ac33c825c44f868d39806e48cbe796fc94554c281d3340f1929048bd34d30b
                            • Instruction Fuzzy Hash: 0F3147327083914FCB1AABB888186597BFA8F92210B0940DFE101CF3A6CF75DC09C795
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d0f26207141acbba91c963ae31ece1038ecda306ebd9f7d754d0c7aa16552974
                            • Instruction ID: d5b91e0acbdf1e6fade5981bef2a2143853ff54e7d717809de5427398914e451
                            • Opcode Fuzzy Hash: d0f26207141acbba91c963ae31ece1038ecda306ebd9f7d754d0c7aa16552974
                            • Instruction Fuzzy Hash: C33159346002098FCB18EF69C944ADEBBF2BF88204F1085A8E505AB761DB71AD49CFD1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 34693154e53044cb16db512d14de40c9818e159e7a69eec3acf91215e92f55ec
                            • Instruction ID: 4881670e64053ddb735865ce96dbcb12cfbc7cca88e8962a94d893801f3cd5e7
                            • Opcode Fuzzy Hash: 34693154e53044cb16db512d14de40c9818e159e7a69eec3acf91215e92f55ec
                            • Instruction Fuzzy Hash: 562180767042148FDB28CB5DF184AA9B7E9EB94325F1480EAE20CCB652D732EC55CB94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9e6df57021d3f7364ad0e769835967ba3a671c4e9e5675439cbc408acc458e9d
                            • Instruction ID: 469d96e38a285e8597c515c5846304bc74c63da36b1af73515674cc4b4bc045e
                            • Opcode Fuzzy Hash: 9e6df57021d3f7364ad0e769835967ba3a671c4e9e5675439cbc408acc458e9d
                            • Instruction Fuzzy Hash: BD31AD71B042095BDB249A78DC95BAF7AB6AB88304F140039F442A7385DF799C85CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: da2eef19ad4a89605ed47a76a1158861ef4758b4c0e9440eb4514c0cf13803e1
                            • Instruction ID: 44cd8265712501fe2c6592fa37fd928a41166699d033c6bd24da62668f070c95
                            • Opcode Fuzzy Hash: da2eef19ad4a89605ed47a76a1158861ef4758b4c0e9440eb4514c0cf13803e1
                            • Instruction Fuzzy Hash: 49216A323042044FDB28AB788C50B6BB7EBAF89210F1481BED509DF792DE74DC0983A5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1e0474f9c0d976a7daedb9ce27ab6cdaae79396b91366d9d93735f3db25eabaa
                            • Instruction ID: 620d189f5982d2bee8c01754ab956901f160def725fb985a0da2331cd58ca44c
                            • Opcode Fuzzy Hash: 1e0474f9c0d976a7daedb9ce27ab6cdaae79396b91366d9d93735f3db25eabaa
                            • Instruction Fuzzy Hash: C4218F71B001095BDB24AB79DC94BAF7AB6AF88304F144439F442E7384DF398C85CB95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a2b12300b5dfb461507aa3902875c33af86ba6a41d9c2ea9b43a8ba22ac5862a
                            • Instruction ID: bce6439fa399c2ab4deb33d6b87dd17db724c8464b39c7798245887d4ffc8a7b
                            • Opcode Fuzzy Hash: a2b12300b5dfb461507aa3902875c33af86ba6a41d9c2ea9b43a8ba22ac5862a
                            • Instruction Fuzzy Hash: CE318674A00205CFDB18DF69C980AAFBBB2FF88314F1040ADDA15AB3A1D731AD45CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 92785f4d703a11d1e2466a5b4060c5bad0be2b5454d98f83d2db7ceb65bed551
                            • Instruction ID: 269e9c24e18807a5662b93ffe036c5ee9e16416642e455697cfebb7e213041cc
                            • Opcode Fuzzy Hash: 92785f4d703a11d1e2466a5b4060c5bad0be2b5454d98f83d2db7ceb65bed551
                            • Instruction Fuzzy Hash: FC21F375A046429FCB09DF39C814AAA7BF2BF55310B0449EDD0069BBA1CB75EC89CBD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fc0a70863784af268c7ed3d9e4967f62768020e786edacc7aaa5e14d18686f0
                            • Instruction ID: 9c5ac7d7bff26cca53ef0c7be4e27cd0719d1016ec6659c3c09e294d3fc9257d
                            • Opcode Fuzzy Hash: 2fc0a70863784af268c7ed3d9e4967f62768020e786edacc7aaa5e14d18686f0
                            • Instruction Fuzzy Hash: B3314F74B002098FDB18DF69C980AAEB7B6FF88714F1080ADD615AB361DB31AD45CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3031d345dd8e90fb1394cb7c261fda6d2b2ddf78922576d0e81cd17dbf4a205a
                            • Instruction ID: 4340da962dc055083b73f33653b0ea326f538651ad7fb2400c9c60e4142850fb
                            • Opcode Fuzzy Hash: 3031d345dd8e90fb1394cb7c261fda6d2b2ddf78922576d0e81cd17dbf4a205a
                            • Instruction Fuzzy Hash: A92174367007009FC725CE69D984B9BBBF6EFC4710F10896DF64A87A51D731A85A8B50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b4a7bfa7b94c8d638b1675aa1fe84c908d3b1202636116a988ca1a6f5bc93a9f
                            • Instruction ID: 9b57f853a25bbbb8d9458c18e871a8bb5c73f1f79d195c9e0e4696d668a2c895
                            • Opcode Fuzzy Hash: b4a7bfa7b94c8d638b1675aa1fe84c908d3b1202636116a988ca1a6f5bc93a9f
                            • Instruction Fuzzy Hash: 8F313875A002089FCB19DF68D480AAE7BFAFB89604F208199E5099B762D331D916CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 698d99e4241b1a7dadf5ec1720a30f5eed4083133d76afd77a8a323cc11ee0c3
                            • Instruction ID: d8c3ed598a01c386a8ccf15fdc5c4b0c64b210221b7ea73c8bc42a7233e4e22b
                            • Opcode Fuzzy Hash: 698d99e4241b1a7dadf5ec1720a30f5eed4083133d76afd77a8a323cc11ee0c3
                            • Instruction Fuzzy Hash: 5121A470B002149BDF18CAA9D490BEEBBFADB8C304F14406DE601B7361DB749D49CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fb71bf7ecdbf5e1d676bc7d23d21453efe0d94f1c1934026dd97af86fc3d90ba
                            • Instruction ID: 8bee7fe4e2e6921dfa234bc0f6a34ee4618ae6d76d8e772fcec43a16dd9698ae
                            • Opcode Fuzzy Hash: fb71bf7ecdbf5e1d676bc7d23d21453efe0d94f1c1934026dd97af86fc3d90ba
                            • Instruction Fuzzy Hash: 43215C74A002189FDB19CBA9C954BEEBBF9AB4C704F105069D601FB341DB7A9D48CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e523193de2ac481eb9161164466724a23e7b990fd0c188bd941f81229a26104a
                            • Instruction ID: 864a3abb9e078cf3ed59d98448f5aaa5ee7cc90ce3f7a0cea0d260ad23101650
                            • Opcode Fuzzy Hash: e523193de2ac481eb9161164466724a23e7b990fd0c188bd941f81229a26104a
                            • Instruction Fuzzy Hash: 0A218032740214CFDB149B28CD59BAA7BB9AB48704F1401A9F645EB3A5CB75CD80CB92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bfe82571a842a9bf435e0d7ceb361c6469a2c3c81a762345b8e8b6822d16b172
                            • Instruction ID: dd11d4b38c61322b758910a13b78edd0c2ff7f7f81c0bc25dd35ff17e0a4c254
                            • Opcode Fuzzy Hash: bfe82571a842a9bf435e0d7ceb361c6469a2c3c81a762345b8e8b6822d16b172
                            • Instruction Fuzzy Hash: 7B218732740214CFDB249B68CD58BAE3BBAAB48704F114069F506EB395CF75DD80CBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.461085717.0000000003380000.00000040.00000800.00020000.00000000.sdmp, Offset: 03380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3380000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b7d099a94d181191da537627ee99f3142226a03b0449451714f9945a261e403a
                            • Instruction ID: d07b7062437e9c7c54d8dd913c5f86f4716c82c8eb8a5d06e2bd2b0e937a5fbb
                            • Opcode Fuzzy Hash: b7d099a94d181191da537627ee99f3142226a03b0449451714f9945a261e403a
                            • Instruction Fuzzy Hash: 3C21F174E05349AFCF11EBA8C5905EEBBFAEF45200F14816ED405AB740DB359C46CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 46b577ce05fa4041de2632c7c17662baed3963cefd3174ff21e794790bed9bf4
                            • Instruction ID: 312fce87d142829d3961f9933ecfe3ff86670e7655ffa2292be022b758a72b25
                            • Opcode Fuzzy Hash: 46b577ce05fa4041de2632c7c17662baed3963cefd3174ff21e794790bed9bf4
                            • Instruction Fuzzy Hash: F8216D34A11109EFEF18DFA9E945AADBBB5FF88315F1040A9E501EB261CB34D948CF40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 85284f24fc5e849e7110eab14a070ec0da96239e1e944c91ed529d524f8773f0
                            • Instruction ID: 9fb38617c306b10b0707c56cd0947650bed8f8b13c4f17b3821d231e8f55480a
                            • Opcode Fuzzy Hash: 85284f24fc5e849e7110eab14a070ec0da96239e1e944c91ed529d524f8773f0
                            • Instruction Fuzzy Hash: FA1119363042149FD718DB2DD894B5ABBE9EB89721F1581A9E609CF362C771EC44CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bc7ae0586b8b0eef17d9673a21a513cb8e56c572d3f6484acff7415e21597a44
                            • Instruction ID: 82701eff1b79223ef31a26aa1bf0aea092315042a7ba4e28b35d7a0a694813a2
                            • Opcode Fuzzy Hash: bc7ae0586b8b0eef17d9673a21a513cb8e56c572d3f6484acff7415e21597a44
                            • Instruction Fuzzy Hash: AE11BE313002115FC718EB69D85466ABBEAFFC9250B0409ADD15ACB7A1DB71EC0987A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e7399c62a44459c2cddf989007f6e45440550ada3f7d7a0be59ce6a9d9da2b5
                            • Instruction ID: 2624e3f4c8bb16859355bc95a3574d6eadcfe5f5cd7a112d6403d81e0c37913c
                            • Opcode Fuzzy Hash: 0e7399c62a44459c2cddf989007f6e45440550ada3f7d7a0be59ce6a9d9da2b5
                            • Instruction Fuzzy Hash: C6117075B00255AFDF109F79CC51BDABBF5EF49710F1040AAE604EB291EB719912CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d1087b1597367d835a99979b02908df6df5fa9ccf65f1ec5af9f6216cf4e37d
                            • Instruction ID: 6bd39794fdc500391050e82f758ff85c4ec7d79cfab44c6176b562251ce07392
                            • Opcode Fuzzy Hash: 1d1087b1597367d835a99979b02908df6df5fa9ccf65f1ec5af9f6216cf4e37d
                            • Instruction Fuzzy Hash: BA218C71A006488FD718CB69C9447AAFBE2EF88304F548598DA86D7662DB30BC49CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 78f4a2c508818d27b662afaaf71d567048dbd84fc7717473f1c8bd206c2ef1cc
                            • Instruction ID: 5b75c89401792d254eab9b856a35c565d04b2614a70bda091214bf659e06e4b6
                            • Opcode Fuzzy Hash: 78f4a2c508818d27b662afaaf71d567048dbd84fc7717473f1c8bd206c2ef1cc
                            • Instruction Fuzzy Hash: A7119A72A002298FDF00DB68DA407EE77FAEB48B14F014069D505ABB95DB386D488FD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3db08dd57ec40dd4f1c3121917d40e235608d28b3784d2d0cf381ff820a30e3a
                            • Instruction ID: 1cec4f5271cf0a9ea5179088534db1336526310f8c3feddda1224f502eacf9e3
                            • Opcode Fuzzy Hash: 3db08dd57ec40dd4f1c3121917d40e235608d28b3784d2d0cf381ff820a30e3a
                            • Instruction Fuzzy Hash: 1E11C1763006004FC714DF39D890AAA77ABEFC5764724CA6CD0698B795EF71DC468680
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90d872253150f14237edc5809297a36f219fbaf6cba7bdc534a46e9af2739d2b
                            • Instruction ID: e7b357dce78c6a544c1cf0645f33409e67c5627d7bfb83324641cb9083aa8263
                            • Opcode Fuzzy Hash: 90d872253150f14237edc5809297a36f219fbaf6cba7bdc534a46e9af2739d2b
                            • Instruction Fuzzy Hash: 16212970A00209DFDF04CFA4D994BAEBBB2EF48304F114459E501BB261CB759E48CF80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.461085717.0000000003380000.00000040.00000800.00020000.00000000.sdmp, Offset: 03380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3380000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6a4989b5145089528ff8dac06ef6aa4522e137582e781705fda642273a623d5d
                            • Instruction ID: ae320a5f8ede7dd96f91597e56bd14fc17cee6cf66e9b3d8c582f23166a0b1b3
                            • Opcode Fuzzy Hash: 6a4989b5145089528ff8dac06ef6aa4522e137582e781705fda642273a623d5d
                            • Instruction Fuzzy Hash: 4B11E778E00359AFCF25EBA8C5906ADFBF6BF84204F14845ED816AB340CB325C06CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a7216b16023e5237c368ae0fd525cf6a64a2c74e4f846cbb3b5ed4c91266ca4c
                            • Instruction ID: ea206e5dd846f1b001064441772834b28565a15df2abc6a08a3a1855203e9e05
                            • Opcode Fuzzy Hash: a7216b16023e5237c368ae0fd525cf6a64a2c74e4f846cbb3b5ed4c91266ca4c
                            • Instruction Fuzzy Hash: 0101B1313052429FDF0D9BA98814A2677E6ABC5320F1885FEC2098F395EF71DC4AC781
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1e17ad6ebdc280d948e5316141e220f16ebc4b07dabfcae4b51607d9645c0a0b
                            • Instruction ID: 71b8eecc58f88beab7ff5d6ead20cb949ede963cf1fcb08dad61438ab640205d
                            • Opcode Fuzzy Hash: 1e17ad6ebdc280d948e5316141e220f16ebc4b07dabfcae4b51607d9645c0a0b
                            • Instruction Fuzzy Hash: 9511C0753002089FD7509F68D894AAB3BEAFF8A315F0041E8E1058F7A5DB31AC45CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e119c9e111d734c2697b6f58acb7731d5bb697683f30f00132ca3caad229f15c
                            • Instruction ID: d5b700721c97c8d522d61b5e216c51f7a466c9615987cc3139c25b933c505335
                            • Opcode Fuzzy Hash: e119c9e111d734c2697b6f58acb7731d5bb697683f30f00132ca3caad229f15c
                            • Instruction Fuzzy Hash: 91111C35F002049BDB249B74EC98BAE7BB6AF84305F144828F002E7399DF359981CF40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 54f5591cf98169e6a79dbde5e5ee9c1652dee52f956c1b941e9d9ef49d80fc28
                            • Instruction ID: 33a4fbbd831edc9e1ab80f8e9d9488738e9423fb8f883589f342d5c00e64739a
                            • Opcode Fuzzy Hash: 54f5591cf98169e6a79dbde5e5ee9c1652dee52f956c1b941e9d9ef49d80fc28
                            • Instruction Fuzzy Hash: 25016D716003049FC738EF66D884A5AB7FAFB84614B000A6CE14687B61DB70B849C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.461085717.0000000003380000.00000040.00000800.00020000.00000000.sdmp, Offset: 03380000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3380000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c05d273a2a6cdfde87cada1573d58dd745d79f8c01cb58085914db00894f30bf
                            • Instruction ID: 1f28151d812f0129f0df22eb76bf31ff970e36197c8a09e04aecc815771a4f20
                            • Opcode Fuzzy Hash: c05d273a2a6cdfde87cada1573d58dd745d79f8c01cb58085914db00894f30bf
                            • Instruction Fuzzy Hash: 3F11A131E04309CFDB24DF94C9806EDBBF2BF89300F1980AAD002BB661DB755986DB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 39a63c73e964e7561262043272ea3918ff573b16e290e572b6ad5027b4e5b68c
                            • Instruction ID: 4c2c52c34c93241a847a228e54479b470446275797613273b492dac339eb1eb2
                            • Opcode Fuzzy Hash: 39a63c73e964e7561262043272ea3918ff573b16e290e572b6ad5027b4e5b68c
                            • Instruction Fuzzy Hash: 90019E313013414FCB256F25E8884BEBBF6FBC5225304496CD04ACB7A5EB64AC4A8B91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fcc32a95f4cc49bba24819c9344f014fade8480fa6bcc2f89bab5c0efb3f3e29
                            • Instruction ID: a644e66ea667030472cdf98a87ccd5475239ea1118b79227c6c931709c0dfc46
                            • Opcode Fuzzy Hash: fcc32a95f4cc49bba24819c9344f014fade8480fa6bcc2f89bab5c0efb3f3e29
                            • Instruction Fuzzy Hash: AE018035A001098FCB54EFB8D8607EA77A6FF49204F1441E9D609DB391DB355E548BD2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4f9e6248cdd8fd5dbd23fd5ea74b51f8d3bed4b1dbecf88cc1f18495906c08c7
                            • Instruction ID: b27390f2576e286b9ebe29a2febb7084c333470c6f50cada78c88d1842564549
                            • Opcode Fuzzy Hash: 4f9e6248cdd8fd5dbd23fd5ea74b51f8d3bed4b1dbecf88cc1f18495906c08c7
                            • Instruction Fuzzy Hash: A1019E31A003149FC751DBB8C8109ABBBF9FF89311B1448AEE585C7340DB35E902CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bfb47a1e8d5ada93398931b7852a36642c1e360cb7866e6bf6b8af245bfb71a6
                            • Instruction ID: bc1f834f0eb7b5cf12462173cc5fb7f61a57fd6d1df1dc5de67c775610b084f7
                            • Opcode Fuzzy Hash: bfb47a1e8d5ada93398931b7852a36642c1e360cb7866e6bf6b8af245bfb71a6
                            • Instruction Fuzzy Hash: 3C01D631B041558FDF1EEB78985096E7FE9EF8A25070404EED215CB2A5DB349C49CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 73b9b9ed39a0f3152cbee099e1e57b8f763a5004eb12a3a6a01d36b12f5f4b51
                            • Instruction ID: 0bbc8bd2c3e98cda29293323999db67680d218df75df1b707e4424d82a0d18ac
                            • Opcode Fuzzy Hash: 73b9b9ed39a0f3152cbee099e1e57b8f763a5004eb12a3a6a01d36b12f5f4b51
                            • Instruction Fuzzy Hash: ECF08B323453501BDB2522385C90B5B6AAB5BCA710F1542BEE244EF7D9CC646C0A03DA
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8eb656f90553d4d8cc8108414dc4194642ad2898e0fe8f3d5e98561711c443a1
                            • Instruction ID: 659ac6f6ca2905c1faa493290dd6b6526486fb02cbeaa06d01fb333825ad7363
                            • Opcode Fuzzy Hash: 8eb656f90553d4d8cc8108414dc4194642ad2898e0fe8f3d5e98561711c443a1
                            • Instruction Fuzzy Hash: C50112353045058F8B59DB6DC494919BBE6EFCA62535980FDE609CB362DB31DC098741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cfe35a85c0a0eef56b095df3829e2c481111ad75f8457974c96e546ba5545bf2
                            • Instruction ID: 6980eeead78827a585ac0d02b5d73bf2693771ad0a710c3d557a4d32e1daabf0
                            • Opcode Fuzzy Hash: cfe35a85c0a0eef56b095df3829e2c481111ad75f8457974c96e546ba5545bf2
                            • Instruction Fuzzy Hash: 11F0AF35B001158F8F2DAA78981086E7BEAEFC965070000BED619CB354EF35AC4A8791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4ff6b52275d735b1d95c80d0e7fff9deb8705eda3974657e4f16e1b484bfef88
                            • Instruction ID: 77f2cb3996cf356972b3637ad14e7c1f3a3ca61d64de4ab25044f9dc338ce4c2
                            • Opcode Fuzzy Hash: 4ff6b52275d735b1d95c80d0e7fff9deb8705eda3974657e4f16e1b484bfef88
                            • Instruction Fuzzy Hash: D2117CB2A012688FDF11DB54CA047EE7BF6AB48714F054599D401BBB91CB792E488B90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa35ac11038b4d00de3fdf2812175f341f1589e15d7ef62c604d9931822b555a
                            • Instruction ID: 0483f77743b6a8c6c8bc881dfe989b83a8a27c1485d10409d6ea22c12a002c28
                            • Opcode Fuzzy Hash: aa35ac11038b4d00de3fdf2812175f341f1589e15d7ef62c604d9931822b555a
                            • Instruction Fuzzy Hash: 4E012B322013004BCB64EF69EC445DEB796EFC5324B444D3EE1018BBA5EB611C4E87E5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a340fa45a8418bb2b44810be00a419a088c14f480e09fab8ef580a046a80fec7
                            • Instruction ID: e11e4a50382d3d345c15156335862f655d86d67941fd71ea4896d4fdbe48a305
                            • Opcode Fuzzy Hash: a340fa45a8418bb2b44810be00a419a088c14f480e09fab8ef580a046a80fec7
                            • Instruction Fuzzy Hash: 80F049357005018F8B9DDA2EC49492AB7E6EFCA62535980FDE609CB721DF31DC0A8780
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5c27c1a54976cc1362f7b59d78f3a7699ed37542054a48674d4e012fa6bdcb61
                            • Instruction ID: e06dc92c3251afe27d098ba0152167a5d5354182d6d7376f3ca340ae6162764f
                            • Opcode Fuzzy Hash: 5c27c1a54976cc1362f7b59d78f3a7699ed37542054a48674d4e012fa6bdcb61
                            • Instruction Fuzzy Hash: 09F090327052214BC729566D989467ABAC9EBC966071581BEDA0EC7345EB61CC09C3D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5f9114264fbd958ceb3ac95bdee07c657bbd930a2bd590b0a51a06b63bfefc64
                            • Instruction ID: fa989a53b7101422810813af112ce3dbbe88210fb81976947e5d870d67a87baf
                            • Opcode Fuzzy Hash: 5f9114264fbd958ceb3ac95bdee07c657bbd930a2bd590b0a51a06b63bfefc64
                            • Instruction Fuzzy Hash: A8016931A002149FC794DBA8D8049ABB7F9FF89211B50486EE55AC3340DB35F902CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c1f179baf10067a849990645087fc57c881e3073dc6c601d7a89684757ed0a0
                            • Instruction ID: cada0ca9b75fe9553801f8b0eeca7b1dd15a40bd667a11b34db023a868fc94a9
                            • Opcode Fuzzy Hash: 3c1f179baf10067a849990645087fc57c881e3073dc6c601d7a89684757ed0a0
                            • Instruction Fuzzy Hash: 99F0A03231021427EB24327A5C80BAFA19F9BD9A20F104239E709AB7D4DDA4AC0903D9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bd7a4e43fc0d6fbdf522f59a2ba64fdcdea6e91d6f8036e78aa161938847fdf1
                            • Instruction ID: 2115229e96b18327d54cca5a618aebd06280e2a7e0003643b4b1598a42d2d5b0
                            • Opcode Fuzzy Hash: bd7a4e43fc0d6fbdf522f59a2ba64fdcdea6e91d6f8036e78aa161938847fdf1
                            • Instruction Fuzzy Hash: F2F0C236600204DFCB258F64E9409AABBE7FF89310B54486EF90AC7361CB328C11DB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20a31b99710da93f14baf6528f9a44dd600f6dde463dfa64273739dddfb8c14e
                            • Instruction ID: d2629b77c8070f1db4941372708b54dcfda76626da010a47bbeded3f717cd073
                            • Opcode Fuzzy Hash: 20a31b99710da93f14baf6528f9a44dd600f6dde463dfa64273739dddfb8c14e
                            • Instruction Fuzzy Hash: 84F059313453816AFF3623358C00B5B3B629F86B10F0401EAE744EE5C5EBB4BA0D9395
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f7504509ef7346f63e26ca2aa4bc01c2bd0b5c602957a90781f6dc6555fc6ea2
                            • Instruction ID: 0dfa68634a4795aa5a6afe0e2aef98e21c3183f782a81e1cef8f71e82b68ad24
                            • Opcode Fuzzy Hash: f7504509ef7346f63e26ca2aa4bc01c2bd0b5c602957a90781f6dc6555fc6ea2
                            • Instruction Fuzzy Hash: 16F0EC1730D6922BCF0A57791C1056BBFEE4FDF51030440FAE248C724ADD248C0553A5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ab1f453ad30994f0cf7ab8044d72cf350307a5bcd8f4a4eeb02ab907bf956a6d
                            • Instruction ID: 7885eef03d7ece561c0f92f2c4d568d015e87c62a3638a2ea8f7f677ce867295
                            • Opcode Fuzzy Hash: ab1f453ad30994f0cf7ab8044d72cf350307a5bcd8f4a4eeb02ab907bf956a6d
                            • Instruction Fuzzy Hash: 05F0BB7B709105AFCB15CE58EC01DAA7BFEEBC9220704846BF949C7252D7319C22CB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eb5c16858a37a854b160d2d9e8bb7e5862ba14866496bb99bb0ad4972db30f39
                            • Instruction ID: ac13ff7705ebb8c3b3fdc65f6eef4f95cbd7eaf7b1af13eb0edff1be09226323
                            • Opcode Fuzzy Hash: eb5c16858a37a854b160d2d9e8bb7e5862ba14866496bb99bb0ad4972db30f39
                            • Instruction Fuzzy Hash: 59F069715047009FC378EE26D484D5ABBE6EB90215B004AADE1424BA32D3B1B889C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 534a75a4e3d7f76810d59a7780f9233c27ef93de56dbb8bfa60768973392cbed
                            • Instruction ID: cdacbcd486aac8f56039b2670a5abcf36cb7670cf8ad9b47d3966912a5aa8277
                            • Opcode Fuzzy Hash: 534a75a4e3d7f76810d59a7780f9233c27ef93de56dbb8bfa60768973392cbed
                            • Instruction Fuzzy Hash: 55F0F6353000004B8F1067A9AC2466E33DEFBCE25DB412069D706C7790CE215C8DCFE5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1a6e46fd364a848464decb1545a0a9e9126dcc5bea106ff2afaa09202b5b0ce6
                            • Instruction ID: 6d2820c00d2c5192eb9a19ded95c435bde5e4c3969d784ed49ca44f3b9999431
                            • Opcode Fuzzy Hash: 1a6e46fd364a848464decb1545a0a9e9126dcc5bea106ff2afaa09202b5b0ce6
                            • Instruction Fuzzy Hash: 9DF09636701104ABD715CE59D840F9ABBEDEBC4B25F14C01AF509CB755D631E902CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7f8a765ec85d79e720b29931b78b81ba8d84cdda036ea71360fd8bc0e7ff5851
                            • Instruction ID: 1f81dc92a5a5d941a261f0b1816f5911c77fa0857b221bcd6e249af875a9d12f
                            • Opcode Fuzzy Hash: 7f8a765ec85d79e720b29931b78b81ba8d84cdda036ea71360fd8bc0e7ff5851
                            • Instruction Fuzzy Hash: 5301AD755086A08FD739C72CD444B4BBFF6AF15314F04048ED5869B692C366A848C761
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9756e3b7992682cd9a294b1be73f3caa5f5f5aca529303eb0daada78a047cabd
                            • Instruction ID: e59f77ab0c7a0ba42396d830bc8e6873d4d38f8786de82be28a6dd6a1a1d54bd
                            • Opcode Fuzzy Hash: 9756e3b7992682cd9a294b1be73f3caa5f5f5aca529303eb0daada78a047cabd
                            • Instruction Fuzzy Hash: E9016930D042559FCB54DF68C4887AABBF0AF0A300B1501E9D65ADB256E7318985CBC0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 65105fae43cf69d863fd749c57944bc56760e131d8ac2813e80451713d0ce1e4
                            • Instruction ID: 0658c7da05654101966e45c4564b9491da56e6ca9d5ec682da019d43f22cfeab
                            • Opcode Fuzzy Hash: 65105fae43cf69d863fd749c57944bc56760e131d8ac2813e80451713d0ce1e4
                            • Instruction Fuzzy Hash: 25F0EC223046912BCF16127D1C745EB7FE98FDF610B0504FBE649C7646DD1C4C1682A5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 85ac03e536e55032cb1e187af5687c916ca50a6e655839ad9f2c116b33ccdd73
                            • Instruction ID: 9d8f2e403306d8db9840958cd9ff08aff88e11025c2cffdc83bec648b4127ee1
                            • Opcode Fuzzy Hash: 85ac03e536e55032cb1e187af5687c916ca50a6e655839ad9f2c116b33ccdd73
                            • Instruction Fuzzy Hash: C5F0E53A75030116FE39323ADC01B6F214B9BC5A50F10017AE709AE6C4DF74BA49839A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 73d3b1d88b51585fd1fb539d92126711d9576cb39764ba4539a5a5b02873f1c5
                            • Instruction ID: 5921484915f759e8447aaa588f9a6c3ae78c18b92b459f41335c4c2eada92475
                            • Opcode Fuzzy Hash: 73d3b1d88b51585fd1fb539d92126711d9576cb39764ba4539a5a5b02873f1c5
                            • Instruction Fuzzy Hash: F8F05E36200204EFCB259E65D84489BBBEBFF89350754846DFA0A87324CB32DC11DB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b910e91606b40f06262a5600e1a9ae4c4c011a9df859f7912e2f35d1a22e7796
                            • Instruction ID: 0ee6007187ac16bf75dd45eed12c9f43f413808245916ffa65135b160c79c25b
                            • Opcode Fuzzy Hash: b910e91606b40f06262a5600e1a9ae4c4c011a9df859f7912e2f35d1a22e7796
                            • Instruction Fuzzy Hash: F001AF75D00219EF8F44DF99D9448EEBBF1FF4C310B10816AEA19A7224D3319A60DFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 45c9663d3f8526f7a21caa95b4691d1e238a85e2f9d47aaf987af81e0e80ab97
                            • Instruction ID: 07bdec8fdced0972499bf43bac82f04ffda76036f63c41656a25e380eef81194
                            • Opcode Fuzzy Hash: 45c9663d3f8526f7a21caa95b4691d1e238a85e2f9d47aaf987af81e0e80ab97
                            • Instruction Fuzzy Hash: EDF020317083404FC7009B798C688867FAAEF862A638640FAE108CF3A3DE749C04C7A4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 889473dac8a8d84e118fba23ee4f9b316dde02e92f0b8784a227240f87f0fd9f
                            • Instruction ID: 244f7134c115a888b335a2bb9f2bcb937f85434b4eb968712d0fde28ea0cb735
                            • Opcode Fuzzy Hash: 889473dac8a8d84e118fba23ee4f9b316dde02e92f0b8784a227240f87f0fd9f
                            • Instruction Fuzzy Hash: 7CF0F930A041068BEB18DFB5E590BBE7BB2EB49344F24449DC605AB260DB759D48CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 889473dac8a8d84e118fba23ee4f9b316dde02e92f0b8784a227240f87f0fd9f
                            • Instruction ID: 244f7134c115a888b335a2bb9f2bcb937f85434b4eb968712d0fde28ea0cb735
                            • Opcode Fuzzy Hash: 889473dac8a8d84e118fba23ee4f9b316dde02e92f0b8784a227240f87f0fd9f
                            • Instruction Fuzzy Hash: 7CF0F930A041068BEB18DFB5E590BBE7BB2EB49344F24449DC605AB260DB759D48CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2cc32020ed9edd4c210171b274f036a055e02c3c605d1ce853cc956f3c757ed1
                            • Instruction ID: 7f5c5780d78fe6cc52b6775c5018d1bac1710d9dc6fb2c5ba55280c25195498e
                            • Opcode Fuzzy Hash: 2cc32020ed9edd4c210171b274f036a055e02c3c605d1ce853cc956f3c757ed1
                            • Instruction Fuzzy Hash: D9E092213083E22B8F0B2378282865B7FEE4DCB56030404EED145CF24ADE609C0783E5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b53adbdd8437eeecc2f917beab7fdbf619f0354837f26f4c7fd2e8f891b92d11
                            • Instruction ID: 95be5345943e20c0d2d0379358b525b0b7bf59990aa7ec2deef67d191a548ef2
                            • Opcode Fuzzy Hash: b53adbdd8437eeecc2f917beab7fdbf619f0354837f26f4c7fd2e8f891b92d11
                            • Instruction Fuzzy Hash: DCF055313443802BCB115A28EC41F9A7BB55FD7710F24806BF240DB2D1C6B068058398
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 27b13190790497dd9750d7b1bad1bc415f7db9c6665be94d7c4e2869c1601384
                            • Instruction ID: 47a189d5d8c57b6044c40c936eb9be55c9fefa5681812f2b7bcc15dc636ece5d
                            • Opcode Fuzzy Hash: 27b13190790497dd9750d7b1bad1bc415f7db9c6665be94d7c4e2869c1601384
                            • Instruction Fuzzy Hash: 71F0E53634434067E3216A31AC1DBAA7B9AFBC5703F044269F6459B2C4EEB578154FC0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d0fd1caed67358f40f9e3825d0e8a0039421eaeee1f0174c7b721026d4902447
                            • Instruction ID: 4befcd17fda4c92f183026e506e9c67a7a5d9510c4ff7c873e267e40b6854af1
                            • Opcode Fuzzy Hash: d0fd1caed67358f40f9e3825d0e8a0039421eaeee1f0174c7b721026d4902447
                            • Instruction Fuzzy Hash: E4E0C233301523278F1862AE6C149BFBADE8BD956171440BEF20DC3349EE28CD0A43E8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: feff13c698daa6d544f4ae37c78eeefbb744ae8a7f3731dceef69c4af584f5e1
                            • Instruction ID: 70ad6537b4f6adaef7a1dfe7ae8bcdb4cbf0b01f9bba6a6c16bbda51b503b104
                            • Opcode Fuzzy Hash: feff13c698daa6d544f4ae37c78eeefbb744ae8a7f3731dceef69c4af584f5e1
                            • Instruction Fuzzy Hash: 4BE0DF36B082104BC7059B2DAC4442ABBFFAFCE21130D41ABE909C7345CE60AC1397D2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2aa30a259f24f99baff3769174ca8f575120f1b0c667a4761263315a4c60e29a
                            • Instruction ID: 21b06a28649e840aff1d212a7d7e7c12e2cb9c763ad4890a673c4603dcc8572d
                            • Opcode Fuzzy Hash: 2aa30a259f24f99baff3769174ca8f575120f1b0c667a4761263315a4c60e29a
                            • Instruction Fuzzy Hash: 60E08623300512178B18616E5C1496FBADE8BD952171040BEE20DC7349DD288D0542E4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 99e4f76311f52328d2d4a0b2912bf957b3c08114019b28935302f388450c9d02
                            • Instruction ID: 6a50dedb3163c71105f09519ad51a3db410d3170c70bb10ba2ed5d5e45d33715
                            • Opcode Fuzzy Hash: 99e4f76311f52328d2d4a0b2912bf957b3c08114019b28935302f388450c9d02
                            • Instruction Fuzzy Hash: 2AE065303057929FC71E572858513A5BBB6EFC7255B1940FAD544CF246CB325816C781
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd464e02f374a9dd6f6eaf5fc7b80e4d52b7534b70a528e7d5b678be3b09fe51
                            • Instruction ID: c711dbe643deef92deaca904a3f2d53f5443cebd5f86e2af4bfed7c8c05f813b
                            • Opcode Fuzzy Hash: cd464e02f374a9dd6f6eaf5fc7b80e4d52b7534b70a528e7d5b678be3b09fe51
                            • Instruction Fuzzy Hash: DDE0DF323052524BCF1E663868544AF7BEA4AEAA0131400BFD105C7388DE648C0A83A4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90ef91e8945cba2b6dfc077e2684c26ceabca1e7e2c8fc1b040fe16aa1a1f56b
                            • Instruction ID: 8072ee44201e8c7fa5e4c6770fd87323abccebc59945c92c9b7240f18179a4c2
                            • Opcode Fuzzy Hash: 90ef91e8945cba2b6dfc077e2684c26ceabca1e7e2c8fc1b040fe16aa1a1f56b
                            • Instruction Fuzzy Hash: EBF0A030C043849FCB01DFB4CC4920DBFB4EF06301F5081DAC9049B241E6309A00CB82
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c703e45f3209193143ebe9d023e7889ca5f63b17d2a9f4ef6e4c668d627eac09
                            • Instruction ID: 0f256f9139bb73d289c5269a35723f7b4bf3b57a1353b073cc3fcbb16a908455
                            • Opcode Fuzzy Hash: c703e45f3209193143ebe9d023e7889ca5f63b17d2a9f4ef6e4c668d627eac09
                            • Instruction Fuzzy Hash: 31E026303002129B871D522C442037AB3CAEBC6566B0080FEE6058F300CF328C1787C1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dd9c3d3831f58efc7d91176c9dd5e17f6c0363386b769ad0e0c8351ba3a61af0
                            • Instruction ID: addcb0ddcceafe51f7712073e75434dc8257f534d0302db2a9fb9f15fa4b47dd
                            • Opcode Fuzzy Hash: dd9c3d3831f58efc7d91176c9dd5e17f6c0363386b769ad0e0c8351ba3a61af0
                            • Instruction Fuzzy Hash: 73E0C23235021433DB246519DC41F9B739A9BD8B20F20812BF708AF6D08AF0BC0943DC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b319dfffb495a1b9c05b9649d61eb6b9e13650e14c0b43c09a2a5aa977283150
                            • Instruction ID: c1651ba77bbfc68e9c7885d52b58b98198596b4a3b89087f543af4c5576d6569
                            • Opcode Fuzzy Hash: b319dfffb495a1b9c05b9649d61eb6b9e13650e14c0b43c09a2a5aa977283150
                            • Instruction Fuzzy Hash: 3CE0B66644D3C05EC70787758CA59913FB05D5721039E14CBC0C18F5A3E5585969D722
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 940ad0bff1b1cea85dd7caabbe154677f929d37e10d3d6fc990b836d2ba27f90
                            • Instruction ID: 1404cea6aa19a66ca2883305c55f91da28f461f2d9cb3e7344c110a62756ea50
                            • Opcode Fuzzy Hash: 940ad0bff1b1cea85dd7caabbe154677f929d37e10d3d6fc990b836d2ba27f90
                            • Instruction Fuzzy Hash: 71E06D31D08388AFCF02EFB4889975DBFB4EF06300F5041DAC944EB245E2318B189782
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3561e38b9fa76ca72a458121b1271adfc7776bc7a3ca03d4da874505819334b
                            • Instruction ID: cd97375bbee23dea0903be7c382a9789f649d96e6615d481642fd962cee002c2
                            • Opcode Fuzzy Hash: c3561e38b9fa76ca72a458121b1271adfc7776bc7a3ca03d4da874505819334b
                            • Instruction Fuzzy Hash: F6E09A7AB443806FCB128B28C811B847FB4AFA6312F0944E7D2008B2A2E6748C18C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2d4d94d55665d44a8cebb9ad9c3491a1695eea4ceddba79aa2ff3ab25da9b82e
                            • Instruction ID: c7826ac1041f890c62fad36bbc9890f2bebbfc5e25054adfc884cecf3a01d3d6
                            • Opcode Fuzzy Hash: 2d4d94d55665d44a8cebb9ad9c3491a1695eea4ceddba79aa2ff3ab25da9b82e
                            • Instruction Fuzzy Hash: 5AD05E32700222174E1D327D681881F72DE8AD992131004BEE209C7348EE65DC0B43E8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 056bf493716743b3c117fc448e71fdf391e2c0e763be94d062ca4d69308ea9fe
                            • Instruction ID: 4dd472a1b0860a54b6b6ac69a6948383902e988079cbf6d62e149fcf80864c72
                            • Opcode Fuzzy Hash: 056bf493716743b3c117fc448e71fdf391e2c0e763be94d062ca4d69308ea9fe
                            • Instruction Fuzzy Hash: 6AD05E32700222174E1D727D681841FB2DE8ED992132000BEE209C3348EE75DC0A43E8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2df15e31991d5a3ad4154324bc852bc6d6047f2d40d7c1a8368282dc9c64009e
                            • Instruction ID: 4bb5cdbea41c36717b8729e9082ae43f88ba89e2ec0231403bfd13512949bcab
                            • Opcode Fuzzy Hash: 2df15e31991d5a3ad4154324bc852bc6d6047f2d40d7c1a8368282dc9c64009e
                            • Instruction Fuzzy Hash: CED05E32700222174E1D327D681841F72DE8AD992131000BFE209C3348EE65DC0A43D8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ea3242055cfa5ba7cc52f32b12715fbae79538a9d585ebba6bbab111047ef4c6
                            • Instruction ID: a6e2b21e5579a0a67943e40c189bdb284ebade3f7a891d1b00a59c95f14cfcfd
                            • Opcode Fuzzy Hash: ea3242055cfa5ba7cc52f32b12715fbae79538a9d585ebba6bbab111047ef4c6
                            • Instruction Fuzzy Hash: 63D0A936B20124170B18222E7C0893F36CF9BCCA62329403BFA0EC3308CEA0AC0317E5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7c2098bab741b36f7f3d904eae9f7e9caf8e3388e58c76c105c31d822f603d19
                            • Instruction ID: a3ce1eff8b15c94b0683400066b57b40baa21a0156bc1844dbdaadc068f7e8c1
                            • Opcode Fuzzy Hash: 7c2098bab741b36f7f3d904eae9f7e9caf8e3388e58c76c105c31d822f603d19
                            • Instruction Fuzzy Hash: 6DD05E32700222574E1D327D681841F72DE8AD9A2131000BEE209C3348EE65DC0A43D8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 107c7c827b4f09bf93119292ce0dc209341c9b406e624464329c93650f88b18e
                            • Instruction ID: 0526cd90bbe9c4aeed2e6766bdb0d0736c9477d5faeb1b028a470a97a5dcf29f
                            • Opcode Fuzzy Hash: 107c7c827b4f09bf93119292ce0dc209341c9b406e624464329c93650f88b18e
                            • Instruction Fuzzy Hash: F1E0207250C3844FCF1ED72498A1BA43FB51F9720070900FED4418F2D6C6648C89C392
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 10e89bf6e1be39ede1ae428234ba9ac64857ce6a218d25a3a1f76abebab2c4b5
                            • Instruction ID: d2819133c3b93670ad483fa0f509cb2e1209d5ac96feeda70ba0d51a2ced7160
                            • Opcode Fuzzy Hash: 10e89bf6e1be39ede1ae428234ba9ac64857ce6a218d25a3a1f76abebab2c4b5
                            • Instruction Fuzzy Hash: 26D0126154D3C11FCF1756306C256D53E565F53315F4946DBD181DF1D3E9821C488BA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dd8e4888d3ff892d2ec98a24ac6c2eb849546b9323b8487ffcb5f569457c5cb8
                            • Instruction ID: c2b8a5788173f0428c49ec1d67eab5fe638a23679228019c1a17c73318b510d5
                            • Opcode Fuzzy Hash: dd8e4888d3ff892d2ec98a24ac6c2eb849546b9323b8487ffcb5f569457c5cb8
                            • Instruction Fuzzy Hash: 71E0B671D11308AFCB40EFB4D94965DBBB8EB09301FA041A9DA04A7244E6319B509B81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9dba2b72535c54f306ef498cf37471ef313af9ebf42136c03adf6cb54bcb69e9
                            • Instruction ID: a271cc8060c9c6b27024c218a1caf12918860f75c73593956c43ab7fcb9aa6b9
                            • Opcode Fuzzy Hash: 9dba2b72535c54f306ef498cf37471ef313af9ebf42136c03adf6cb54bcb69e9
                            • Instruction Fuzzy Hash: 02E0EC71D10309ABCF00EFF8D94966DBBB8EB05300FA041E9DA04A7244E6315B559B81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9adfae69c60656a44bb0fe8fe0cca4b089e247fd4a0a1a40525fcf794941eb3a
                            • Instruction ID: 757a683f344925a48caeea1f36439c2bdd946ae9f36dd11150fbc6f810974e21
                            • Opcode Fuzzy Hash: 9adfae69c60656a44bb0fe8fe0cca4b089e247fd4a0a1a40525fcf794941eb3a
                            • Instruction Fuzzy Hash: D3E012309102158FCF51EFBDDC8A1967FB0EE1A21574901E9ED44D7245E73641958FC2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 715d0fb2a6e705be892958000023e6b0d071d5b8404784386bfc0387c11d00ce
                            • Instruction ID: 529034cd1a2d52e5c6a64fe62803bbb7ac3d2742178680bcd0e6daee6ffd37fb
                            • Opcode Fuzzy Hash: 715d0fb2a6e705be892958000023e6b0d071d5b8404784386bfc0387c11d00ce
                            • Instruction Fuzzy Hash: 00D05E36F044118B4718CAA9A840198B3A1EB8826971081E6D90AD3704EF30DD5EC7C0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0fed7c370430d5c7aae9c7f9ce6d23743861a0337560beb4a152fb3ee8bb1f49
                            • Instruction ID: 2548f306630af25ce1c89be377d7b8dc88023846bbc5db023f3b74a0cc06499d
                            • Opcode Fuzzy Hash: 0fed7c370430d5c7aae9c7f9ce6d23743861a0337560beb4a152fb3ee8bb1f49
                            • Instruction Fuzzy Hash: 01D05B356506058FD768AA2CC4456387F66DF42225B5443FCEA1D8B5B2D312C8154740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9eaf789d6d66e80825ef621a8af733a352c084f0b48d222f62ed89ff6c596837
                            • Instruction ID: a5f27ebcdcba89d6b2c769e2dbeea0b983188cd1cd4b3f0ba188518ffcad8b08
                            • Opcode Fuzzy Hash: 9eaf789d6d66e80825ef621a8af733a352c084f0b48d222f62ed89ff6c596837
                            • Instruction Fuzzy Hash: 50D0C9352893C81EDB2222752C6E7943F588B53A15F8504C7F5488E6D7E9C624998251
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd43a63e5595b9e3a1fcd75d58e24d6cd1ade39b41cd36511ad16e594a6ef2de
                            • Instruction ID: e8a3a2f782cc09deda2dc6569a64bb36f528e702e25c787769642d01c220861c
                            • Opcode Fuzzy Hash: cd43a63e5595b9e3a1fcd75d58e24d6cd1ade39b41cd36511ad16e594a6ef2de
                            • Instruction Fuzzy Hash: D3D09E1120D3D12FCF572B38A8641A63F719F47A14B2915CDD0D14E1DBC615590A9396
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2118a52abeac1c27dc6acc284096bba164d4a8d1b06f17ab2cdc77da2fe33d39
                            • Instruction ID: d4faafc91ac356ee3c1f8ee31d65956b79256a6f340fb84dfb9a4ba49688f6a2
                            • Opcode Fuzzy Hash: 2118a52abeac1c27dc6acc284096bba164d4a8d1b06f17ab2cdc77da2fe33d39
                            • Instruction Fuzzy Hash: 1AD0C935A015248F8A1497A8D5545DCB3A49F44A187150095EA1BDBB61CB219D59C7C1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 95a76796f76e97a28b8a903d337fd98c228b1627379c974345bcf73b37f091b5
                            • Instruction ID: 54a19548a2b229c1079fecf828a32f4e9f784715381f4e6614fcb1de3acc3abf
                            • Opcode Fuzzy Hash: 95a76796f76e97a28b8a903d337fd98c228b1627379c974345bcf73b37f091b5
                            • Instruction Fuzzy Hash: 53D0A77354566847C70B451478441E17B95D796715B9E40DCD1041627DF73248878680
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e208d4848148ca000dbf3715019a7af01a313cce16f4d6bf218ff5a5af2a025f
                            • Instruction ID: 7b4e51b004466b59bf840ef577515341417ccec860dfe5c3a15b69e11c846dd7
                            • Opcode Fuzzy Hash: e208d4848148ca000dbf3715019a7af01a313cce16f4d6bf218ff5a5af2a025f
                            • Instruction Fuzzy Hash: 00D06739A010089BCB04DA84E5409DDF771EB84225F10815AD91567250CB329A1ACB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5ea51c8e3b8f14049a33285862ac6be28258f110175676316c216cf7da95863c
                            • Instruction ID: 78edba25a27e10b8be634d7ec81630cf921363c365273fcf3d9b128f108707b7
                            • Opcode Fuzzy Hash: 5ea51c8e3b8f14049a33285862ac6be28258f110175676316c216cf7da95863c
                            • Instruction Fuzzy Hash: 9AD0027140D3D19ECF679B304C641527F72AF47341349E5EAC0C14D157C9355457E762
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3ab9f9a82afbb91047b8864f72d2596d2162fbe93c434d879472f0e04aaf131c
                            • Instruction ID: c1cffbd8beb3db2e407ed89a16cce79ebf5c5f27af4962a1a127474fb3f2a0df
                            • Opcode Fuzzy Hash: 3ab9f9a82afbb91047b8864f72d2596d2162fbe93c434d879472f0e04aaf131c
                            • Instruction Fuzzy Hash: CDD0C935F0010A8B8F04DAD4E8504DCF336EBC4315B108166C619A7154CB302D2ACB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2aa192ad9ac1327f0ef1b8a88837d4cd4e22a609ac1ff486094fc74d49c68e2e
                            • Instruction ID: e55d3757f6430c727367bc7662bb492b27cf65e8964401499eb7496c0e9c198e
                            • Opcode Fuzzy Hash: 2aa192ad9ac1327f0ef1b8a88837d4cd4e22a609ac1ff486094fc74d49c68e2e
                            • Instruction Fuzzy Hash: 11C01230C042489F8750AFFC6D060297FF89604101B9005D9CE48C3245E63556154BD2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 00e88f8bec87b944f08afb5ae71328a5b5b4238791e4d880fae7fc8fae3b6e39
                            • Instruction ID: 09e0ef9db59de5d74e4f67727976a19e111730bb6f1099cf23cedd5489e912e7
                            • Opcode Fuzzy Hash: 00e88f8bec87b944f08afb5ae71328a5b5b4238791e4d880fae7fc8fae3b6e39
                            • Instruction Fuzzy Hash: 9FC04C0550D7E41DCB0327751C712E53F646C5731138E14C7C9D4CBA67C05508169793
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fa7b6dcc96c95fef57a36ec3ba69cf72946d1b4380b5c1114dd7787cbb3ddbbb
                            • Instruction ID: 999801ac5246374f2ca64bb7f2316c569096c8abd5f23b36415d1d9b65acafc0
                            • Opcode Fuzzy Hash: fa7b6dcc96c95fef57a36ec3ba69cf72946d1b4380b5c1114dd7787cbb3ddbbb
                            • Instruction Fuzzy Hash: 7EC09B251582CC4F460037B97D1C1AD724D7741708BC46811B50DD1F05EE5869944555
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f16654163917313c7655717b15e87f8ea86e4f429dcf27cc950e66d55c27ac05
                            • Instruction ID: 0cf27e01fcadba48fe8596cbad1d16c742c8dee4cf4ff0e0361d99979412ed67
                            • Opcode Fuzzy Hash: f16654163917313c7655717b15e87f8ea86e4f429dcf27cc950e66d55c27ac05
                            • Instruction Fuzzy Hash: C3D012751443046FD7029B80DE15F807F61E795700F418051E384890A2E3B79464DB12
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 08b0773b43f46b8eb61f2f1eb0044cd4818c4c28b753e3840a80240051472e7f
                            • Instruction ID: 77fcc0e9a37062c436663678a1ac69f24b02b472ff8e6aa55c905cc20fced399
                            • Opcode Fuzzy Hash: 08b0773b43f46b8eb61f2f1eb0044cd4818c4c28b753e3840a80240051472e7f
                            • Instruction Fuzzy Hash: EAC0123180D3D18FCB07CF394D04000BF217E4320530A95EBD8409F063C631A844CB01
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 27b6b5b213aa87f6545ce41e73e4c10834520bd49b737096edf7ab0dcadf2a04
                            • Instruction ID: 517b4c72c909f6aa5ca6fb88ae09aa4290291e361746aa25acd26a800b492456
                            • Opcode Fuzzy Hash: 27b6b5b213aa87f6545ce41e73e4c10834520bd49b737096edf7ab0dcadf2a04
                            • Instruction Fuzzy Hash: 7AC0122901E3D11FCF03873088A56007FA06D0B20434D42CAC0C0CE197C6985048CB02
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a5ccaf448ffd10d148d9741f90dab45492d39dfd5991b94cb0036cea10b9b49a
                            • Instruction ID: 6050a2c2ed180664bcff6b39be33ad50e22882234d420ac4aa398aeb79bcc295
                            • Opcode Fuzzy Hash: a5ccaf448ffd10d148d9741f90dab45492d39dfd5991b94cb0036cea10b9b49a
                            • Instruction Fuzzy Hash: 5BC02BB39C00048FCB0CDF04F4C50C0B360FD4123331000A6D005C7012C2258407CE50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 539f5d0ba065d4bad8a0252b8a5809626671a9b445408af74f77aa346f79bac7
                            • Instruction ID: 96ea267e90d71dec06d64416130e4845ab8a630e3cde1794f61e8a13c75b0f40
                            • Opcode Fuzzy Hash: 539f5d0ba065d4bad8a0252b8a5809626671a9b445408af74f77aa346f79bac7
                            • Instruction Fuzzy Hash: E8B09237A06108DA8F64DAA4F5410DCF737EE8022ABA000BAD2185204087365A65CA51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0fd9d6ff9af0c5f773bd564e6bed5677d675a28bc6c0bb852be22b8a2c55230e
                            • Instruction ID: b1f025d051e234faeae254730791193420dd9510ef992517ab3e0caddb82b356
                            • Opcode Fuzzy Hash: 0fd9d6ff9af0c5f773bd564e6bed5677d675a28bc6c0bb852be22b8a2c55230e
                            • Instruction Fuzzy Hash: 6BC08CF10643848FCB003FE0BA182943B12C75A315F06048AD8980EA56F37A0C9883C6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d849a5621410851dca0ad297e3034622856729842b6794a9d8627b0c6169b91a
                            • Instruction ID: 605be8d9d280fd23f4776059d628c74662a91b11b8ca167c159cb2d4cdcebcd7
                            • Opcode Fuzzy Hash: d849a5621410851dca0ad297e3034622856729842b6794a9d8627b0c6169b91a
                            • Instruction Fuzzy Hash: BDB09237E00009CB8B10EB84FC458DDF3B4FB94226B104067D211A30008A322A35CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4b78bc56a078d4c52079e1dfdd5c3cd89d2b36a0f31db0804710a5f4fa805797
                            • Instruction ID: a6483f60d71a9048f4df2a4e2d6bc241594dac295fec9d3f177419ac2a88b20a
                            • Opcode Fuzzy Hash: 4b78bc56a078d4c52079e1dfdd5c3cd89d2b36a0f31db0804710a5f4fa805797
                            • Instruction Fuzzy Hash: 5BB0127010034D4F86407BA1F949595336DDB846087804410E50C0ED166BB42C5887CC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8e5a04c6beb9a274c47d2c32fc46ce9ce7cce71bac66cc809ea02567d6b7d0ac
                            • Instruction ID: cc8badbaa7089a3e8a268d30c666326251a764108430a1ecb8162c66e3b7c404
                            • Opcode Fuzzy Hash: 8e5a04c6beb9a274c47d2c32fc46ce9ce7cce71bac66cc809ea02567d6b7d0ac
                            • Instruction Fuzzy Hash: 73C02B310083014BCB188F409A313D4F7307F00301F0402C0D9094B483FB3008ACC743
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f46d1b70d31052945ab6c4153cf631a1da7689b717c35da2e74a04964bfebfb3
                            • Instruction ID: ad1e3e102524af66842fac268bc3ef28089611d4855049f770acbeb13c4549f0
                            • Opcode Fuzzy Hash: f46d1b70d31052945ab6c4153cf631a1da7689b717c35da2e74a04964bfebfb3
                            • Instruction Fuzzy Hash: 5EA011300802088F8B202BA8BC0C08A3B2CAA00223BC02020B00E828088A2238B08F80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: #N>$#u>$+s>$3w>$;{>$S6>$Sa>$[T>$cu>$ke>$/>$|>
                            • API String ID: 0-279041377
                            • Opcode ID: 2549c6ad503de2b803dbb9b0dd0768f2d24a48a73b8545e71fb30aae20fe916b
                            • Instruction ID: 50ec75e008d44c26751d64285d7f14a8774a511cc6f01f9459478ce733440794
                            • Opcode Fuzzy Hash: 2549c6ad503de2b803dbb9b0dd0768f2d24a48a73b8545e71fb30aae20fe916b
                            • Instruction Fuzzy Hash: 2514E53191065A8FCF20EF64CC549E9B7B6FF99304F5182D6D609B7220EB706A99CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.460579990.0000000001810000.00000040.00000800.00020000.00000000.sdmp, Offset: 01810000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1810000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: 2 $&ltS$3/sF$R`-F$[sr$=4#
                            • API String ID: 0-3485701111
                            • Opcode ID: e80a34cf819f85d902604b5d1275eaba0f112ecf3907df1565ad2b67e2ce2ccd
                            • Instruction ID: 2519ad67d20e48eed3b105f82a1538c947b757bc127312f600a03b8fdcab1257
                            • Opcode Fuzzy Hash: e80a34cf819f85d902604b5d1275eaba0f112ecf3907df1565ad2b67e2ce2ccd
                            • Instruction Fuzzy Hash: 9243A271C217AB8ACB619F6488442C9F771BFA6304F6597D6D5483B101EBB02BDACF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 43d619abc1e3f5880f3d2b2055e28a51ab0260713570bee82693418fec181891
                            • Instruction ID: a098ec412fb7bd4d7a1305b7a62d6b34a8e53b92712930b8e08f811789ef9a3c
                            • Opcode Fuzzy Hash: 43d619abc1e3f5880f3d2b2055e28a51ab0260713570bee82693418fec181891
                            • Instruction Fuzzy Hash: C6B12971E001198FDB29CFA9C980AAEB7F2FF88310F698169E914E7315DB359C95CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.460863730.0000000001BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 01BF0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1bf0000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6008480bb7b6bc413413f8961b1ba8c06765c9e792686dad64d6faa1d323e33e
                            • Instruction ID: 32d06fab550457f8e7947d00c7f560fdafbc91c409417e25247480d53fd7eba1
                            • Opcode Fuzzy Hash: 6008480bb7b6bc413413f8961b1ba8c06765c9e792686dad64d6faa1d323e33e
                            • Instruction Fuzzy Hash: AD51C375E001299FDB14CFA9C98099EBBF2FB88310F29C669E914A7315D735AC52CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Execution Graph

                            Execution Coverage:11.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:44
                            Total number of Limit Nodes:0
                            execution_graph 34749 32ec488 34750 32ec49c 34749->34750 34751 32ec4a5 34750->34751 34753 32ec6ca 34750->34753 34760 32ec8ac 34753->34760 34764 32ec7b0 34753->34764 34768 32ec7a0 34753->34768 34772 32ec8c6 34753->34772 34776 32ec928 34753->34776 34761 32ec85f 34760->34761 34762 32ec8eb 34761->34762 34781 32ecba8 34761->34781 34765 32ec7f4 34764->34765 34766 32ec8eb 34765->34766 34767 32ecba8 2 API calls 34765->34767 34766->34766 34767->34766 34769 32ec7b0 34768->34769 34770 32ec8eb 34769->34770 34771 32ecba8 2 API calls 34769->34771 34771->34770 34773 32ec8d9 34772->34773 34774 32ec8eb 34772->34774 34775 32ecba8 2 API calls 34773->34775 34775->34774 34777 32ec92e 34776->34777 34794 32ece60 34777->34794 34798 32ece70 34777->34798 34778 32ec6d3 34778->34751 34782 32ecbc6 34781->34782 34786 32ecc08 34782->34786 34790 32ecbf9 34782->34790 34783 32ecbd6 34783->34762 34787 32ecc1c 34786->34787 34788 32ecc6c RtlEncodePointer 34787->34788 34789 32ecc95 34787->34789 34788->34789 34789->34783 34791 32ecc02 34790->34791 34792 32ecc6c RtlEncodePointer 34791->34792 34793 32ecc95 34791->34793 34792->34793 34793->34783 34795 32ece70 34794->34795 34802 32ecea8 34795->34802 34796 32ece8e 34796->34778 34799 32ece7e 34798->34799 34801 32ecea8 RtlEncodePointer 34799->34801 34800 32ece8e 34800->34778 34801->34800 34803 32ecef1 34802->34803 34804 32ecf17 RtlEncodePointer 34803->34804 34805 32ecf40 34803->34805 34804->34805 34805->34796

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 1621127-1621129 1 1621194-1621197 0->1 2 162112b-1621131 0->2 4 162119c-16211a3 1->4 3 1621133-162114e 2->3 2->4 8 1621150-162115c 3->8 9 162116f-162118f 3->9 6 16211a5-1621ff0 4->6 12 1621164 8->12 9->1 12->9
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: 2 $[sr
                            • API String ID: 0-3644076740
                            • Opcode ID: f15b201dae48e16786fe3800e04e6f778e52c27f4cf717232e7afb674b5c5b5a
                            • Instruction ID: b401523f8dbfd2b3580c79a3505d554f0507f2ae4400f9e33c29ff761cf30f5c
                            • Opcode Fuzzy Hash: f15b201dae48e16786fe3800e04e6f778e52c27f4cf717232e7afb674b5c5b5a
                            • Instruction Fuzzy Hash: 7AA27371C117AB8ACB219F6488443C9F771BFA6304F659B96D5483B101EBB12BDACF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 218 32ecbf9-32ecc00 219 32ecc1c-32ecc4a 218->219 220 32ecc02-32ecc18 218->220 224 32ecc4c-32ecc4e 219->224 225 32ecc50 219->225 220->219 226 32ecc55-32ecc60 224->226 225->226 227 32ecc62-32ecc93 RtlEncodePointer 226->227 228 32eccc1-32eccce 226->228 230 32ecc9c-32eccbc 227->230 231 32ecc95-32ecc9b 227->231 230->228 231->230
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 032ECC82
                            Memory Dump Source
                            • Source File: 00000007.00000002.597521109.00000000032E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_32e0000_Receipt.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: 65b03eb95b1aa607928c5d14141790c9851e1bbf39476fe5185b223bbacc3afb
                            • Instruction ID: 5559e6e78e05884eccf8af711c5620e6b5d0c92a262c70c1caa02851706ecea1
                            • Opcode Fuzzy Hash: 65b03eb95b1aa607928c5d14141790c9851e1bbf39476fe5185b223bbacc3afb
                            • Instruction Fuzzy Hash: 53219D719103298FDB20DFA9D58A3DEBFF8FB4A718F148029D408E3600C334A9848FA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 233 32ecea8-32ecef8 call 32ecce0 call 32ecd38 238 32ecefe 233->238 239 32ecefa-32ecefc 233->239 240 32ecf03-32ecf0b 238->240 239->240 241 32ecf0d-32ecf3e RtlEncodePointer 240->241 242 32ecf67-32ecf79 240->242 244 32ecf47-32ecf5d 241->244 245 32ecf40-32ecf46 241->245 244->242 245->244
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 032ECF2D
                            Memory Dump Source
                            • Source File: 00000007.00000002.597521109.00000000032E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_32e0000_Receipt.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: c7376ff664e6bd71c3ec7fe0f2b87a71543678279c2f0a425d42296dd6d539c0
                            • Instruction ID: feb4b28bfaa871b383aeff7217713e9eb8455ab749940698983efeb09465d62b
                            • Opcode Fuzzy Hash: c7376ff664e6bd71c3ec7fe0f2b87a71543678279c2f0a425d42296dd6d539c0
                            • Instruction Fuzzy Hash: 5221CDB4D143648FDB10DFA9C58579EBBF8FB45324F14846AD444F7244C3B8A584CBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 247 32ecc08-32ecc4a 251 32ecc4c-32ecc4e 247->251 252 32ecc50 247->252 253 32ecc55-32ecc60 251->253 252->253 254 32ecc62-32ecc93 RtlEncodePointer 253->254 255 32eccc1-32eccce 253->255 257 32ecc9c-32eccbc 254->257 258 32ecc95-32ecc9b 254->258 257->255 258->257
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 032ECC82
                            Memory Dump Source
                            • Source File: 00000007.00000002.597521109.00000000032E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_32e0000_Receipt.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: 7dd9dae4683bfde70ae408f93ef4281741c2f7c690b9d44db116008c52672ac2
                            • Instruction ID: 691a2d6c04391cb0cc6ae3fb6e062026513527814a86ff869a69e9a8f94ea8f1
                            • Opcode Fuzzy Hash: 7dd9dae4683bfde70ae408f93ef4281741c2f7c690b9d44db116008c52672ac2
                            • Instruction Fuzzy Hash: E8117C719103198FDB20DFA9D5897DEBBF8FB4A728F149429D409E3600C779A984CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 260 188d12f-188d134 261 188d0bd-188d0d2 260->261 262 188d136-188d153 260->262 263 188d0da 261->263 265 188d159-188d17b call 1888350 262->265 266 188d35b-188d3d0 call 18889c0 call 188cdf8 call 18889c0 262->266 283 188d3e8-188d40a 266->283 284 188d3d2-188d3d8 266->284 290 188d48d-188d499 283->290 291 188d410-188d438 call 1886760 283->291 285 188d3da 284->285 286 188d3dc-188d3de 284->286 285->283 286->283 294 188d51c-188d528 290->294 295 188d49f-188d4c7 call 1886760 290->295 305 188d43a-188d43e 291->305 306 188d446-188d44a 291->306 302 188d52a-188d552 call 1886760 294->302 303 188d5a0-188d5ac 294->303 316 188d4c9-188d4cd 295->316 317 188d4d5-188d4d9 295->317 332 188d560-188d564 302->332 333 188d554-188d558 302->333 314 188d5ae-188d5d2 call 1886760 303->314 315 188d5d4-188d5fb call 1886760 303->315 307 188d60a 305->307 308 188d444 305->308 306->307 310 188d450-188d465 306->310 321 188d60f-188d620 307->321 308->310 323 188d473-188d47d 310->323 324 188d467-188d469 310->324 336 188d602-188d609 314->336 315->336 316->307 322 188d4d3 316->322 317->307 325 188d4df-188d4f4 317->325 337 188d622-188d631 321->337 338 188d693-188d6a7 321->338 322->325 323->321 329 188d483-188d488 323->329 324->323 341 188d502-188d50c 325->341 342 188d4f6-188d4f8 325->342 329->336 332->307 343 188d56a-188d57f 332->343 333->307 340 188d55e 333->340 337->338 344 188d6a9-188d6af 338->344 345 188d6c1-188d6c2 338->345 340->343 341->321 348 188d512-188d517 341->348 342->341 352 188d58d-188d597 343->352 353 188d581-188d583 343->353 349 188d6bd 344->349 350 188d6b1-188d6b9 344->350 348->336 349->345 350->349 352->321 354 188d599-188d59e 352->354 353->352 354->336
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: F;]k
                            • API String ID: 0-1651525957
                            • Opcode ID: f6df8510fea5107e7d0852bea5f9fbe16756cf1a8e60a9913044bd3094cbfcdf
                            • Instruction ID: d7019017f76815c9de2019ec29cbda5706e381d9e156ce4aefb8bd7876d36a6e
                            • Opcode Fuzzy Hash: f6df8510fea5107e7d0852bea5f9fbe16756cf1a8e60a9913044bd3094cbfcdf
                            • Instruction Fuzzy Hash: 36A1C0707042558FCB25FBBCC4646797BE2AF45358B2002B9D00ADB3A2DB35DD86C792
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 355 162eb90-162eba5 356 162ebb1-162ebe8 355->356 357 162eba7-162ebac call 162eaa0 355->357 360 162ebee-162ebf7 356->360 361 162eded-162ee23 356->361 357->356 362 162eca6-162ecad 360->362 363 162ebfd-162ec09 360->363 377 162ee82-162ee89 361->377 378 162ee25-162ee72 361->378 364 162ecdf-162ecee 362->364 365 162ecaf-162ecc1 362->365 363->361 366 162ec0f-162ec18 363->366 369 162ecf0-162ed16 364->369 370 162ed19-162ed25 364->370 365->361 368 162ecc7-162ecdd 365->368 371 162ec1a-162ec33 366->371 372 162ec7c-162ec8b 366->372 375 162ed28-162ed34 368->375 369->370 370->375 371->372 381 162ec35-162ec3b 371->381 372->361 373 162ec91-162eca0 372->373 373->362 373->363 375->361 380 162ed3a-162ed52 375->380 399 162ee7b 378->399 380->361 382 162ed58-162ed89 380->382 383 162ec47-162ec53 381->383 384 162ec3d 381->384 382->361 389 162ed8b-162ed9c 382->389 383->361 387 162ec59-162ec79 383->387 384->383 391 162ede3-162edea 389->391 392 162ed9e-162edab 389->392 392->391 396 162edad-162edda 392->396 396->391 399->377
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: d
                            • API String ID: 0-2564639436
                            • Opcode ID: 7c78365d6cab77c4f06a93f26f12a4f3e5b6f538dffcd81142549c6f895f0daa
                            • Instruction ID: aba61266dc83f3e8ab087486c03fcf19fb46a56bdad6bf9992e7c9c173248774
                            • Opcode Fuzzy Hash: 7c78365d6cab77c4f06a93f26f12a4f3e5b6f538dffcd81142549c6f895f0daa
                            • Instruction Fuzzy Hash: 34B11775A0022ACFCB04CF98C9849AEF7B2FF89314B1586A5D905AB356D735EC45CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 489 1887d28-1887d5e 491 1887d78-1887d97 489->491 492 1887d60-1887d75 489->492 495 1887edd-1887ee9 491->495 496 1887d9d-1887dcf 491->496 498 1887eee-1887ef4 495->498 500 1887de8-1887e05 496->500 501 1887dd1-1887de0 496->501 500->495 501->500
                            Strings
                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID: 2
                            • API String ID: 0-450215437
                            • Opcode ID: 47019968d5365ff0f5e17fbf6dc105c775e5fd00645fcefb8cace1fbd0c3e19b
                            • Instruction ID: 3b24bb5bfa583ed9c908600e6a981f082df720c281d8da6e3a7099a2b6fd542e
                            • Opcode Fuzzy Hash: 47019968d5365ff0f5e17fbf6dc105c775e5fd00645fcefb8cace1fbd0c3e19b
                            • Instruction Fuzzy Hash: B9314B35A01108AFDF05DFA8E8909EEBBB5EF88315F10806AE805A7350DB359A19CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 985 188f264-188f27f 987 188f2c9-188f2e0 985->987 988 188f281 985->988 992 188f2e9-188f2f2 987->992 993 188f2e2-188f2e5 987->993 989 188f284-188f2a1 988->989 1000 188f2a3-188f2b3 989->1000 1001 188f2b5-188f2c7 989->1001 994 188f31c-188f325 992->994 995 188f2f4 992->995 993->992 998 188f32b-188f330 994->998 999 188f3f3-188f3f7 994->999 996 188f2f7-188f31a 995->996 996->994 1005 188f33a-188f3d3 998->1005 1002 188f3f9-188f3fd 999->1002 1003 188f403-188f413 999->1003 1000->1001 1001->987 1001->989 1002->1003 1010 188f419-188f423 1003->1010 1011 188f4bf-188f4c8 1003->1011 1028 188f98f-188f9b1 1005->1028 1033 188f3d9-188f3ed 1005->1033 1010->1011 1019 188f429-188f47d 1010->1019 1013 188f58b-188f595 1011->1013 1014 188f4ce-188f4dd 1011->1014 1022 188f60b-188f614 1013->1022 1023 188f597-188f5d1 1013->1023 1021 188f4e0-188f4e6 1014->1021 1063 188f47f-188f4b3 1019->1063 1064 188f4b5-188f4b7 1019->1064 1027 188f4ec-188f504 1021->1027 1021->1028 1025 188f61b-188f628 1022->1025 1026 188f616-188f619 1022->1026 1036 188f5d8-188f5e5 1023->1036 1037 188f5d3-188f5d6 1023->1037 1030 188f62a-188f630 1025->1030 1026->1030 1052 188f543-188f56b 1027->1052 1053 188f506-188f52e 1027->1053 1042 188fb91-188fb97 1028->1042 1043 188f9b7 1028->1043 1038 188f632-188f642 1030->1038 1039 188f644-188f683 1030->1039 1033->999 1033->1005 1041 188f5e7-188f606 1036->1041 1037->1041 1038->1039 1054 188f685-188f6be 1038->1054 1067 188f6c4-188f6d3 1039->1067 1073 188f716-188f71a 1041->1073 1049 188fb99-188fb9f 1042->1049 1050 188fbcf-188fbf3 1042->1050 1043->1042 1049->1050 1056 188fba1-188fbcd 1049->1056 1057 188fbf9-188fbfa 1050->1057 1052->1028 1060 188f571-188f579 1052->1060 1053->1028 1059 188f534-188f541 1053->1059 1054->1067 1056->1057 1069 188f57e-188f585 1059->1069 1060->1069 1063->1011 1064->1011 1074 188f703-188f70e 1067->1074 1075 188f6d5-188f701 1067->1075 1069->1013 1069->1021 1076 188f92d-188f965 1073->1076 1077 188f720-188f777 1073->1077 1074->1073 1075->1073 1085 188f96d-188f96f 1076->1085 1088 188f77d 1077->1088 1089 188f8f5-188f928 1077->1089 1086 188f971-188f977 1085->1086 1087 188f987-188f98e 1085->1087 1090 188f979 1086->1090 1091 188f97b-188f97d 1086->1091 1092 188f780-188f789 1088->1092 1089->1076 1090->1087 1091->1087 1092->1028 1093 188f78f-188f7a7 1092->1093 1097 188f7ad-188f80f 1093->1097 1098 188f8e3-188f8ef 1093->1098 1097->1028 1101 188f815-188f840 1097->1101 1098->1089 1098->1092 1105 188f868-188f8b2 1101->1105 1106 188f842-188f866 call 188a418 1101->1106 1110 188f8b7-188f8dd 1105->1110 1106->1105 1106->1110 1110->1098
                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 01758205d38a1484a17efd62c57d25eb790763185dbe1ef2b8a3b13690f2b3c0
                            • Instruction ID: 1f58120267540978a4a995e3b3036ce44893989f6953d51b99fa3cb635e52ca4
                            • Opcode Fuzzy Hash: 01758205d38a1484a17efd62c57d25eb790763185dbe1ef2b8a3b13690f2b3c0
                            • Instruction Fuzzy Hash: FA52713A610514DFDB06DF98C988D69BBB2FF4D319B1A8098E6059B272C732EC51EF40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8f4a795bb104941d1c7571498615a5b0b9adc2484b17aadb3c9368be3840c233
                            • Instruction ID: ffba5788b2864b2ff0da4b9014a7d25e9e7ef98cb45ce58299cda80bebd2e980
                            • Opcode Fuzzy Hash: 8f4a795bb104941d1c7571498615a5b0b9adc2484b17aadb3c9368be3840c233
                            • Instruction Fuzzy Hash: A212AC70B002169FCB24AF6CC49497DB7E2BFC9318B1484AAE10ADB761DB35DE45CB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b14fbfccd5e61c0bebb550edb721222495920c1558cbe9081cb75ea4dcd5f394
                            • Instruction ID: a61821695643d828501b8c6e95578f6782d01912c41e2d55ece191a747404243
                            • Opcode Fuzzy Hash: b14fbfccd5e61c0bebb550edb721222495920c1558cbe9081cb75ea4dcd5f394
                            • Instruction Fuzzy Hash: AB020674A00208DFDB14EFA8D584AAEBBF2FF88314F158169E505AB361DB34ED45CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7e820e0e96b8faeb86be65801e1a0a19d519be75b593e4d48c0791c05be11278
                            • Instruction ID: 100f664dfe4e2179946444b0da34c5d46550effa6f3237302644298d72bbf25f
                            • Opcode Fuzzy Hash: 7e820e0e96b8faeb86be65801e1a0a19d519be75b593e4d48c0791c05be11278
                            • Instruction Fuzzy Hash: D1E13E74A001189FDB18EFA9D594AAEBBF6BF48304F158069E505EB3A0DB34ED45CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9cc44bf42e038899f08aec030ffb6e66b854dd8af82ee726db32f6c8870121c4
                            • Instruction ID: abbcc176b9e080e331dce1d763648dabe128a682cabe6a12ab9d6921c88356cf
                            • Opcode Fuzzy Hash: 9cc44bf42e038899f08aec030ffb6e66b854dd8af82ee726db32f6c8870121c4
                            • Instruction Fuzzy Hash: 02B1B0357042018FCB16BB7CC854A6A7BE2AFDA314B1945A9D509CF3A2DF31DD06CB92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2593951d6c6f9ab622a5fcba2489f9a1a97fbe4f53a78e06926c799ce3675982
                            • Instruction ID: d6408a82738e72f8ce612e0a72996d0028d9020a334d4d486962d106134bd034
                            • Opcode Fuzzy Hash: 2593951d6c6f9ab622a5fcba2489f9a1a97fbe4f53a78e06926c799ce3675982
                            • Instruction Fuzzy Hash: AAA19E31A042098FCB15DF69D884AAEBBF6FF89710F19855AED15EB352C630ED41CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d603479142053cce3f4dabefbbc0e93c5685ce497ea62cca4ba0e98a5aa690d
                            • Instruction ID: 87bd8605b8e6970d07fb0e57fe7e4577f8bae0f4942e179485504be9b8a78a13
                            • Opcode Fuzzy Hash: 1d603479142053cce3f4dabefbbc0e93c5685ce497ea62cca4ba0e98a5aa690d
                            • Instruction Fuzzy Hash: 6AD0C9320492868FC3169BB4E9996447FACAF43219F5414CBE488DE4B6C625B659CB05
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: af269ba63b1918e7630c121ea0213de9e54752388d033783dd1e854b25529bd9
                            • Instruction ID: 814ae7113fca0c9ecc1e056a025c951d804b861eb325f801bd2c78cecc866ab4
                            • Opcode Fuzzy Hash: af269ba63b1918e7630c121ea0213de9e54752388d033783dd1e854b25529bd9
                            • Instruction Fuzzy Hash: 37B1E031600216CFC721EF68D4845AEBBB1FF85318B24856DE51AEB742DB31ED49CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cff4a4b57c4ea1d195bccbd58acacb308e708b922bde44a2cec978fb682f748b
                            • Instruction ID: 13f9485e958d68269be2d661f21aa2fde4cff16ee5d2bcc4d246589515b0ebbd
                            • Opcode Fuzzy Hash: cff4a4b57c4ea1d195bccbd58acacb308e708b922bde44a2cec978fb682f748b
                            • Instruction Fuzzy Hash: 8CB14675A006058FCB14DFADC58499AFBF2FF88314B248699E419DB722DB30ED46CB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 12cbdc988ff8118a7ef02d830e33d0fac8fa2a07048618c379b7b110a742f4f0
                            • Instruction ID: 88fc2906ea3d914d3d5de29d66c3b40ced0697bdd7e259137054318f9138adde
                            • Opcode Fuzzy Hash: 12cbdc988ff8118a7ef02d830e33d0fac8fa2a07048618c379b7b110a742f4f0
                            • Instruction Fuzzy Hash: 40A12C74A011189FDB19EF68D994A9DBBF6BF88310F15806AE505EB3A1DB30ED41CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fade497284857eea0163f17277b34e7d4b440f05bed66bd603a80260658c9e86
                            • Instruction ID: d2664b80191edf824e0b6c025f27644147f9fd1b6834d4c7a594943c1c48c61a
                            • Opcode Fuzzy Hash: fade497284857eea0163f17277b34e7d4b440f05bed66bd603a80260658c9e86
                            • Instruction Fuzzy Hash: CA918C717002159FCB14EBA9C880AAEBBF6FF89714B144529E509DB790DB34ED09CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3036831dc628c38e7d3b2601c653a44c6445a64332ac8c068e8aea3163660008
                            • Instruction ID: ceb5f14834aebedf34ff243a96c95434ef06d0630e89899639854e8abdc9ad8d
                            • Opcode Fuzzy Hash: 3036831dc628c38e7d3b2601c653a44c6445a64332ac8c068e8aea3163660008
                            • Instruction Fuzzy Hash: DDA16274A002099FDB15DFA8C444BAEBBF2FF88704F258059D505AB3A5CB74DE85CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3304a5eeb6c50b9a55c2b0e3e13c57b4a8cd7a86b55382d79ae4112b47ea9fb3
                            • Instruction ID: 31587362c3b595165780d8f350efaa3974044938d7f36c5532fad2b19aca0f1f
                            • Opcode Fuzzy Hash: 3304a5eeb6c50b9a55c2b0e3e13c57b4a8cd7a86b55382d79ae4112b47ea9fb3
                            • Instruction Fuzzy Hash: 8A915F34A002199FCB15EFA8D884A9DBBF6FF48314F258169E505EB362EB30ED45CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ae0a1376753c4d46d786ffead58b0ec7f1cb0b23f1634478ad1ec04026bfd4c2
                            • Instruction ID: d37660293199e22dff9a0de4ce51499b33b9e6af429d46874d5bdc507d869964
                            • Opcode Fuzzy Hash: ae0a1376753c4d46d786ffead58b0ec7f1cb0b23f1634478ad1ec04026bfd4c2
                            • Instruction Fuzzy Hash: 8A818E31A002159FCB15DFA8D9849AEFBB7FF88314F148569E916E7251C731AD42CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2bf61f3c51026c0750e5379164a5ff6bb9b3e5c2c2574465bb03be0cf7b05485
                            • Instruction ID: e498224cd39c39283f3ec85123dd4df33271e5b0708ece33ee2fc1dd82aca17b
                            • Opcode Fuzzy Hash: 2bf61f3c51026c0750e5379164a5ff6bb9b3e5c2c2574465bb03be0cf7b05485
                            • Instruction Fuzzy Hash: 3681A630604116DFDB20BB68D4486BCB6A1FF85348F658968C207EF391FB75AE58C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a33cc97131444c60f3c8704e37d82f779fb270ee135033c8fa6a7948c1af4bed
                            • Instruction ID: 90b3951778e3c8e04f611bc931f228d4d7bff534639ee4a759297fa8c508508d
                            • Opcode Fuzzy Hash: a33cc97131444c60f3c8704e37d82f779fb270ee135033c8fa6a7948c1af4bed
                            • Instruction Fuzzy Hash: 5E71B274B102198FCB14EF68C89499DBBF6BF88304F258169D506DB365EB70ED46CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: efa19eebea9cd22429ce2e94c765d008ba22bc6213ab2a0dc6245856c98497fc
                            • Instruction ID: 8ca69df0653c04b4ba7cac3e05db717390e1a93563c2e3c88c50efe47fd3fbad
                            • Opcode Fuzzy Hash: efa19eebea9cd22429ce2e94c765d008ba22bc6213ab2a0dc6245856c98497fc
                            • Instruction Fuzzy Hash: 7D51033670024A9FDB15EF68C4906FFB7A6EF84368F148429E915DB741DB30DE058B92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9a5eb2c17c15f6fab26e63c8e4ba07d35c458d368001fd2febc6acbb4e799804
                            • Instruction ID: 275c6c83acaa0ce2d38f8341b6b45188b8741af842e16c4c1c49ef7dd2c29582
                            • Opcode Fuzzy Hash: 9a5eb2c17c15f6fab26e63c8e4ba07d35c458d368001fd2febc6acbb4e799804
                            • Instruction Fuzzy Hash: 3A51C0316046559FCB25EF68C884AAFBBF2AF85304F40445DD542DBB50CB30FA46CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.641445904.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_5900000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1ce5069c14dfa2d86c7fc4af70eb61032491e26ff7ee06ea114a15e5a5e9a624
                            • Instruction ID: eeae73fd6e637023560a5111b356957e5c2eeb33c0acf8c3d0b26e024a25f250
                            • Opcode Fuzzy Hash: 1ce5069c14dfa2d86c7fc4af70eb61032491e26ff7ee06ea114a15e5a5e9a624
                            • Instruction Fuzzy Hash: 60516B35724114DFCB44DF69D8588ADBBB6FF8971071189AAE506CB3A1DB30EC05CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 166ce6661907d3eb3bde801896d99107c9ed8ba0ac08afbd50a99561d85ec7d1
                            • Instruction ID: 4ebb82b749e3a495dc86e5395c5a30969bd310ec0509a34d797e33f13e1c18f8
                            • Opcode Fuzzy Hash: 166ce6661907d3eb3bde801896d99107c9ed8ba0ac08afbd50a99561d85ec7d1
                            • Instruction Fuzzy Hash: 89611B34A001199FDB55EFA8D884A9DBBF5FF48314F2580A8E505EB362EB30ED45CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 818031cf86433c615db585df01cfd3cf5572838377d6b51e49105cf2c54938e3
                            • Instruction ID: 32bebf49cadbd04bc66953b86caf5555c9ec31bbe0daa39158a0f14ab4654268
                            • Opcode Fuzzy Hash: 818031cf86433c615db585df01cfd3cf5572838377d6b51e49105cf2c54938e3
                            • Instruction Fuzzy Hash: 4A51A07160020A9FCB15EF6DC880AAEBBF9FF45314B15846AE918CB751E730E944CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3ec4a0038db178ddcb5031a28c07b32e871e9dbe006784b0eae75049a4f754ad
                            • Instruction ID: d3893f87cab2453aa0962386baa937158e458c16753a833b74806daa7ad50c28
                            • Opcode Fuzzy Hash: 3ec4a0038db178ddcb5031a28c07b32e871e9dbe006784b0eae75049a4f754ad
                            • Instruction Fuzzy Hash: 3C5137317041169FC705EB78C89086EBBF5FF45714B1541AAE509DB762CB30AC45CBD1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ba8aa96b1f5643df7a25109cf683839cb015fb46cf3d5054b93a1235e5fcf16f
                            • Instruction ID: fa6d72e306068ed2967d626282b6dcb0a21a77f5147e62e383aa365089be7e2f
                            • Opcode Fuzzy Hash: ba8aa96b1f5643df7a25109cf683839cb015fb46cf3d5054b93a1235e5fcf16f
                            • Instruction Fuzzy Hash: F941F4317042008FDB20AB6DD8A4B6A77EAEFC6364F15417AE505CB3A1DB35DC46CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1be9406638fce932672d0202397c7a919a694bc5ee0ea7a0135256c75f0ebb32
                            • Instruction ID: 885e4263ff6ebff799650cd2c271d1b50db730ba6a0a716c4db1791e5774ff83
                            • Opcode Fuzzy Hash: 1be9406638fce932672d0202397c7a919a694bc5ee0ea7a0135256c75f0ebb32
                            • Instruction Fuzzy Hash: DB41F570A087859FCB16DF7CC44469ABFF1AF49304F2488AED089DB252D731E946CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8e442f5d7f6891d6847f2bf16f229e3c956270d366d8354eac4df472451119de
                            • Instruction ID: ca4b898588eca8dd78a101e4d177a8ca5a3be0ae4ff34a61e077845e12fda479
                            • Opcode Fuzzy Hash: 8e442f5d7f6891d6847f2bf16f229e3c956270d366d8354eac4df472451119de
                            • Instruction Fuzzy Hash: C14167B0B04626DBDF31AE1C960162BBAA59FC4B89B10453A9996C7744DB34DD80CBE2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c48a81846e46f81efb7b392af1cddeb05446584ae113cb8d427ec2a008d78e3d
                            • Instruction ID: 0467468803d63eaf8056e6cb77924555d01d5af72deee3e0fb42ddc1d854fb37
                            • Opcode Fuzzy Hash: c48a81846e46f81efb7b392af1cddeb05446584ae113cb8d427ec2a008d78e3d
                            • Instruction Fuzzy Hash: 36510974A002098FCB14DF69C584ADEBBF2FF88304F248599E405AB765DB71AE49CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c765be5db544dbfb8dfe3ab6afaecaa545bf40d4a8ea06dedc90794ba0f2b35c
                            • Instruction ID: 6b36ea1b2218ee83abd60736461ac345d65359164030900d56d8ba7fee674b10
                            • Opcode Fuzzy Hash: c765be5db544dbfb8dfe3ab6afaecaa545bf40d4a8ea06dedc90794ba0f2b35c
                            • Instruction Fuzzy Hash: A141A471B00205EFCB04DFB8C95179DB7F6AF89308F64846AD405EB741DB32AE468B91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9bab5fae7b7347348157fcad251adb50e043cd23b50b42b944b7a83a3a5359f2
                            • Instruction ID: f741a07de927ed73faf6e6bbe3a95d032c3c87b95354ba7d0ccf5409d110aff9
                            • Opcode Fuzzy Hash: 9bab5fae7b7347348157fcad251adb50e043cd23b50b42b944b7a83a3a5359f2
                            • Instruction Fuzzy Hash: B9418D30E102098FCB14EFA8C484A9DBBF6FF89314F258569D505EB315EB70A946CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7881a40e769989b4d2d690db030cc496af01ac84f967437c5fb6e31572be79a6
                            • Instruction ID: 839016b3d29ad4ba24f33913dee856b6a32c4e95a61047de7b5259d1c72e4654
                            • Opcode Fuzzy Hash: 7881a40e769989b4d2d690db030cc496af01ac84f967437c5fb6e31572be79a6
                            • Instruction Fuzzy Hash: B0316B323052611FC7167B3CC4606AEBB97EFC2A48704446DD60ADFB41DF299D0A87D6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.641445904.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_5900000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7022c8053e0e29536d9b428c2c2009e71662c3eb1cfb72eb0c35ca1bd91ebfad
                            • Instruction ID: 7bf1987e4f056fd279034003341a957345b0487bd597b5b443c3843abafef267
                            • Opcode Fuzzy Hash: 7022c8053e0e29536d9b428c2c2009e71662c3eb1cfb72eb0c35ca1bd91ebfad
                            • Instruction Fuzzy Hash: FD41D0747042559FCB14DF29D8889AEBBFAFF89204B048869E146C77A1DB30ED49CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.641445904.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_5900000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 08cb4eaa6c45b9572bbdfb9962e3397e93b251e1d8adf8119bee7bb109963b6b
                            • Instruction ID: 8ead914bf17c39620087714704e1738f71c930fc39aaedba8f82c14e60618503
                            • Opcode Fuzzy Hash: 08cb4eaa6c45b9572bbdfb9962e3397e93b251e1d8adf8119bee7bb109963b6b
                            • Instruction Fuzzy Hash: 9241DF707042558FCB14DF29D8889AEBBFAFF89204B04886DE146C77A1DB30EC49CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 370efa5dc1ade1e444d99cf2b3d1aca28760b5a36656ab0ef2705c7ac314b193
                            • Instruction ID: b91550d64e7a12bf29cc460a8ed289cfd632d83a759e2a8e769128fee6852a21
                            • Opcode Fuzzy Hash: 370efa5dc1ade1e444d99cf2b3d1aca28760b5a36656ab0ef2705c7ac314b193
                            • Instruction Fuzzy Hash: 70310331A002559FCB15DFA4D8449EEBFF2FF89300F10806AE909E7250C7359D52DBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3d00182c9adbcec648cb2cbbff3eabe8bca7bb5f97bd3227371710c2cd943d8
                            • Instruction ID: 3dc83e9f56241434ac1977aa15feae58fe316a7783386aba69a105a7bf848f7e
                            • Opcode Fuzzy Hash: c3d00182c9adbcec648cb2cbbff3eabe8bca7bb5f97bd3227371710c2cd943d8
                            • Instruction Fuzzy Hash: AD319470F051196BDB249B78D8647BE7AB6AF88304F244039F442E7784DF344C098F92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 482700104bbc894d4a2e92d6319e70dbad225c8774e4fca5b815b7b00d4d778b
                            • Instruction ID: f6590153b1c2367e44b3c58208b97e555544fb2a724360688f721e8b7e1b1d9e
                            • Opcode Fuzzy Hash: 482700104bbc894d4a2e92d6319e70dbad225c8774e4fca5b815b7b00d4d778b
                            • Instruction Fuzzy Hash: BE415A346002099FCB14EF68C584ADEBBF2BF88314F108598E505AB765DB71AE49CFD1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fe9037414c1ede615eb63f8f39db3a9379ce6fcc3e78d0e2e2f6f36ef13d3ebe
                            • Instruction ID: 26a102298a3bb9188cca093a6c566ccf26c6a6d67781701b85582a3829261b0f
                            • Opcode Fuzzy Hash: fe9037414c1ede615eb63f8f39db3a9379ce6fcc3e78d0e2e2f6f36ef13d3ebe
                            • Instruction Fuzzy Hash: F531A2327042048FDB11DF5DF054A6AB7EAEB99325F1490AAE10CCB622D732ED51CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 871d35d8f9862705be89e5aea71610aaa2a4f5b17e5551ae3ad626e99b1777dd
                            • Instruction ID: fcbe0ef8556bfaac5507f5202d05cfd2fd8f71bf693a855ac8ee821df95e18a2
                            • Opcode Fuzzy Hash: 871d35d8f9862705be89e5aea71610aaa2a4f5b17e5551ae3ad626e99b1777dd
                            • Instruction Fuzzy Hash: 863147346002099FCB14EF68C594ADEBBF2BF88314F1085A8E505AB761DB71AE49CFD1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f306421d21de5b9870cc356341c502a5d0b1d4014bb272b476fe94f135940971
                            • Instruction ID: aee6e7e11a7c24958cd301b6b863916ec7f167a3ebf3bddb068775e0fa55f2fc
                            • Opcode Fuzzy Hash: f306421d21de5b9870cc356341c502a5d0b1d4014bb272b476fe94f135940971
                            • Instruction Fuzzy Hash: C7317570F05119ABDB289B78E8647BE76B6AF88704F244039F542A7785DF744C098F91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9777c8c00b9b173a7e322ba8da5839fef5b22c31704ddfac3b9efc521c2ce98a
                            • Instruction ID: c847a2206056feb61f1dc5355eb94ef640fc5bbc9a451b4736298892fbc37e67
                            • Opcode Fuzzy Hash: 9777c8c00b9b173a7e322ba8da5839fef5b22c31704ddfac3b9efc521c2ce98a
                            • Instruction Fuzzy Hash: 392136353082115FD72177398850BAABAEAAFCA610F10807AE509DF791EE759C0A83A5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9d7007e37f62dd3c62d47c2428f9b0e6ce13c20773451a71fd0aac0c9667927e
                            • Instruction ID: c0d6006a088fa42f83151ce8fd38f99c604a4dd500276e5442cee642e3f71bb7
                            • Opcode Fuzzy Hash: 9d7007e37f62dd3c62d47c2428f9b0e6ce13c20773451a71fd0aac0c9667927e
                            • Instruction Fuzzy Hash: 5D319AB1A046489FDB15DF78C044AAAFBF2EF89304F24886DD089EB651D731A946CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ddeec243a3242e1af02874655cc75551c7277152c2336c38a457835683232f1
                            • Instruction ID: 3f25e81566d6ff3d9e5dc82aea47e512ee79fe82e402a6569f2e9b85fecbf495
                            • Opcode Fuzzy Hash: 8ddeec243a3242e1af02874655cc75551c7277152c2336c38a457835683232f1
                            • Instruction Fuzzy Hash: 59315274A00209CFDB14EF69C990AAEBBB2FF89314F1540A9D605EB361DB31AD42CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1cba0a2e31315a4f0274a9159eb0d1f12ad990241fd53745317c368e62dd8898
                            • Instruction ID: 59dce76f0901526b5a62a00b9eb330c121d71c0331c133d30fd97d07f330b8a6
                            • Opcode Fuzzy Hash: 1cba0a2e31315a4f0274a9159eb0d1f12ad990241fd53745317c368e62dd8898
                            • Instruction Fuzzy Hash: B321C4313047009FC722DF69D944A6BBBF6EFC5710B108459F64ACBA51CB32E806CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: acd1de7610617e52eedc6c9718e7ba34d234fedbf583484d44707912ece1e4ec
                            • Instruction ID: b4a5b9c6e0bfcc9efe95c742d783d99048dbf9c04c950228118e25a20136807a
                            • Opcode Fuzzy Hash: acd1de7610617e52eedc6c9718e7ba34d234fedbf583484d44707912ece1e4ec
                            • Instruction Fuzzy Hash: 27312F74A00609CFDB14EF69C984AAEB7B2FF88314F108069D605EB361DB31AD41CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 709bdb1e122349fffda9fd2243c604b2fa2c7c315e38eb494951177a09a5e4a7
                            • Instruction ID: 929cc9d5db3ace6d4e360fc9dca5ec4b07690f1cecb748ac382dc2036d4e665a
                            • Opcode Fuzzy Hash: 709bdb1e122349fffda9fd2243c604b2fa2c7c315e38eb494951177a09a5e4a7
                            • Instruction Fuzzy Hash: A3213271A046529FD705EF39C444BAA7BF2AF45304B1444ADC006EBBA1DB75EE89CBD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b0b44cd18f2004bb2e938a64a4953afdbc0173f3c9cac28b6d7b327b093da1f
                            • Instruction ID: 8bced96136d032481e5d7b1a3d061d003f569e42683d95786e75987da0ef3232
                            • Opcode Fuzzy Hash: 2b0b44cd18f2004bb2e938a64a4953afdbc0173f3c9cac28b6d7b327b093da1f
                            • Instruction Fuzzy Hash: BA219F34741A24DFDB249F28DD14AAE3BA6AB49701F018099F142EB3A2CB79DC01CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8b38c9655e26569a4747964eeb6bc3147118d52dc670876ec2f1765bb761d276
                            • Instruction ID: 3cde5fe77e1941680ded3ba5511f65defced62a47ee49b045cdcc73ff1dbb0d5
                            • Opcode Fuzzy Hash: 8b38c9655e26569a4747964eeb6bc3147118d52dc670876ec2f1765bb761d276
                            • Instruction Fuzzy Hash: 50215C75A002199FDB14DFA9D950BEEBBFAAB4C304F104029D501F7340DB7A9E44CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: de0759e7937df0d0912c365eb555f4d17657e942351bff4967f610668442a4fd
                            • Instruction ID: cc78ab3ea2627e85e369a16abe28bb8426d929842c2fda573f9ea72e3ec5169b
                            • Opcode Fuzzy Hash: de0759e7937df0d0912c365eb555f4d17657e942351bff4967f610668442a4fd
                            • Instruction Fuzzy Hash: 02216F34700620DFDB24DB68DD14A7E36A6AB88710F118069F106EB7A1CF79DC45CFA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.641445904.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_5900000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70642256d68c5c393b9ac8cd076192da410746d000b5f3883d89d39f4d35e0dd
                            • Instruction ID: 6d257ece9eae0f3ffa5d553743882e5420d3a210314fcbc1eee7324678fca7d6
                            • Opcode Fuzzy Hash: 70642256d68c5c393b9ac8cd076192da410746d000b5f3883d89d39f4d35e0dd
                            • Instruction Fuzzy Hash: 2411E3393006161B8600EB29E894ABE73DFEBD5658B408935D505CBF41FF74EC0A87D1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3fcacd279e8d058cf697079b165c43117e8a17ac564ac2c52e069ab7e26c75a4
                            • Instruction ID: dcefb738d2189c3eda2c798bddae6e02dff33147f2a71cb74d9e9e07fb48e5f5
                            • Opcode Fuzzy Hash: 3fcacd279e8d058cf697079b165c43117e8a17ac564ac2c52e069ab7e26c75a4
                            • Instruction Fuzzy Hash: 1C213975E006099FDB10DFA9C584A9AFBF6EF88310F648959E189E7710D730BA41CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e85535262d7874a57f40688a5bf868540755435c887d4d3f787a6b65f262445
                            • Instruction ID: 09d6320556468b0ee255aa391d8ef3f1ee197c3a4d2fe7860de5852d0dd75fbe
                            • Opcode Fuzzy Hash: 0e85535262d7874a57f40688a5bf868540755435c887d4d3f787a6b65f262445
                            • Instruction Fuzzy Hash: 7C21F535A10109DFDF10EFA5E985AADBBB5FF44719F214469E401EB7A1CB34EA44CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c8c6e72f0dcfe989beb3a78cd09040dc58810cc9f71309bcd8a2d36d05271a99
                            • Instruction ID: 3c91d22587837474ff136eef4277a85fe421311fccb164d1750ee0dc69158dfa
                            • Opcode Fuzzy Hash: c8c6e72f0dcfe989beb3a78cd09040dc58810cc9f71309bcd8a2d36d05271a99
                            • Instruction Fuzzy Hash: ED11D3313042119FC324EF6CD44466E7BE6BFC9254F5409ADD15ACB7A1DA31ED098792
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7a67b293f120193b570bea595438e5f5a073a4cb510eb0bdc3a5be3a174f964e
                            • Instruction ID: e881e5f328f0bdfd94238587940e6b7d649b46d032397c35182992231bfc2928
                            • Opcode Fuzzy Hash: 7a67b293f120193b570bea595438e5f5a073a4cb510eb0bdc3a5be3a174f964e
                            • Instruction Fuzzy Hash: 421104323043549FC706B77C941485ABFEA9F8762535540FBE148DB362CA36AC46C7A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 03b07f16a03d2469475dbe18c6760618de24b8dc137831d6d1bf1febe6b80b92
                            • Instruction ID: 49d1b953f5260fd1372205952ecb8946f0c95b5166a5bedae6c1711560977afa
                            • Opcode Fuzzy Hash: 03b07f16a03d2469475dbe18c6760618de24b8dc137831d6d1bf1febe6b80b92
                            • Instruction Fuzzy Hash: DB1106317042056FD704AB7CC941AAC7BEAAF82718F1402BAD109CF7E1EE35DD098B81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.641445904.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_5900000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 766c0d5b1a76a47189f89992f8b4023019e7d9b0194e34a7d011092b59b8685e
                            • Instruction ID: d85fdf759bb5edaff9d11d41c08eff2fd21c7732f2de9922b226a982e1904e5e
                            • Opcode Fuzzy Hash: 766c0d5b1a76a47189f89992f8b4023019e7d9b0194e34a7d011092b59b8685e
                            • Instruction Fuzzy Hash: EF11A5357006161B4A00EB69E4949BE73DFEBD56687409936D505CBF40FF74EC0987D1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 163b25eed9bec8b52c3f8ded130a8b1e6d5f0a4b86c9952a45cbb5977239ab50
                            • Instruction ID: e9835a52b47b64a433871700ab376f1f431ba6e5ca568a19c7670bfa6e2a6857
                            • Opcode Fuzzy Hash: 163b25eed9bec8b52c3f8ded130a8b1e6d5f0a4b86c9952a45cbb5977239ab50
                            • Instruction Fuzzy Hash: 76219D75A046048FD721DB69C5447AABBF2AF88304F248499E186D7760DB70FE46CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ab6f4ff5f22e2e8c050333ef880e7f798166a8150e2fca6e91212d81e6e19fae
                            • Instruction ID: c666cc34bbf7d40639f9820947828017ce896f8a684a3ea3d85235336c11a92b
                            • Opcode Fuzzy Hash: ab6f4ff5f22e2e8c050333ef880e7f798166a8150e2fca6e91212d81e6e19fae
                            • Instruction Fuzzy Hash: AD11E0313042209FC324EB6DD85866EB7E6FFC9254B4408ADE11ACB761EE30ED098792
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 79f15345e2c7fcdbc3f2b49cdfdb11fffbbbd6be17e49ba8b55593c0f5c2ca15
                            • Instruction ID: 5b164bb31cfa9649eded7619455964be94e4068719691f51f8e97c2be4ef7cc5
                            • Opcode Fuzzy Hash: 79f15345e2c7fcdbc3f2b49cdfdb11fffbbbd6be17e49ba8b55593c0f5c2ca15
                            • Instruction Fuzzy Hash: 0D117975A002298FDF01DF58DA046EE7BF5EB88B28F0040A8D905BBB51DB786D488FD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 82777c7e66d5bea13b6a0d7f142abc744ca85acb7b1bf55fd96f50d70c461b8d
                            • Instruction ID: 9a0154838f5f85d4e6777ec3fcba98a4f08fcc0f58a289ca6cd09bcf4ff8d721
                            • Opcode Fuzzy Hash: 82777c7e66d5bea13b6a0d7f142abc744ca85acb7b1bf55fd96f50d70c461b8d
                            • Instruction Fuzzy Hash: ED216A34A00209DFDB01DFA4D954BAEBBB6EF49309F214018E401EB350CB795E45CF80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0c498a96faad6604790bf978f49a31a3047d555263a9da8d99b175ec7e2fb6e8
                            • Instruction ID: 84516b5fa95f2c0b4d15d8b45569461a54527a72fba975f3777933b8914f6b41
                            • Opcode Fuzzy Hash: 0c498a96faad6604790bf978f49a31a3047d555263a9da8d99b175ec7e2fb6e8
                            • Instruction Fuzzy Hash: CA1173353006114BC714DF7DC9909A6B7DBEBC6618724896CD1298F791EF35EC068A80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c639a38e7c7181caff427ed6edb1c5bd266473bb038dfa79bfdc77cdb991ab53
                            • Instruction ID: 69252c6ea1f0dfc39f413d5380ed57838f640ffad9ed522c024bde84d47a4899
                            • Opcode Fuzzy Hash: c639a38e7c7181caff427ed6edb1c5bd266473bb038dfa79bfdc77cdb991ab53
                            • Instruction Fuzzy Hash: BF0147363406108FE730772CAC00BADB392AB89721F20417AE105DB790DE71DD02C755
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 922a55e1c99f4452be556fb5f55e93d11600f97bea3cfc159aad091b12bc06ce
                            • Instruction ID: 1e3c8eed37bb952daf09455929f687ebdfeda624c760abbc85f41ade1ee67184
                            • Opcode Fuzzy Hash: 922a55e1c99f4452be556fb5f55e93d11600f97bea3cfc159aad091b12bc06ce
                            • Instruction Fuzzy Hash: E3012975B002189FCB109BA9D801B9EBBB5EF88710F11406AEA05EB3A0E771DA11CBD4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 01ab0bf09f2358091e0dd87dd0acd2a41b184162162b33210b00f26860a10371
                            • Instruction ID: 36b928d42aa6c426c9231e72b5743b504d3e12d87c804f83253b001665bd58fc
                            • Opcode Fuzzy Hash: 01ab0bf09f2358091e0dd87dd0acd2a41b184162162b33210b00f26860a10371
                            • Instruction Fuzzy Hash: DB11C0343042148FD700DF68D894AAB7BE6FF8A328F0001A9E1468F762DB35AC45CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3559e7f8acf7a69dbf92f7889bb7aa16e09e39ead71539f1c27e496bfccc4dc4
                            • Instruction ID: 28d415bc59f7d040adbb5563e4651d9136ee8da2239e7a47faea03a157eb9343
                            • Opcode Fuzzy Hash: 3559e7f8acf7a69dbf92f7889bb7aa16e09e39ead71539f1c27e496bfccc4dc4
                            • Instruction Fuzzy Hash: 4011F731F016189BDB68DB78E858BAD7BB6AF88705F148428E002A7395DF349905CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed6374d1046005e2fc8c2e0c99fa96a085f38841723c44c0cb2c14552363448b
                            • Instruction ID: f2ffaa2891c5ff05a9c918c0dd88901f909956e124a3012200cc7f5ffb61a8db
                            • Opcode Fuzzy Hash: ed6374d1046005e2fc8c2e0c99fa96a085f38841723c44c0cb2c14552363448b
                            • Instruction Fuzzy Hash: 82012D742047059FC724EF6AD48496AB7EAFB84614710492CE14687A51DB70FD4DC7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3360631d31ae387f7ee846f739bdd79af2b6712a948e7315a2313d458ff97476
                            • Instruction ID: 831e28667130ed511691b6941997a54dd8715a90184e76ec83f13ab69c004b76
                            • Opcode Fuzzy Hash: 3360631d31ae387f7ee846f739bdd79af2b6712a948e7315a2313d458ff97476
                            • Instruction Fuzzy Hash: B401B535B002168FC711DFA8D98099EBBF5BB49210B154069E505D7341DB30DD068BA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a0420b71a70e1d43ba07155428c9629a6043ffc4387f2f319d3f5b1c7a4885a8
                            • Instruction ID: 168f62ef872147f4c22d0a7af23db8b39035152375647d3c7770ccdda0ddabd4
                            • Opcode Fuzzy Hash: a0420b71a70e1d43ba07155428c9629a6043ffc4387f2f319d3f5b1c7a4885a8
                            • Instruction Fuzzy Hash: BE019E313013018FC7215F29E8880AA7BA7FFC4215304493DD04AC7B55DB64AD4A9B92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f62ba7ee4ab9273e134c3ef12625b52b12290057b53e5c52004832dfddfad151
                            • Instruction ID: eba09ec1f9c23251104e91d68eed59e377c7ab90d4a39c363c3d9c7758165387
                            • Opcode Fuzzy Hash: f62ba7ee4ab9273e134c3ef12625b52b12290057b53e5c52004832dfddfad151
                            • Instruction Fuzzy Hash: 750181317042149FCF15BA7898505AE7FEAEF8971070400BAD519C7265EB359E4287A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f18424e53cae45f8cdb97c4c37afdfc1c20d8e47ef9d107de7290410f90003a0
                            • Instruction ID: c205addb611706294ebcf8c7da5c0fdd13d50cc0012fb45d01798086588eb1a3
                            • Opcode Fuzzy Hash: f18424e53cae45f8cdb97c4c37afdfc1c20d8e47ef9d107de7290410f90003a0
                            • Instruction Fuzzy Hash: D2016271A002199FCB40AFB9C80179EBBF5EF4A314F10407ADA45EB351E7319902CBD4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 13fb5d7d735e75e7a19806bc29e03268a306c7e826b105bded7ca0a356716c7d
                            • Instruction ID: fbf700015dcf54dfe58af93f61668738421d9c416e855cc2937ce947cda38f48
                            • Opcode Fuzzy Hash: 13fb5d7d735e75e7a19806bc29e03268a306c7e826b105bded7ca0a356716c7d
                            • Instruction Fuzzy Hash: 74F0C2347001148F8F18BA7C98105BE7BEAEFC9750700007DD519CB354EF319E0287A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 32a9df6215cc1fbe7352c503b030c4c60b9e53f460e831794d9dd6724a5bbf6b
                            • Instruction ID: bf3db3542f1e04d7fa30e2fc4ffa2215ed7398feca775fcc7fee00655e393ce0
                            • Opcode Fuzzy Hash: 32a9df6215cc1fbe7352c503b030c4c60b9e53f460e831794d9dd6724a5bbf6b
                            • Instruction Fuzzy Hash: 52F022327043111BE7203B395C80BAE77ABAFC6714F20427AE101EF682DDB55C0A47D9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6facb9cd8af7360b8e3df2604df83665f4da4e1f3c1b866f56e8e178ea6f8e8c
                            • Instruction ID: 5275ab16b9f90d5a2e66d536f91ce09797e9aa6b56f451350816992fe5417a8c
                            • Opcode Fuzzy Hash: 6facb9cd8af7360b8e3df2604df83665f4da4e1f3c1b866f56e8e178ea6f8e8c
                            • Instruction Fuzzy Hash: 0D017C74A002198FCB44EBB895506FE77E5FF48204F1041A9E50AD7790EB345E548BA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b075d1bcb7021aa31e7058bae74afaa39be79156a8598b7fa9acf9ef03763ce
                            • Instruction ID: 312a9c8dcf5f049915b92113997418421b7f8da596c9d6807f7022467d199c81
                            • Opcode Fuzzy Hash: 2b075d1bcb7021aa31e7058bae74afaa39be79156a8598b7fa9acf9ef03763ce
                            • Instruction Fuzzy Hash: FD118B71A012688FDF11DB58CA04BEE7BF5AB88714F004099C801BBB61CB786D48CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c59a70d39463c63e56adc191362bb809ec86ad282d3a8bf5f6fb062c234a73b
                            • Instruction ID: e0f6a5e6ffa368234d787f421650caf01034b83afa580db7bdc786fe6f2cda9c
                            • Opcode Fuzzy Hash: 9c59a70d39463c63e56adc191362bb809ec86ad282d3a8bf5f6fb062c234a73b
                            • Instruction Fuzzy Hash: F3017C31A003149FC750DBA8D80459BBBF9FF89315B14446EE58AD7340DB36F902CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8999a190e39656fdde82c6770c3cf26f36b9de400c54cab4bc2abbf9fc2c2ebb
                            • Instruction ID: 083b4dc540815cef93f0b6e70789881bd16db8a80e8666f08c3d062bf099ee10
                            • Opcode Fuzzy Hash: 8999a190e39656fdde82c6770c3cf26f36b9de400c54cab4bc2abbf9fc2c2ebb
                            • Instruction Fuzzy Hash: B201A4727053508FC706BB38D81495A7FAAAF8A31971584FBD009CB363CA32DC06CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9f6d3c8c7ccadc506cfae81fee9755120c34e48f6b8800d3c0cc3221d547e359
                            • Instruction ID: ec2b58ae10dc832f584e07027920a5ee133b187d5b5c25bc7d52dcd7979eed48
                            • Opcode Fuzzy Hash: 9f6d3c8c7ccadc506cfae81fee9755120c34e48f6b8800d3c0cc3221d547e359
                            • Instruction Fuzzy Hash: 5D016D313007018FC725AF2AE8884AEBBA7FBC4215304493CD04AC7B54DB34ED4A9B92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f0d09b04f1f3370e66ee01cea4e7c654f506c468ba235aa5b279d472b8b2a07a
                            • Instruction ID: b54577cd92e4eb7b4d5fa9e0ce61db6c5f0bb0cb46ba1ba1c3a69e2deae6e5a9
                            • Opcode Fuzzy Hash: f0d09b04f1f3370e66ee01cea4e7c654f506c468ba235aa5b279d472b8b2a07a
                            • Instruction Fuzzy Hash: D501A431205204AFC7169F74D8408A6BBB7FF86754758846EE509C7622DB33DC12CB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 63ad3beb6130e4527a9b66f71c93282451b91279818d4944c5f9406fcf97eb23
                            • Instruction ID: 67763f98d46195e52fb16302ce4350be5e045f77f40f4486c5dc8a6d00f7be4f
                            • Opcode Fuzzy Hash: 63ad3beb6130e4527a9b66f71c93282451b91279818d4944c5f9406fcf97eb23
                            • Instruction Fuzzy Hash: 8A01AD702047019FD324DE26C8C4E5BBBE9FB40318B10492DE1428BEA1D7B1F98DCB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f8b0626853a46998be9de638cc10a324227c3eae974c79b4ea4706317ab72741
                            • Instruction ID: f2c32deee8846a212f21cf3588b189b6706b131ef06829a85f5bdeaf323982d2
                            • Opcode Fuzzy Hash: f8b0626853a46998be9de638cc10a324227c3eae974c79b4ea4706317ab72741
                            • Instruction Fuzzy Hash: ECF024327053154FCB167A7CA8101AE7BAA9FD7321B0040BFE508C7240DA7A0A028792
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: daa7c0a2ec626d8b6691f1113723deb1dc368872c49dfc1b9d0a4707ddc1bb7f
                            • Instruction ID: 26fad845db74ca80929545fca4c6da14163ac03b1a6072b6c200a4ce544bdad5
                            • Opcode Fuzzy Hash: daa7c0a2ec626d8b6691f1113723deb1dc368872c49dfc1b9d0a4707ddc1bb7f
                            • Instruction Fuzzy Hash: D0014631A002149FC790DBA8D8048ABB7F9FF89711B10446EE59AD3300DB31E902CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 69577bfd2415838df37573de039bb2865026bf3f13a64169a2be7420850fa8ba
                            • Instruction ID: b4192883ea17005cfc0169fd3e94622b22bb50bd615681543514739cf3dedd70
                            • Opcode Fuzzy Hash: 69577bfd2415838df37573de039bb2865026bf3f13a64169a2be7420850fa8ba
                            • Instruction Fuzzy Hash: 84F0F635704214AFD715CB59D880E8A7BB6EFC9B24B18C09AFA09CB721D731DC02CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fd7cb1962f585937e8370cd1eb754307c1d56cbf6fb32632fbf7dbfd83819b1d
                            • Instruction ID: 5863f085d34604cb7a02790d25eb87d9411a645393d614e7a3bdd2f61e5de887
                            • Opcode Fuzzy Hash: fd7cb1962f585937e8370cd1eb754307c1d56cbf6fb32632fbf7dbfd83819b1d
                            • Instruction Fuzzy Hash: 25018F715087A05FD736E768C404B56BFF9AF06314F04049EE586CB652C762A844C761
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 77a6d678ab342e67637dc8519d352a0247f8846bbc320607723b794597367467
                            • Instruction ID: 70b6dc93c3bbbb6fc3bfd56be8afd27ae6aad697416be13df54c30b6f35e5b7a
                            • Opcode Fuzzy Hash: 77a6d678ab342e67637dc8519d352a0247f8846bbc320607723b794597367467
                            • Instruction Fuzzy Hash: 76F0903630021147D310BF5EE484AABF79AEBD4B58B148829D609CBF44EFB4ED094BD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2fac4e3f71dcae3428dcd3e1b02aaa46238d4beb1e25a2705a61f1afd9d9c062
                            • Instruction ID: 5f1e2e4b4ba74e4b9e913f96047a72f363497253dc21b8c5cc87f439fccff12f
                            • Opcode Fuzzy Hash: 2fac4e3f71dcae3428dcd3e1b02aaa46238d4beb1e25a2705a61f1afd9d9c062
                            • Instruction Fuzzy Hash: E8F0A03234422527E62432795C80BAF718F9BD9A24F204239E205ABBC4ECB5AC0A02D9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 97a6a5724cfe13b6efe81b5d9c95cd314265fb8a1f88dfdb2f6919e229a5891f
                            • Instruction ID: 098f1bf396f5df8ff5a701ad522527a8705b763e263523c0a3d366cc42bdc9fc
                            • Opcode Fuzzy Hash: 97a6a5724cfe13b6efe81b5d9c95cd314265fb8a1f88dfdb2f6919e229a5891f
                            • Instruction Fuzzy Hash: 72F0F4312012114BC324EB29E8849DAB7A7EFD1218B004E29D0028BA94EF706C0E87D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 02eb0dec35d3b8ac21a5dc8408039e3bd083dd6189c2763f342e18e33e5d30db
                            • Instruction ID: f5f8bcb323594c30af9a027738c2237bffc50b50f3f0792d84ee526b3b7b3185
                            • Opcode Fuzzy Hash: 02eb0dec35d3b8ac21a5dc8408039e3bd083dd6189c2763f342e18e33e5d30db
                            • Instruction Fuzzy Hash: 70F096393000259FC614A769E4186A973DAFBC9B5FF021029D206D7B60DF312C8D8795
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5e9f34ea977f217cef87ed3d8ca248984bb93c64c33efeef5029613eb068482e
                            • Instruction ID: 4248f38fd49124b07cdb24d0962b1ed021cf4c248aa454962e4fdf0f0ce93fb5
                            • Opcode Fuzzy Hash: 5e9f34ea977f217cef87ed3d8ca248984bb93c64c33efeef5029613eb068482e
                            • Instruction Fuzzy Hash: B0F02E313082784FCB54577CD46489D77DBAFC26A93210069E145CF721DE759C0747A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 31465ed7fedf92bcfc7cd6e973b24ea8b3bc6c5145b249ec079dd195bf03a3c1
                            • Instruction ID: 5d25c4920fde6978b4df82c5fe39210eacea091b73cb7f30246d497b6de58582
                            • Opcode Fuzzy Hash: 31465ed7fedf92bcfc7cd6e973b24ea8b3bc6c5145b249ec079dd195bf03a3c1
                            • Instruction Fuzzy Hash: 6FF0E53230A2911BC716637E5C1056EBFEE4FDB72071400FAE14CCB392DC6A8A0283A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 37ef2fbf88252e5c8af0a479e2bedb101ed9d72da229d0e2aaed2719c9ce6ab2
                            • Instruction ID: 0bbcbcbf6ead3ecfc40a0ccd032284dfcea90ea4983a96d0dc928a6a5faccf92
                            • Opcode Fuzzy Hash: 37ef2fbf88252e5c8af0a479e2bedb101ed9d72da229d0e2aaed2719c9ce6ab2
                            • Instruction Fuzzy Hash: 7FF0E53134071126EA3036399C11B6E35479BC1B94F200535E644FE6C0ED75AD46839B
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bd642633bb24e0123a9ae3f482bc2417be3907f18f008d092f38a2fea7fedd99
                            • Instruction ID: db37628827dc21b4ee1394cbb217aec5441c019d68b0469a718993c162de293e
                            • Opcode Fuzzy Hash: bd642633bb24e0123a9ae3f482bc2417be3907f18f008d092f38a2fea7fedd99
                            • Instruction Fuzzy Hash: 65F0B4312012255BC620AB2AE8808DFB7ABEFD46587444D38D10687B54FF607C4D43E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5f21a522bd220f8a127fb4802ba929de8c7893ad061a1d3c58f0b05927dc870c
                            • Instruction ID: 98bdbba69f9d7844499c43373e5e34c53f6a04e67bdc567e2e48c3016843df7a
                            • Opcode Fuzzy Hash: 5f21a522bd220f8a127fb4802ba929de8c7893ad061a1d3c58f0b05927dc870c
                            • Instruction Fuzzy Hash: 0EF04931E01256DFCB50EFA8C48979ABBB5BF08304F1500A9D52ADB252E731CA82CBD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 91865e711dfc943436da533c88966fffd85be6a0d510f531b1ee85ca435bd97b
                            • Instruction ID: 77571d2a28f728e5c2a3eb539b02157dba62a4d0d62b15385cef5e37d81ebfff
                            • Opcode Fuzzy Hash: 91865e711dfc943436da533c88966fffd85be6a0d510f531b1ee85ca435bd97b
                            • Instruction Fuzzy Hash: 5AF05E36200204AFC7259F65D8448ABBBABFF89350794842DFA1A83720CB32DC11DB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.641445904.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_5900000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 068e3bd7fa389f3b1f05f0ebc5928378b3b1917d1d37c500e36903ba2cd5d26b
                            • Instruction ID: d2b6c0bc2b4110e526925ee113c5eb30d808d2855b2b05c792410379e7aec8a8
                            • Opcode Fuzzy Hash: 068e3bd7fa389f3b1f05f0ebc5928378b3b1917d1d37c500e36903ba2cd5d26b
                            • Instruction Fuzzy Hash: 36F0E53A3012104F9B04DA76D900A66B3DEBF8856830899B5D909CF750EE35DC41C7C0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a57596fb4d4db16778c732567a2d027aa241f943e7be5e5c439491f352f43f59
                            • Instruction ID: f1621d6392845cec349c4650216a5341a218bb53f71e3550044ce3d0fcb75cfc
                            • Opcode Fuzzy Hash: a57596fb4d4db16778c732567a2d027aa241f943e7be5e5c439491f352f43f59
                            • Instruction Fuzzy Hash: BD019D75D00219AFCF44DF99D9488EEBBF5FF4C310B108066E919A3220D3319A21DFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 00ec09c5e8db0cd4d22ebb5c70769a76174b52fa67f581ea32e00c78c2e4af33
                            • Instruction ID: 8849311e9258f040dfef11245ca829437d82c90f6d9293a9ac2a40aefffade54
                            • Opcode Fuzzy Hash: 00ec09c5e8db0cd4d22ebb5c70769a76174b52fa67f581ea32e00c78c2e4af33
                            • Instruction Fuzzy Hash: ABE065313056605B8706263D582092A7AEA8ECBB2435404EEE009CB262E9664D0383A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c7b6ed61bfe35961cc1870a0e302ef8c40b7385b28272a75d3e82033a16decad
                            • Instruction ID: cc221bda2b6938185570f42b98bbd28fd338727a088a509a0911037dec3e4260
                            • Opcode Fuzzy Hash: c7b6ed61bfe35961cc1870a0e302ef8c40b7385b28272a75d3e82033a16decad
                            • Instruction Fuzzy Hash: B8E09B3174071166FB3136355C01BBE36569BD1B50F200535E545FE2C0DE756D02878A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 18850c1642fd26671fb119abc56e40f8b1e298cf2a747128032994b349739f28
                            • Instruction ID: 58fb056bdc1dd1b14d9128c831433b9e21fd2d37a349c8489a9e773c2ba29462
                            • Opcode Fuzzy Hash: 18850c1642fd26671fb119abc56e40f8b1e298cf2a747128032994b349739f28
                            • Instruction Fuzzy Hash: 18E02B223081511B8701227D1C605BF7FDE4FDA72070540BAE049C3252CC19490283A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4684b7082ef4b32d1e6d6f72317f6e09184a98da4729fad30e08a3ea4243c56b
                            • Instruction ID: 097afcf55bdb67430ccd2c43fdc6709a9c5a9ea6fb3c9659df16c8da0aa011ed
                            • Opcode Fuzzy Hash: 4684b7082ef4b32d1e6d6f72317f6e09184a98da4729fad30e08a3ea4243c56b
                            • Instruction Fuzzy Hash: 31E0DF323243114F8716277E681407A3BEF9ACA32032800A7E509C7344DE758C0783A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a860666e51ae6ae69144e7d356467da6a6ac5df01eae7a9a8159d7497bc25fd
                            • Instruction ID: d45b0ae9558bcd891dcd1482b0dd70c0492177ae9078cf532069657e758e147f
                            • Opcode Fuzzy Hash: 2a860666e51ae6ae69144e7d356467da6a6ac5df01eae7a9a8159d7497bc25fd
                            • Instruction Fuzzy Hash: A8F03A31E0521A9FCB40EFA8C48879ABBF5BF08304F1544A5D91ADB251E730DA81CBD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 29e99ec791f89ed25d5512ea1722751804178fb921a34be9c9fd7cf12a04e534
                            • Instruction ID: 0cdc6ddb40c4c4fc07139327823601b8188ce54831571857e7f90eecfdbd11ab
                            • Opcode Fuzzy Hash: 29e99ec791f89ed25d5512ea1722751804178fb921a34be9c9fd7cf12a04e534
                            • Instruction Fuzzy Hash: 2DF0E5317403006FE3211A21EC19B5B3BDAEBC5711F100095F5059A2D4DFB579024B80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 186ada8e53224389242499f0c7cb067518c0ebffd15dc078e2dd1e35eccb284f
                            • Instruction ID: 0e95f0caee7d39959afd110b4cc363c8af376795cca2c55fcb84290d044b951b
                            • Opcode Fuzzy Hash: 186ada8e53224389242499f0c7cb067518c0ebffd15dc078e2dd1e35eccb284f
                            • Instruction Fuzzy Hash: 23E0D83130021157D219556E9894B57B6CEEBC9669F20007AE908CB740DD719C028791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f90574b24db33eaaaece98b530fbd4ac01e085a73f91a23153fd973d644df662
                            • Instruction ID: 56c1d036486d63b6b40242e13503d4ef27cf2172bc864b53fc8857470b54cb69
                            • Opcode Fuzzy Hash: f90574b24db33eaaaece98b530fbd4ac01e085a73f91a23153fd973d644df662
                            • Instruction Fuzzy Hash: 7AE068203080384FCA0463BC88288AE72CFAFC16DA3200035F20ACB720DE719C024BD6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e8423538848d27b4439113c648a86c9ea5d4f0cd7ed490c358bf96337cddd7c9
                            • Instruction ID: 40d1aeb48c201e1576ff7bbbfd92feb67dc5fa581cc01122c24e3ffb7e287711
                            • Opcode Fuzzy Hash: e8423538848d27b4439113c648a86c9ea5d4f0cd7ed490c358bf96337cddd7c9
                            • Instruction Fuzzy Hash: B7E0C2333005222B8714716E6C14ABFBACF8BDE720B5440BAF10DC3341DC298E0243EA
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9bb80ed425329c209ff289f918df660bd4e4ddbedf7145436ec1f8e5b5b887cb
                            • Instruction ID: 5513cade792222dbd2028fcfc6abb80952b48ec9d3ec767052e906b53117c604
                            • Opcode Fuzzy Hash: 9bb80ed425329c209ff289f918df660bd4e4ddbedf7145436ec1f8e5b5b887cb
                            • Instruction Fuzzy Hash: 79E0C2333015222B8714716E6C10ABFBACF8BDA770B54407AF20DC3341DC298E0243EA
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 28813122596304754a5ab44b0caaacb091d200e1f2f781a828ffbe5aa63a7894
                            • Instruction ID: 907f79031b88920cdcbe22c187d8e44568b7295b94f5e29e32a7e0d1ce133fa7
                            • Opcode Fuzzy Hash: 28813122596304754a5ab44b0caaacb091d200e1f2f781a828ffbe5aa63a7894
                            • Instruction Fuzzy Hash: F1E09B30714751CFC72B67289814156BBA5DF87364B1440EFD944CF296DA318D03C396
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 84181d1af69b1bec5639b103127a1e8181a80a9322cb19af411c2858c761d86d
                            • Instruction ID: ae4b555e192027c357a403d50750bc7af498abeaedf4b3d81e212ed57f413b7c
                            • Opcode Fuzzy Hash: 84181d1af69b1bec5639b103127a1e8181a80a9322cb19af411c2858c761d86d
                            • Instruction Fuzzy Hash: 6CE0263239020037D7207508EC01FAE73969BE4B10F208127F504EF6C0D9F16C064688
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7eef2a7e2f45be014ee16cfaedee36b549914e67face70530cc6bf921c78e161
                            • Instruction ID: 11bdb4c2984864e660bb0158c680e6a140bff0a2df64efea20f3eb124c9cd8a7
                            • Opcode Fuzzy Hash: 7eef2a7e2f45be014ee16cfaedee36b549914e67face70530cc6bf921c78e161
                            • Instruction Fuzzy Hash: 79E04F363403106BD6202662AC09B9B77AEEBC8B11F104565F602962C8DFB479014B94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 07342798e8ed751a80287b5a8bf8da6fde2ec10ddccefe107c404d9104f12863
                            • Instruction ID: a896cecc1ee755d2f79ddae32044d564690139ca99d8fdf0f09515d9645da677
                            • Opcode Fuzzy Hash: 07342798e8ed751a80287b5a8bf8da6fde2ec10ddccefe107c404d9104f12863
                            • Instruction Fuzzy Hash: 9BF039B0D15349EFDF52EFB0D94929DBFB5EB0A321F6041EED940A7252E6320A05CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7acf6ed6f8a4bb0c4a1ff5b5a92cdad0c866fa86625c9d0e89a4e223cad4326a
                            • Instruction ID: 0046c0bc02c8296a585d4b7e407b4e57b8cd8d8312971fa1dfb118575d00d3a5
                            • Opcode Fuzzy Hash: 7acf6ed6f8a4bb0c4a1ff5b5a92cdad0c866fa86625c9d0e89a4e223cad4326a
                            • Instruction Fuzzy Hash: 9EF03970C09349AFCF02EFB488885ACBFB1EF46300F6040EED840AB251EA754A02DB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0ed66d8edea21ba9a9b729792d70344147cd1a7735bcf573beded91c77482bec
                            • Instruction ID: c5b80df4266e75e12e25e16c60afcaad71997b0ff8e24fd6235d39f615b548b5
                            • Opcode Fuzzy Hash: 0ed66d8edea21ba9a9b729792d70344147cd1a7735bcf573beded91c77482bec
                            • Instruction Fuzzy Hash: 22D05B3230412517D214256F6C94A6BB6CFE7CD6B6B64413AF60DC7740DCB1CC0683E5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 62dbe6ed6e551593dbc1199147fc90846163664ad56dd91ddbb60b41f7af796e
                            • Instruction ID: c5c3326d22dbce777ef06760580a69929e52f4347fb58ebee50daedd28652a92
                            • Opcode Fuzzy Hash: 62dbe6ed6e551593dbc1199147fc90846163664ad56dd91ddbb60b41f7af796e
                            • Instruction Fuzzy Hash: C2E086347107128BC73D765D981456A7396DBC9761B14807BD609CB784DE31DE4283D5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d73e1e840ef3c5c64ff7d39daf20fd74768a7081897e8101838a809f9588ad64
                            • Instruction ID: b0abbbd96d3508a4d4f00d71ee335a51cefe32bf5de171174e724f76ff2bf89f
                            • Opcode Fuzzy Hash: d73e1e840ef3c5c64ff7d39daf20fd74768a7081897e8101838a809f9588ad64
                            • Instruction Fuzzy Hash: A9E08C3239021433D62075099C41F9A729A9BD4B20E208126B608AF6C099F1B90642D8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 60b2ec3b9e1903b26d93d3f1b74d7a26ab1bf5a0a432a732e3f0a777e2441901
                            • Instruction ID: 852a9ddb26d2e27f148abb6317de293031cb3336426947644d189cc15826c6bc
                            • Opcode Fuzzy Hash: 60b2ec3b9e1903b26d93d3f1b74d7a26ab1bf5a0a432a732e3f0a777e2441901
                            • Instruction Fuzzy Hash: 8ED0A732700220574A19327D682491F72DF8BDBB2175004BEE00AC7340DD779E0343EB
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 24326d0f11ad6db1d12ead5709f824d4ecf2323980747feab7f53fa6cc2ee273
                            • Instruction ID: 15f130dec870c7476a26720d6ac08bd5ffce2833b479573f1cac327b2f3014a1
                            • Opcode Fuzzy Hash: 24326d0f11ad6db1d12ead5709f824d4ecf2323980747feab7f53fa6cc2ee273
                            • Instruction Fuzzy Hash: 0DD05E32700221574A19327D681451F76DF8ADAB2175404BEE009C3340DD669E0243DA
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9ed66cca0d17f92a9cfd1849d46f8715b9a2a15d78308f5ef66ae41730f6bd50
                            • Instruction ID: e6c33872f59cd33826f3ca884a312d7d865c100da3b6104696da8003a2c3c592
                            • Opcode Fuzzy Hash: 9ed66cca0d17f92a9cfd1849d46f8715b9a2a15d78308f5ef66ae41730f6bd50
                            • Instruction Fuzzy Hash: 28D0A9367201251B4618222E781893F36CF9BCCB22328407BFA0EC3308DEB0AD0713E6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 978e45ddb7b38a5707812e06514f56956cce03f6ba786a494014b63a51761bc6
                            • Instruction ID: ff874ad636daf25b13dfd0aec9f03db7f8e0258841caff111c9b49245f487727
                            • Opcode Fuzzy Hash: 978e45ddb7b38a5707812e06514f56956cce03f6ba786a494014b63a51761bc6
                            • Instruction Fuzzy Hash: F2E0C2B210D3A58FC3114B64DD962903FA8FB43709F4400CFE486CF972D669B64ACB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3fa3ed7f6db6ed13f8ca619ff308400c571374b7cdbab807e0353fcad3d2480b
                            • Instruction ID: 859e6662e525e70d8c296481e644025911331ca8b408d80d70d25eccf38609e1
                            • Opcode Fuzzy Hash: 3fa3ed7f6db6ed13f8ca619ff308400c571374b7cdbab807e0353fcad3d2480b
                            • Instruction Fuzzy Hash: 1CD01234C15249AF8B51AFBD54090357FB8DA06314B6406A99D08C7305E93296058FD2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9df896320e4328bbb5fe1b915693ac5f974258307a1e616ff0a8a9597d4f393e
                            • Instruction ID: 93ab1246639e51af8e9fa527ea5e4a86d63ec8fd987bc8ebadb4e3fa1154d89b
                            • Opcode Fuzzy Hash: 9df896320e4328bbb5fe1b915693ac5f974258307a1e616ff0a8a9597d4f393e
                            • Instruction Fuzzy Hash: 50E0EC70D00308EFCF40EFF4D94969DBFB9EB09301FA041E9D904A7244EA315B119B85
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7ce1686d0ff7d668060f169d1fc6d0e813d1797e284dad9a912888f04c85d09f
                            • Instruction ID: fbf0217686e3e8414b305861de4067eef9bf180ebb429eff0b15f37e128f989e
                            • Opcode Fuzzy Hash: 7ce1686d0ff7d668060f169d1fc6d0e813d1797e284dad9a912888f04c85d09f
                            • Instruction Fuzzy Hash: A2E0EC70D00709ABCF00FFF8D9896ADBBB5EB05201FA041A9D904A7240EA315B119B85
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6c338ca560543e976f5c8bb4aba5064d2484f915377ff908c4aa88b4e587aa15
                            • Instruction ID: 528c909c1ca64f187d31b7e26b49e464e8044d4aa7fa6a5aedfbdb69933fdc4e
                            • Opcode Fuzzy Hash: 6c338ca560543e976f5c8bb4aba5064d2484f915377ff908c4aa88b4e587aa15
                            • Instruction Fuzzy Hash: 7DD05E36F000158B8710E669A900199B3B0AB88368B2481A2C80AD3744EB30DE49C7C0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2581c9a626a7f577f8d57d104738e21aac73970bf3ca30dfef9be991aa876ab3
                            • Instruction ID: e85529a9d2e80c9db5c4db011985fc1930826ce1f0b5bef0ce4c99ec773ec455
                            • Opcode Fuzzy Hash: 2581c9a626a7f577f8d57d104738e21aac73970bf3ca30dfef9be991aa876ab3
                            • Instruction Fuzzy Hash: D8D05E362002018BC615EA25ED80699B7A6FBC072DB104D6AE145CBE70D7B1EA4E8BC2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 625253497af95fc450ec16375ecb9bd98bbf69829fcd8ec0739abaafd6022053
                            • Instruction ID: b27efa31959dc7eb8503a1fd8bb1f69d502da179af98ddd75e26f9396b7ed6dc
                            • Opcode Fuzzy Hash: 625253497af95fc450ec16375ecb9bd98bbf69829fcd8ec0739abaafd6022053
                            • Instruction Fuzzy Hash: F2D0172050D3C01FCB0623381A345D92F214F53208B4A04DAC1828B593D9141AC8E7A6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1fb04e0b950da9e09a82235833c3c575c17752aa93e432db7b86960eb8a3dd33
                            • Instruction ID: b22f9e0fdac0316ae991cd7eb92516c5e4462c0e262be7b4fdda7a83a37b1d33
                            • Opcode Fuzzy Hash: 1fb04e0b950da9e09a82235833c3c575c17752aa93e432db7b86960eb8a3dd33
                            • Instruction Fuzzy Hash: EBD05E7250A2948FCB26577860240D87FB2AF5B61431500FED001DBA66DA784C86CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8d86cfdf257479457c44a5ce107c96c1e0a3d6ff36761937d8ba8cca79ab2be4
                            • Instruction ID: f64f4c50d6f9b7f7487e6da4996cd105661464553b33ebb8ef05a554aabb3c9b
                            • Opcode Fuzzy Hash: 8d86cfdf257479457c44a5ce107c96c1e0a3d6ff36761937d8ba8cca79ab2be4
                            • Instruction Fuzzy Hash: A0D01731102110DBC7069B28E4406A0BBA2EF8A609B28809CE4084FA22C737DC53CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 43d311a14c97611b6bfab0d5b858f2005e26b4c5aa121f307b306df8524ee9cf
                            • Instruction ID: 656fae70be43c2160d9963609b4d90b0b105206b52d9163433e9aee21e949ebf
                            • Opcode Fuzzy Hash: 43d311a14c97611b6bfab0d5b858f2005e26b4c5aa121f307b306df8524ee9cf
                            • Instruction Fuzzy Hash: D6D0123408D7CC0FCF13137C28383C47FAE19231007C600D3D4C88665BD809148B836A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8af2115fad8cfa3084e12f6bcd67bf0223ae8225cf8ed6dffead5afa3c15d55b
                            • Instruction ID: 5b0f52485b5a1f67d9953da410b3c11fe11b3f1a06ba7220945e2d47cd218d12
                            • Opcode Fuzzy Hash: 8af2115fad8cfa3084e12f6bcd67bf0223ae8225cf8ed6dffead5afa3c15d55b
                            • Instruction Fuzzy Hash: 1DD05E3051C2648FCB071B38A4180D93762EF42218F1600EED5419B146DA680D068BE2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: eddc07401d2520a79c517ffdb9f1ae24830ba422d56880f694c07eda1130e421
                            • Instruction ID: 0b900394e57ea34b90de3913c95e172579cba1a6e594bf1968cf7c3b00e18707
                            • Opcode Fuzzy Hash: eddc07401d2520a79c517ffdb9f1ae24830ba422d56880f694c07eda1130e421
                            • Instruction Fuzzy Hash: D5D01236F01520CF8E14EBB8D5545DCB3A49F44A187160095E91BDBB70CF219E59C7C1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2605b47f78cf3067c6af8471487dcb18ec1be9171c1c9739a2a296e4616f9964
                            • Instruction ID: 6c6742a92d0846ff47d0082fd41ca6c0fe786e81bdd1d09b43b379114b37a5db
                            • Opcode Fuzzy Hash: 2605b47f78cf3067c6af8471487dcb18ec1be9171c1c9739a2a296e4616f9964
                            • Instruction Fuzzy Hash: 25D0CA3040A3808FCB179F3188101103FB1EF8330932680EAC480DE222C63A0447CB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e208d4848148ca000dbf3715019a7af01a313cce16f4d6bf218ff5a5af2a025f
                            • Instruction ID: 38f88ed806e9e89ceb40e119f56063c74739d7294b972067225906bf8f01d178
                            • Opcode Fuzzy Hash: e208d4848148ca000dbf3715019a7af01a313cce16f4d6bf218ff5a5af2a025f
                            • Instruction Fuzzy Hash: 06D09E39A01008DBCB04DF84E5409DDFB71FB84325F20C05BDD1567351C7329A16CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f64c796f6a3f0a87bbfc869bf6f27280fb7c62df3106ebff0224c46a9e2dfc72
                            • Instruction ID: 5ed3805f43c92f215d7a82d2c7082adc02cd621efe98defaf2d039022a16161e
                            • Opcode Fuzzy Hash: f64c796f6a3f0a87bbfc869bf6f27280fb7c62df3106ebff0224c46a9e2dfc72
                            • Instruction Fuzzy Hash: D3D0EA7044A3818ECB6B6B3099151503FA6EF4361D72A48EEC8818E5ABD73A9447DB12
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c368f0ca540d53c083d3cf45f5654565ed468d7c7ba6f27495d57e86e1115ffd
                            • Instruction ID: 4dece296f1180e5a9be9777602e63896644f68ccd682632fc792f16ef6df45ea
                            • Opcode Fuzzy Hash: c368f0ca540d53c083d3cf45f5654565ed468d7c7ba6f27495d57e86e1115ffd
                            • Instruction Fuzzy Hash: ECD0C935F0010E8FCB00EA94E9504DDF376EB84315F208162C51997154DA302A1ACB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 301f4ddcfb00f4e46684c7dc805f679770afbd968ddf221b0918740b6d23a0e8
                            • Instruction ID: e804f4032ea4d8f5cd6f4237ff1b0fd66dde2888d5cb5db61bef8fe7184c8a40
                            • Opcode Fuzzy Hash: 301f4ddcfb00f4e46684c7dc805f679770afbd968ddf221b0918740b6d23a0e8
                            • Instruction Fuzzy Hash: 2AC01230C1524D9FC750FFB9580A12ABFBC9605214F9045969D08C3345E53596158FD2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dfb6c4b4824714b5f9c2b99396bf834a6544809cf9102d21fe3e94a9b8dfd3dc
                            • Instruction ID: b33033672d93fc7b0d8f81e9adb1d4e8e8fe13167cf1df262bf904472a6f9af3
                            • Opcode Fuzzy Hash: dfb6c4b4824714b5f9c2b99396bf834a6544809cf9102d21fe3e94a9b8dfd3dc
                            • Instruction Fuzzy Hash: B6C09B3415575D5FC50033B5753C1AD715D7B45A08F805815F40D91F04ED186C4C4659
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7421be7e4cda32a305a3525c35457daff97b42c1432057ecf8ec9934014a52b6
                            • Instruction ID: d0d62269a796e35d39c30d726ba0bf1b681d0d3fe702f3ede79fd9388f8d5236
                            • Opcode Fuzzy Hash: 7421be7e4cda32a305a3525c35457daff97b42c1432057ecf8ec9934014a52b6
                            • Instruction Fuzzy Hash: B6D022300043054FC2009FB0FA02695379CEB83308F200C00E01C4D461C278A6064B40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70ee81d83be7052e17d8c9eb1b32f120b0749db4f02bc334ef2c8ebb7e21d9b2
                            • Instruction ID: f5e709ff651af661c0124daa75becdd775d184530dbe54f1c658e1e4499b7d68
                            • Opcode Fuzzy Hash: 70ee81d83be7052e17d8c9eb1b32f120b0749db4f02bc334ef2c8ebb7e21d9b2
                            • Instruction Fuzzy Hash: 56C04C7840A3804FD7070B3599100803FB0ED4370C79A00DAC854CF663E2798A078711
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6bd6c9590758354032a6d527a0f4d3ecb05ae0a254b3807f34101316843628ea
                            • Instruction ID: 1d817fa7d874951b0f9dc7ff282ee572ab1e190288c406057d9e7f3f05ae96be
                            • Opcode Fuzzy Hash: 6bd6c9590758354032a6d527a0f4d3ecb05ae0a254b3807f34101316843628ea
                            • Instruction Fuzzy Hash: C9D0C9760051009FC716CB60CE47F44BBE8FF85B44F504885E5088E0B8C3769616DB11
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a5ccaf448ffd10d148d9741f90dab45492d39dfd5991b94cb0036cea10b9b49a
                            • Instruction ID: 6050a2c2ed180664bcff6b39be33ad50e22882234d420ac4aa398aeb79bcc295
                            • Opcode Fuzzy Hash: a5ccaf448ffd10d148d9741f90dab45492d39dfd5991b94cb0036cea10b9b49a
                            • Instruction Fuzzy Hash: 5BC02BB39C00048FCB0CDF04F4C50C0B360FD4123331000A6D005C7012C2258407CE50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ac2944061e866d21ae8070f9a716df25ff6ebf73a853c92b7b7ea63fb2230f80
                            • Instruction ID: 96ea267e90d71dec06d64416130e4845ab8a630e3cde1794f61e8a13c75b0f40
                            • Opcode Fuzzy Hash: ac2944061e866d21ae8070f9a716df25ff6ebf73a853c92b7b7ea63fb2230f80
                            • Instruction Fuzzy Hash: E8B09237A06108DA8F64DAA4F5410DCF737EE8022ABA000BAD2185204087365A65CA51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a2c4bfa5d363bb29059d3f748dec150771c467622f214c432aeaaaf81385237
                            • Instruction ID: d920b9afd0e95108f24c1f4f1879b3ac5523823fbd3dbd5b238a51523209dd4e
                            • Opcode Fuzzy Hash: 2a2c4bfa5d363bb29059d3f748dec150771c467622f214c432aeaaaf81385237
                            • Instruction Fuzzy Hash: 43B09237A0000ACFCB10EB84F8458DEF774FB9432AF1040A7D211A240086322A25CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ca2b9141b7621f97feab71c1f58664d34196d16b645e2ee5505684015bd25b65
                            • Instruction ID: f4b8ef93c2b5524c660d02f821e7f336b8a4b7335903977528488e368dc957e0
                            • Opcode Fuzzy Hash: ca2b9141b7621f97feab71c1f58664d34196d16b645e2ee5505684015bd25b65
                            • Instruction Fuzzy Hash: 33B0127000438D4FC6406BA1FD08495331DDB82609B804410B00C09D156AB46D584BC8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595145745.0000000001623000.00000040.00000800.00020000.00000000.sdmp, Offset: 01623000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1623000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5cab94735bf9305d0ea54dd2b120768257699fb36b9947022f39e02ace82074b
                            • Instruction ID: d4c2a6df2814ed9c2d780e9d68e5f77eebfa4b8215b4129717c449aeb75240f0
                            • Opcode Fuzzy Hash: 5cab94735bf9305d0ea54dd2b120768257699fb36b9947022f39e02ace82074b
                            • Instruction Fuzzy Hash: A7C09B315051405FEB15CF5489157D177286F52305F1511D5D80D9BC83D675185AC752
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.596562340.0000000001880000.00000040.00000800.00020000.00000000.sdmp, Offset: 01880000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1880000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 00eff888974bdcc19223935a1f64b893a8e7ac60c531bb82ae6a0134e33494fa
                            • Instruction ID: 0bca51e5cddda88d7984be4bf4dac39d8129ad4c4352875833ccb41dd4c55071
                            • Opcode Fuzzy Hash: 00eff888974bdcc19223935a1f64b893a8e7ac60c531bb82ae6a0134e33494fa
                            • Instruction Fuzzy Hash: C8B01230502390CFCF26573445082153B52AF8230972944FCD80084405F73A9543C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.595092341.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1620000_Receipt.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2e8e8fec99fe89f5bd5e2bf254f752dca4c77c8f25bebdfbf58618176afc71a1
                            • Instruction ID: 52742417dd5d8f1bfb52d648f00ff4433799741d639910950ddca253f37b3031
                            • Opcode Fuzzy Hash: 2e8e8fec99fe89f5bd5e2bf254f752dca4c77c8f25bebdfbf58618176afc71a1
                            • Instruction Fuzzy Hash: C1A0113200022A8FCA202BA0B80C0883B2CBA00322F8000A0F80E808088A2238888B80
                            Uniqueness

                            Uniqueness Score: -1.00%